Data Analysis & Visualization for Security Professionals

Size: px
Start display at page:

Download "Data Analysis & Visualization for Security Professionals"

Transcription

1 Data Analysis & Visualization for Security Professionals Jay Jacobs Verizon Bob Rudis Liberty Mutual Insurance Session ID: GRC- T18 Session Classification: Intermediate

2 Key Learning Points

3 Key Learning Points data helps our understanding of our environment

4 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying

5 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly

6 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned

7 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned be truthful: message should match the data

8 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned be truthful: message should match the data simple tools can be, data scientist you need not be

9 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data

10 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data

11 use information to better understand our world and make more informed decisions Stephen Few

12 use information to better understand our world and make more informed decisions Data helps our understanding of our environment Stephen Few

13 Our Goal: To amplify cognition of data through visual representation and presentation.

14 Our Goal:

15 Our Goal:

16 Visualizing for Analysis

17 Visualizing for Analysis All four data sets: Mean of x: 9.0 Variance of x: 11.0 Mean of y: 7.5 Variance of y: 4.1 Correlation x,y: Linear Regression: y = 3 + 5x

18 Visualized...

19

20

21 Solutions are more from thinking than buying

22 Visualizing for Analysis: Pairs of Threat Actions

23

24 Visualizing to Communicate: The night before Hurricane Sandy... Date: OCT 2012 Hurricane-2 SANDY ADV LAT LON TIME WIND PR STAT /22/15Z TROPICAL DEPRESSION 1A /22/18Z TROPICAL DEPRESSION /22/21Z TROPICAL STORM 2A /23/00Z TROPICAL STORM /23/03Z TROPICAL STORM 3A /23/06Z TROPICAL STORM /23/09Z TROPICAL STORM 4A /23/12Z TROPICAL STORM /23/15Z TROPICAL STORM 5A /23/18Z TROPICAL STORM /23/21Z TROPICAL STORM 6A /24/00Z TROPICAL STORM /24/03Z TROPICAL STORM 7A /24/06Z TROPICAL STORM /24/09Z TROPICAL STORM 8A /24/12Z TROPICAL STORM /24/15Z HURRICANE-1 9A /24/18Z HURRICANE /24/21Z HURRICANE-1 10A /25/00Z HURRICANE /25/03Z HURRICANE-1 11A /25/06Z HURRICANE

25 Visualizing to Communicate: The night before Hurricane Sandy...

26 ...and three months later

27

28 Visualizations help communicate complexity quickly

29 [Tables and graphs] are so common many of us assume that knowledge of their effective use is common as well. I assure you, it is not. Stephen Few Show Me the Numbers: Designing Tables and Graphs to Enlighten

30 count California Attorney GeneralDatabreaches.net Dataloss DB HHS via Databreaches.net HHS via PHIPrivacy.net Media NAID PHIPrivacy.net Security Breach Letter Type CARD DISC HACK INSD PHYS PORT STAT UNKN Month

31 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data

32 Visualizing Encoding with shape, size, color and position using categorical or quantitative variables possibly over space or time

33 Accuracy of Decoding More Position along a common scale Position on identical but nonaligned scales Length Angle / Slope Area Less Volume / Density / Saturation Hue Graphical perceptions and Graphical Methods for Analyzing Scientific Data, Cleveland and McGill, Science, Photo by Kevin Riggins,

34 Communicate Quantity with Saturation?

35 Quantity Position Length Angle Slope Area Volume Density Saturation Hue Category Position Hue Density Saturation Shape Length Angle Slope Area Volume From: Photo by Kevin Riggins,

36

37 Colorblind Safe Print friendly Photocopy-able

38 Color blindness is common

39 Print Friendly...?

40 Pop Quiz: What do you see?

41

42 Quantity (% of breaches) Category (year) Category (actor)

43 Quantity (% of breaches) Category (position) Category (color)

44 x 74 6x 94 20x length

45 x 74 6x 94 20x Position on common scale

46 x 74 6x 94 20x patterns!

