Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Overall search time decreased drastically.

  • Packet list view added.

  • Improved visual clarity on IP highlight, double clicked nodes, and hostname match functionality. (Click here for more information)

  • Smoother network visual transitions and increased render capacity.

  • Able to generate top talker reports from interactive search. Downloads two csv CSV files that contain node and protocol data.

  • DNS Resolution (Click here for more information).

...

(Click here for more information).

Malicious Nodes

Malicious Node match (Nodes that appear in IP and Domain Reputation Center || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence black list are listed as Potentially Malicious nodes, and are highlighted in red. Additionally the IP column of malicious nodes will be linked to the Talos lookup page in the packet list layout. (Click here for more information).

...

Flow Analysis and DNS/HTTP Reports

  • Flow Analysis dashboard processes data faster.

  • Issue where downloading a stream from flow analysis also populated the interactive search fields.

  • Data table export as CSV.

  • Delete/clear metadata.

  • Download report.

...

Usage Analysis

  • JSON has been changed to Export CSV. (Click here for more information).

...

Admin

  • The new admin page can be accessed in the drop-down in the side control panel

  • Admin is also now able to see through all the interactive search history of all users, and - export the search records out to a CSV.

  • Admin is able to adjust the timeout session of users with 'user' Role.

  • Some PureInsight settings have been restricted to only the Admin user.

  • Fixed error messages that were not appearing on CSR form.

  • CSR form now returns the CSR (certificate signing request) file and the private key used to sign this form in a zip file.

  • Uploading a certificate to PureInsight requires the Certificate file and the private key. Users must also specify a backup folder to back up the old configuration.