Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Interactive Search

Work Flow

  1. Log in PureInsight

  2. Interactive Search

  3. Check node details

  4. Double-click neighbors to fill out Inline Search criteria

  5. Run Search

  6. Change the graph layout to see the network toptalkers

  7. Slide the “Current Devices Shown” slide

  8. Change Packet Display Limit

  9. Search with Inline Seach: udp

  10. Click the “Result” button to download the output PCAP file

  11. Open the file on Wireshark to do further investigation

  12. Click the “Reports” button to download the node reports CSV

interactive search.mp4

Usage Analysis

Work Flow

  1. Usage Analysis

  2. Change Stream Display Limit

  3. Hover over a host to see the detailed information

  4. Change the stream layout

  5. Click the “Export CSV” button to download the file

  6. From the tooltip, click the “Search” button and the page will direct users to Interactive Search

  7. Inline Search is filled with information

  8. Run the Interactive Search

usage analysis.mp4

Malicious Nodes

Work Flow

malicious nodes.mp4

PCAP Monitoring

pcap monitoring.mp4

VLAN Strip

vlan strip.mp4

VLAN Strip Inner IP Outer ETH

vlan strip inner ip outer eth.mp4

  File Modified
No files shared here yet.

  • No labels