47 Pop Quiz #2: Which is larger?

48 F A E B D C

49 Which is Larger? B A E F C D 0% 3% 5% 8% 10% 13% 15% 18% 20% Position and Length makes the same values easier to compare

50

51 Caution! Adding a third dimension on twodimensional medium creates perspective...

52

53 Pie Charts

54 How are we as an Industry? It seems y all need to go on a diet (too much pie) over 20 industry reports pulled -

55 How are we as an Industry? Data visualization is not a natural skill; It must be learned It seems y all need to go on a diet (too much pie) over 20 industry reports pulled -

56 Avoid them, people don t decode well Use them, people learn how to decode If you must use Pie Charts... Never in 3D Limit categories, 3 to 6 Start at 12, clockwise decreasing in quantity Avoid if angles are small or values are close

57 Slide Workload Distribution Jay Bob

58 Tufte Takeaways Chart Junk: the stuff that doesn t change when the data changes Data Ink Ratio: what percentage of your ink shows data Smallest Effective Difference: the least you can do to highlight

59 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data

60

61 35% 39.6%

62

63 Selection Bias? [1st, 10th, 16th, and 31st month]

64 Selection Bias? Be truthful! The message should match the data. [1st, 10th, 16th, and 31st month]

65 Make decisions Visual representation of data Visualizing for analysis Helps Understanding Thinking vs buying Ocular biology Amplify cognition Gestalt Quick comprehension Visualize *to* communicate Communicates Complexity Not a natural skill Visual encoding Medium Labeling 3D EVIL Pies R Speaks Truth Uses simple tools Simple yet powerful Python Gephi Tableau Command line prototypes MongoDB Lots of data

66 :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA- session : Built inbound TCP connection for W Workstations: / :52:52 Local4.Info ( /4873) to Servers: /135 :Apr 13 08:52:52 PDT: %ASA- session : ( /135) Built inbound TCP connection for W :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:52 Local4.Info ( /4874) to Servers: /43025 :Apr 13 08:52:52 PDT: %ASA- session : ( /43025) Built inbound TCP connection for W :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA- session : Built inbound TCP connection for W Workstations: / :52:53 Local4.Info ( /4875) to Servers: /43032 :Apr 13 08:52:53 PDT: %ASA- session : ( /43032) Teardown TCP connection for Workst :52:52 08:52:53 Local4.Info :Apr 13 08:52:52 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:00 :Apr 13 bytes 08:52: PDT: TCP %ASA- session : FINs Teardown TCP connection for Workst :52:52 08:52:53 Local4.Info :Apr 13 08:52:52 08:52:53 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:53 Local4.Info ( /4876) to Servers: /135 :Apr 13 08:52:53 PDT: %ASA- session : ( /135) Teardown TCP connection for Workst :52:52 08:52:53 Local4.Info :Apr 13 08:52:52 08:52:53 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:55 Local4.Info ( /4877) to Servers: /43025 :Apr 13 08:52:55 PDT: %ASA- session : ( /43025) Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: /49155 duration :Apr 1:00: :52:55 bytes 1968 PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 1:00:01 :Apr 13 bytes 08:52: PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / Firewall duration 0:00:58 :Apr 13 bytes 08:52: PDT: TCP %ASA- session : FINs Logs Built inbound TCP connection for W :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 0:00:14 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:53 08:52:55 Local4.Info :Apr 13 08:52:53 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:56 to Local4.Info Servers: / duration 0:00:14 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:53 08:52:56 Local4.Info :Apr 13 08:52:53 08:52:56 PDT: %ASA- session : Teardown TCP connection for Workst / :52:56 to Local4.Info Are Servers: / A duration Good 0:00:14 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Example Teardown TCP connection for Workst :52:55 08:52:52 Local4.Info :Apr 13 08:52:55 08:52:52 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:52 to Local4.Info Servers: / duration 0:00:28 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Built inbound TCP connection for W :52:55 08:52:52 Local4.Info :Apr 13 08:52:55 08:52:52 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:52 to Local4.Info Servers: / duration 0:00:28 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 08:52:52 Local4.Info :Apr 13 08:52:55 08:52:52 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:52 to Local4.Info Servers: / (Use duration 0:00:28 :Apr bytes 13 case 08:52: TCP PDT: FINs %ASA- session : #1) Built inbound TCP connection for W :52:55 08:52:53 Local4.Info :Apr 13 08:52:55 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:28 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 08:52:53 Local4.Info :Apr 13 08:52:55 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:11 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:55 08:52:53 Local4.Info :Apr 13 08:52:55 08:52:53 PDT: %ASA- session : Teardown TCP connection for Workst / :52:53 to Local4.Info Servers: / duration 0:00:10 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : %ASA- session : Built Teardown inbound TCP connection TCP connection for Workst for Workstations: / :52:55 Local4.Info ( /1440) to Servers: /43032 :Apr 13 08:52:55 PDT: %ASA- session : ( /43032) Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 0:00:00 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 1:00:01 :Apr 13 bytes 08:52: PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:55 Local4.Info :Apr 13 08:52:55 PDT: %ASA- session : %ASA- session : Teardown Built inbound TCP connection TCP connection for Workst for W / :52:55 to Local4.Info Servers: /49155 duration :Apr 1:00: :52:55 bytes 1941 PDT: Connection %ASA- session : timeout Teardown TCP connection for Workst :52:56 08:52:55 Local4.Info :Apr 13 08:52:56 08:52:55 PDT: %ASA- session : Teardown TCP connection for Workst / :52:55 to Local4.Info Servers: / duration 0:00:28 :Apr bytes 13 08:52: TCP PDT: FINs %ASA- session : Teardown TCP connection for Workst :52:56 Local4.Info :Apr 13 08:52:56 PDT: %ASA- session : Teardown TCP connection for Workst / :52:56 to Local4.Info Servers: / duration 0:00:28 :Apr 13 bytes 08:52: PDT: TCP FINs %ASA- session : Teardown TCP connection for Workst :52:56 Local4.Info :Apr 13 08:52:56 PDT: %ASA- session : Teardown TCP connection for Workst

