In this video, we will go through the installation of Splunk on Ubuntu
In this video, we’re going to dig into policy layers, tuning, event suppression, and dynamic rule changes in Firepower.
In this video, I’m going to walk through the Stealthwatch WebUI and touch on the swing client a little.
This is just a quick video talking about how we could define custom applications inside of Stealthwatch
In this video, we're going to be integrating Active Directory with Stealthwatch. You may think you know what this means but it's not IP-to-User binding. Check out the video for more detail.
In this video, we continue our pxGrid configuration to perform rapid threat containment between ISE and Stealthwatch
In this video, we're going to integrate ISE and Stealthwatch via pxGrid and share contextual information. Part 2 will dig into configuring adaptive network control with Stealthwatch and ISE.
In this video, we’re going to configure SNMP for the exporters on Stealthwatch. While it might not seem like a big deal, this will help with ensuring that the interface names and speeds are correctly showing in the Stealthwatch Management Console.
This is going to be a really short video. I’m going to walk through the configuration of ETA on my CSR1000v. As of IOS-XE version 16.6.2, support for ETA was added on ISR and CSR routers.
In this video, we’re going to be configuring Netflow and ETA on the Catalyst 9K. After we’ve completed that, we’ll do a little walkthrough of Cognitive Threat Analytics and ETA.
In this video, I'm just upgrading my Catalyst 9300 and looking at some basic syntax changes. It's not a security video but I figured I'd record it anyways.
In this video, we’ll be going to be configuring Netflow on FTD for Stealthwatch
In this video, we’ll be going over the configuration of Netflow on my router for Stealthwatch.
In this video, I'm going to be configuring my switches with a compatible Netflow configuration for Stealthwatch
In this video, I'll be exploring some of the uses of Stealthwatch and going over the security policy.
In this video, we’ll be going over how appliance administration is different in Stealthwatch 7.0 and the new apps feature in Stealthwatch.
In this video, I'll go over the components of Stealthwatch and install both the Steathwatch Management Console and Flowcollector in my lab.
It’s been awhile since I updated my blog and videos. I know there’s been a lot of changes to Cisco Security products. Since I have to rebuild my lab anyways, I wanted to update some of these posts and videos. Expect a lot more videos coming from me over the course of the next few weeks.
Since Tetration has visibility both inside the endpoint and the traffic flowing through the network, it gives us some amazing forensic analysis capabilities. In this post, we will review some of these powerful capabilities but this is far from all of the forensic features in Tetration.
Before making any policy changes, one usually would want to be able to analyze how it would impact traffic. Tetration has the ability to simulate and validate policy before applying changes using its Policy Analysis feature.