67 Source: :52:52 Local4.Info :Apr 13 08:52:52 PDT: %ASA-session : Built inbound TCP connection for Workstations: /4873 ( /4873) to Servers: /135 ( /135) Normalized: Date/time,Syslog priority,operation,message code,protocol,source IP,Destination IP,Source hostname,destination hostname,source port,destination port,destination service,direction,connections built,connections torn down 13/Apr/ :52:52,Info,Built,ASA-session ,TCP, , ,(empty),(empty), 4873,135,epmap,inbound,1,0

68 $ grepfield - p Built _ _fw_log* aggregate - p - k 6 - c 6 - d \, sort - n - t, - k2 tail , , , ,10753 (empty), , , , , ,

69 10,452,115 events 1.3GB of data 4.5 hours (not even one day) 1 firewall

70 Command-line tools aren t enough

71

72 Simple, tools can be; Data scientist, you need not be.

73 [ { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "135", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "epmap", "Source port": "4873", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" }, { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "43025", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "43025_tcp", "Source port": "4874", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" } ]

74 [ { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "135", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "epmap", "Source port": "4873", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" }, { "Syslog priority": "Info", "Protocol": "TCP", "Destination IP": " ", "Destination port": "43025", "Source IP": " ", "Connections torn down": "0", "Direction": "inbound", "Connections built": "1", "Message code": "ASA-session ", "Date/time": "13/Apr/ :52:52", "Destination service": "43025_tcp", "Source port": "4874", "Destination hostname": "(empty)", "Source hostname": "(empty)", "Operation": "Built" } ] #!/usr/bin/python import csv import json import sys csv_file = open(sys.argv[1],"r") reader = csv.reader(csv_file) header = reader.next() for row in reader: jsondict = {} for i in range(len(header)): jsondict[header[i]] = row[i] print json.dumps(jsondict)

75 mongoimport db.fw.aggregate( [ { $match : { day : "13" } }, # match the first day { $group : { _id : "$src", count : { $sum : 1 } } }, # group and count source { $project : { _id : 0, src : "$_id", count: "$count" } }, # project into structure { $sort : { count : -1, _id : -1 } }, # sort by counts { $limit : 10 } ] ) # show just top 10 "ok" : 1 { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : , "src" : " " }, { "count" : 39931, "src" : "(empty)" }, { "count" : 10753, "src" : " " }, { "count" : 3457, "src" : " " }, { "count" : 2752, "src" : " " }, { "count" : 1558, "src" : " " }

76

77

78

79

80 Source Count , , , , , ,518 Analysis Action: Investigate 174/175

81 Packets over Time...

82 Packets over Time...

83 Use Case #2: Geo-location of IP addresses

84 Some botnets are so big you can see them from space (or at least, Google Earth).

85 F-Secure releases 140,000 ZeroAccess geolocations IN,"18.975, " TR," , " US," , " TR," , " VE,"10.5, " US," , " RO," ,24.35" RO," ,24.35" RO," ,26.9" JP,"35.685, " BR," , " IN,"15.15, " CA," , " IT,"44.8, " US," , " CO,"4.6492, " RO,"46.35,25.8" US," , " PL," , " CA," , " SE," ,17.25" US," , " US," , " CA," ,-73.4"

86 Careful How Data is Parsed

87 Google Maps

88 Not Google Maps alpha = 1/33

89 Population The Story Our Data

90 and to wrap things up...

91

92 Key Learning Points data helps our understanding of our environment solutions are more from thinking than buying visualizations help communicate complexity quickly data visualization is not a natural skill, it must be learned be truthful: message should match the data simple tools can be, data scientist you need not be

93 Bob Jay

Principles of Data Visualization for Exploratory Data Analysis. Renee M. P. Teate. SYS 6023 Cognitive Systems Engineering April 28, 2015

Principles of Data Visualization for Exploratory Data Analysis. Renee M. P. Teate. SYS 6023 Cognitive Systems Engineering April 28, 2015 Principles of Data Visualization for Exploratory Data Analysis Renee M. P. Teate SYS 6023 Cognitive Systems Engineering April 28, 2015 Introduction Exploratory Data Analysis (EDA) is the phase of analysis

More information

Mini-Challenge 3. Data Descriptions for Week 1

Mini-Challenge 3. Data Descriptions for Week 1 Data Sources Mini-Challenge 3 Data Descriptions for Week 1 The data under investigation spans a two week period. This document describes the data available for week 1. A supplementary document describes

More information

This file contains 2 years of our interlibrary loan transactions downloaded from ILLiad. 70,000+ rows, multiple fields = an ideal file for pivot

This file contains 2 years of our interlibrary loan transactions downloaded from ILLiad. 70,000+ rows, multiple fields = an ideal file for pivot Presented at the Southeastern Library Assessment Conference, October 22, 2013 1 2 3 This file contains 2 years of our interlibrary loan transactions downloaded from ILLiad. 70,000+ rows, multiple fields

More information

Edge Configuration Series Reporting Overview

Edge Configuration Series Reporting Overview Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed

More information

CSU, Fresno - Institutional Research, Assessment and Planning - Dmitri Rogulkin

CSU, Fresno - Institutional Research, Assessment and Planning - Dmitri Rogulkin My presentation is about data visualization. How to use visual graphs and charts in order to explore data, discover meaning and report findings. The goal is to show that visual displays can be very effective

More information

Unresolved issues with the course, grades, or instructor, should be taken to the point of contact.

Unresolved issues with the course, grades, or instructor, should be taken to the point of contact. Graphics and Data Visualization CS1501 Fall 2013 Syllabus Course Description With the advent of powerful data-mining technologies, engineers in all disciplines are increasingly expected to be conscious

More information

IPSEC for Windows Packet Filtering

IPSEC for Windows Packet Filtering IPSEC for Windows Packet Filtering David Taylor SR Information Security Specialist University of Pennsylvania [email protected] 215-898-1236 (Revision Date: 14 October 2005) *NOTE* This document is going

More information

Analyzing Call Signaling

Analyzing Call Signaling The Call Signaling Analyzer enables you to isolate faults in calls in your deployment. Call Signaling Analyzer analyzes calls at a high level and then drills down to a lower level within the components

More information

Data journalism: what it can do for you

Data journalism: what it can do for you Data journalism: what it can do for you NCSWA workshop, January 12, 2013 Peter Aldhous, San Francisco Bureau Chief [email protected] Twitter: @paldhous From the ashes of the news industry, a phoenix?

More information

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your

More information

Quantitative Displays for Combining Time-Series and Part-to-Whole Relationships

Quantitative Displays for Combining Time-Series and Part-to-Whole Relationships Quantitative Displays for Combining Time-Series and Part-to-Whole Relationships Stephen Few, Perceptual Edge Visual Business Intelligence Newsletter January, February, and March 211 Graphical displays

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks _Firewall Palo Alto Networks is the next-generation firewalls that enhance your network security and enable any enterprises to look beyond IP addresses and packets. These innovative firewalls let you see

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Good Scientific Visualization Practices + Python

Good Scientific Visualization Practices + Python Good Scientific Visualization Practices + Python Kristen Thyng Python in Geosciences September 19, 2013 Kristen Thyng (Texas A&M) Visualization September 19, 2013 1 / 29 Outline Overview of Bad Plotting

More information

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase, Fortinet 1Fortinet Firewall technologies from Fortinet offer integrated, high-performance protection against today s wide range of threats targeting applications, data and users. Fortinet s firewall technology

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

Introduction to Geographical Data Visualization

Introduction to Geographical Data Visualization perceptual edge Introduction to Geographical Data Visualization Stephen Few, Perceptual Edge Visual Business Intelligence Newsletter March/April 2009 The important stories that numbers have to tell often

More information

CS171 Visualization. The Visualization Alphabet: Marks and Channels. Alexander Lex [email protected]. [xkcd]

CS171 Visualization. The Visualization Alphabet: Marks and Channels. Alexander Lex alex@seas.harvard.edu. [xkcd] CS171 Visualization Alexander Lex [email protected] The Visualization Alphabet: Marks and Channels [xkcd] This Week Thursday: Task Abstraction, Validation Homework 1 due on Friday! Any more problems

More information

Server Load Prediction

Server Load Prediction Server Load Prediction Suthee Chaidaroon ([email protected]) Joon Yeong Kim ([email protected]) Jonghan Seo ([email protected]) Abstract Estimating server load average is one of the methods that

More information

Bridging the gap between COTS tool alerting and raw data analysis

Bridging the gap between COTS tool alerting and raw data analysis Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading

More information

Reports and Logging. PAN-OS Administrator s Guide. Version 6.1

Reports and Logging. PAN-OS Administrator s Guide. Version 6.1 Reports and Logging PAN-OS Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Introduction to Dashboards in Excel 2007. Craig W. Abbey Director of Institutional Analysis Academic Planning and Budget University at Buffalo

Introduction to Dashboards in Excel 2007. Craig W. Abbey Director of Institutional Analysis Academic Planning and Budget University at Buffalo Introduction to Dashboards in Excel 2007 Craig W. Abbey Director of Institutional Analysis Academic Planning and Budget University at Buffalo Course Objectives 1. Learn how to layout various types of dashboards

More information

Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software

Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software LiveAction Application Note Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software January 2013 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. ASA NetFlow Security

More information

NfSen Plugin Supporting The Virtual Network Monitoring

NfSen Plugin Supporting The Virtual Network Monitoring NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments

More information

Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.

Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1. Repsheet A Behavior Based Approach to Web Application Security Aaron Bedra Application Security Lead Braintree Payments Right now, your web applications are being attacked And it will happen again, and

More information

Network Metrics Content Pack for VMware vrealize Log Insight

Network Metrics Content Pack for VMware vrealize Log Insight Network Metrics Content Pack for VMware vrealize Log Insight User Manual Version 2.1 June, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction...

More information

Diagrams and Graphs of Statistical Data

Diagrams and Graphs of Statistical Data Diagrams and Graphs of Statistical Data One of the most effective and interesting alternative way in which a statistical data may be presented is through diagrams and graphs. There are several ways in

More information

Choosing a successful structure for your visualization

Choosing a successful structure for your visualization IBM Software Business Analytics Visualization Choosing a successful structure for your visualization By Noah Iliinsky, IBM Visualization Expert 2 Choosing a successful structure for your visualization

More information

Cisco IOS Flexible NetFlow Command Reference

Cisco IOS Flexible NetFlow Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

PAN-OS Syslog Integration

PAN-OS Syslog Integration PAN-OS Syslog Integration Tech Note Revision M 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Log Formats...3 TRAFFIC...3 Descriptions...3 Subtype Field...5 Action Field...6 Flags Field...6

More information

Using TestLogServer for Web Security Troubleshooting

Using TestLogServer for Web Security Troubleshooting Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part

More information

How To Run Statistical Tests in Excel

How To Run Statistical Tests in Excel How To Run Statistical Tests in Excel Microsoft Excel is your best tool for storing and manipulating data, calculating basic descriptive statistics such as means and standard deviations, and conducting

More information

Network Intrusion Detection Systems. Beyond packet filtering

Network Intrusion Detection Systems. Beyond packet filtering Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs... Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

BIG-IP Access Policy Manager and Splunk Templates

BIG-IP Access Policy Manager and Splunk Templates BIG-IP Access Policy Manager and Splunk Templates Summary BIG-IP Access Policy Manager (APM) provides 28 reports to ease the integration of F5 BIG-IP APM logs and the Splunk reporting system. Three are

More information

MicroStrategy Desktop

MicroStrategy Desktop MicroStrategy Desktop Quick Start Guide MicroStrategy Desktop is designed to enable business professionals like you to explore data, simply and without needing direct support from IT. 1 Import data from

More information

Bill Burton Albert Einstein College of Medicine [email protected] April 28, 2014 EERS: Managing the Tension Between Rigor and Resources 1

Bill Burton Albert Einstein College of Medicine william.burton@einstein.yu.edu April 28, 2014 EERS: Managing the Tension Between Rigor and Resources 1 Bill Burton Albert Einstein College of Medicine [email protected] April 28, 2014 EERS: Managing the Tension Between Rigor and Resources 1 Calculate counts, means, and standard deviations Produce

More information

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some

More information

RIFIS Ad Hoc Reports

RIFIS Ad Hoc Reports RIFIS Ad Hoc Reports To retrieve the entire list of all Ad Hoc Reports, including the Base reports and any additional reports published to your Role, select Ad Hoc for the Type under Filter Report By and

More information

Network Monitoring and Management NetFlow Overview

Network Monitoring and Management NetFlow Overview Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

HOW TO USE DATA VISUALIZATION TO WIN OVER YOUR AUDIENCE

HOW TO USE DATA VISUALIZATION TO WIN OVER YOUR AUDIENCE HOW TO USE DATA VISUALIZATION TO WIN OVER YOUR AUDIENCE + TABLE OF CONTENTS HOW DATA SUPPORTS YOUR MESSAGE 1 Benefits of Data Visualization WHEN TO USE DATA VISUALIZATION HOW TO FIND THE STORY IN YOUR

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

1Checkpoint. 2How Logtrust. Check Point is a firewall network that offers solutions. Logtrust offers to Check Point firewall Networks

1Checkpoint. 2How Logtrust. Check Point is a firewall network that offers solutions. Logtrust offers to Check Point firewall Networks Checkpoint 1Checkpoint Check Point is a firewall network that offers solutions that addresses all your mobile security needs; like advanced threat prevention, web security, and DDoS protection. The firewall

More information

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook

More information

Data Visualization. Scientific Principles, Design Choices and Implementation in LabKey. Cory Nathe Software Engineer, LabKey cnathe@labkey.

Data Visualization. Scientific Principles, Design Choices and Implementation in LabKey. Cory Nathe Software Engineer, LabKey cnathe@labkey. Data Visualization Scientific Principles, Design Choices and Implementation in LabKey Catherine Richards, PhD, MPH Staff Scientist, HICOR [email protected] Cory Nathe Software Engineer, LabKey [email protected]

More information

Visualizing Multidimensional Data Through Time Stephen Few July 2005

Visualizing Multidimensional Data Through Time Stephen Few July 2005 Visualizing Multidimensional Data Through Time Stephen Few July 2005 This is the first of three columns that will feature the winners of DM Review's 2005 data visualization competition. I want to extend

More information

Introduction to Netflow

Introduction to Netflow Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

TABLEAU COURSE CONTENT. Presented By 3S Business Corporation Inc www.3sbc.com Call us at : 281-823-9222 Mail us at : [email protected]

TABLEAU COURSE CONTENT. Presented By 3S Business Corporation Inc www.3sbc.com Call us at : 281-823-9222 Mail us at : info@3sbc.com TABLEAU COURSE CONTENT Presented By 3S Business Corporation Inc www.3sbc.com Call us at : 281-823-9222 Mail us at : [email protected] Introduction and Overview Why Tableau? Why Visualization? Level Setting

More information

Data Visualization Handbook

Data Visualization Handbook SAP Lumira Data Visualization Handbook www.saplumira.com 1 Table of Content 3 Introduction 20 Ranking 4 Know Your Purpose 23 Part-to-Whole 5 Know Your Data 25 Distribution 9 Crafting Your Message 29 Correlation

More information

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS /ABOUT/ME Thomas Chopitea - Incident handler @CertSG Digital forensics & incident response (#DFIR), malware analysis,

More information

Tableau's data visualization software is provided through the Tableau for Teaching program.

Tableau's data visualization software is provided through the Tableau for Teaching program. A BEGINNER S GUIDE TO VISUALIZATION Featuring REU Site Collaborative Data Visualization Applications June 10, 2014 Vetria L. Byrd, PhD Advanced Visualization, Director REU Coordinator Visualization Scientist

More information

Extreme Networks: A SOLUTION WHITE PAPER

Extreme Networks: A SOLUTION WHITE PAPER Extreme Networks: The Purview Solution Integration with SIEM Integrating Application Management and Business Analytics into other IT management systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview

More information

Introduction to Data Visualization

Introduction to Data Visualization Introduction to Data Visualization STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat/stat133 Course web: gastonsanchez.com/teaching/stat133 Graphics

More information

The importance of graphing the data: Anscombe s regression examples

The importance of graphing the data: Anscombe s regression examples The importance of graphing the data: Anscombe s regression examples Bruce Weaver Northern Health Research Conference Nipissing University, North Bay May 30-31, 2008 B. Weaver, NHRC 2008 1 The Objective

More information

NetFlow Analytics for Splunk

NetFlow Analytics for Splunk NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...

More information

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring

More information

Assets, Groups & Networks

Assets, Groups & Networks Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Data sent from Firewall Analyzer is normally not encrypted and hence is readable if intercepted.

Data sent from Firewall Analyzer is normally not encrypted and hence is readable if intercepted. I don't have a firewall, proxy server, or Radius server. Can I still use this product? You can still use Firewall Analyzer to simulate firewall logs and see how reports will look like when real-time data

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2 BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts

More information

Capacity Management Plan

Capacity Management Plan Capacity Management Plan Hughes is selected for two categories to provide service: Fixed Satellite Services Small Office/Home Office (SOHO) services In the context of those two services categories, for

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty Offensive & Defensive & Forensic Techniques for Determining Web User Iden

More information

A10 Networks Load Balancer

A10 Networks Load Balancer McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: A10 Networks Load Balancer January 26, 2015 A10 Networks Load Balancer Page 1 of 8 Important Note: The information contained

More information

When to use Excel. When NOT to use Excel 9/24/2014

When to use Excel. When NOT to use Excel 9/24/2014 Analyzing Quantitative Assessment Data with Excel October 2, 2014 Jeremy Penn, Ph.D. Director When to use Excel You want to quickly summarize or analyze your assessment data You want to create basic visual

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

Designing Information Displays. Overview

Designing Information Displays. Overview Designing Information Displays Claremont Graduate University Professional Development Workshop August 23, 2015 Tarek Azzam Ph.D. 8 6 4 2 0-2 -4-6 Site 5 Site 7 Site 1 Site 4 Site 2 Site 3 Site 6 Overview

More information

Summarizing and Displaying Categorical Data

Summarizing and Displaying Categorical Data Summarizing and Displaying Categorical Data Categorical data can be summarized in a frequency distribution which counts the number of cases, or frequency, that fall into each category, or a relative frequency

More information

Security visualisation

Security visualisation Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco

More information

Common Event Format. Imperva SecureSphere July 27, 2009

Common Event Format. Imperva SecureSphere July 27, 2009 Common Event Format Imperva SecureSphere July 27, 2009 CEF Connector Configuration Guide Imperva SecureSphere April 26, 2009 Revision History Date Description 04/26/2009 First edition of this Configuration

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Reports and Logging. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Reports and Logging. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Reports and Logging Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

CARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4

CARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4 Table Of Contents INTRODUCTION... 4 About Cyberoam Aggregated Reporting and Logging... 5 INSTALLATION AND SETUP... 6 System Requirements... 6 Prerequisites... 8 Installing and Uninstalling... 10 Starting

More information

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

VISIBLY BETTER RISK AND SECURITY MANAGEMENT VISIBLY BETTER RISK AND SECURITY MANAGEMENT Mason Hooper Practice Manager, SIEM Solutions, McAfee APAC December 13, 2012 Oct 17 10:00:27, Application=smtp, Oct 17 10:00:27, Application=smtp, Event='Email

More information

Network at CERN. Large Scale

Network at CERN. Large Scale Monitoring i the ATLAS TDAQ Network at CERN Lucian LEAHU Brasov, 15/01/2009 Large Scale 3000 nodes, 200 edge switches, 5 core routers 6000 ports 2 1 Plus physicists! Network dimensioned to meet requirements

More information

"Excel with Excel 2013: Pivoting with Pivot Tables" by Venu Gopalakrishna Remani. October 28, 2014

Excel with Excel 2013: Pivoting with Pivot Tables by Venu Gopalakrishna Remani. October 28, 2014 Teaching Excellence and Innovation 1 Pivot table Pivot table does calculations with criteria Data should be arranged as : Field names in the first rows, records in rows No blank rows or blank columns should

More information

Flow Visualization Using MS-Excel

Flow Visualization Using MS-Excel Flow Visualization Using MS-Excel Visualization for the Common Man Presented by Lee Rock and Jay Brown US-CERT Analysts Einstein Program Background US-CERT Mission Einstein Program > Large volumes of traffic

More information

MetroBoston DataCommon Training

MetroBoston DataCommon Training MetroBoston DataCommon Training Whether you are a data novice or an expert researcher, the MetroBoston DataCommon can help you get the information you need to learn more about your community, understand

More information

Network setup and troubleshooting

Network setup and troubleshooting ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

MARS STUDENT IMAGING PROJECT

MARS STUDENT IMAGING PROJECT MARS STUDENT IMAGING PROJECT Data Analysis Practice Guide Mars Education Program Arizona State University Data Analysis Practice Guide This set of activities is designed to help you organize data you collect

More information

Part 2: Data Visualization How to communicate complex ideas with simple, efficient and accurate data graphics

Part 2: Data Visualization How to communicate complex ideas with simple, efficient and accurate data graphics Part 2: Data Visualization How to communicate complex ideas with simple, efficient and accurate data graphics Why visualize data? The human eye is extremely sensitive to differences in: Pattern Colors

More information

Information visualization examples

Information visualization examples Information visualization examples 350102: GenICT II 37 Information visualization examples 350102: GenICT II 38 Information visualization examples 350102: GenICT II 39 Information visualization examples

More information

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on

More information

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc. Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4

More information

Exercise 1: How to Record and Present Your Data Graphically Using Excel Dr. Chris Paradise, edited by Steven J. Price

Exercise 1: How to Record and Present Your Data Graphically Using Excel Dr. Chris Paradise, edited by Steven J. Price Biology 1 Exercise 1: How to Record and Present Your Data Graphically Using Excel Dr. Chris Paradise, edited by Steven J. Price Introduction In this world of high technology and information overload scientists

More information

VMware vcenter Log Insight User's Guide

VMware vcenter Log Insight User's Guide VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

Best Practices in Data Visualizations. Vihao Pham 2014

Best Practices in Data Visualizations. Vihao Pham 2014 Best Practices in Data Visualizations Vihao Pham 2014 Agenda Best Practices in Data Visualizations Why We Visualize Understanding Data Visualizations Enhancing Visualizations Visualization Considerations

More information