This is just a quick video talking about how we could define custom applications inside of Stealthwatch
Active Directory Integration with Stealthwatch
Stealthwatch and ISE Integration via pxGrid - Part 2
Stealthwatch and ISE Integration via pxGrid - Part 1
Configuring SNMP for Exporters on Stealthwatch
Configuring ETA on Routers
Configuring Netflow and Encrypted Threat Analytics on the Catalyst 9K
Catalyst 9300 Switch IOS Upgrade
FTD Netflow Configuration for Stealthwatch
Router Netflow Configuration for Stealthwatch
Switch Netflow Configuration for Stealthwatch
Overview of Stealthwatch Policies and Use Cases
Stealthwatch 7.0 Appliance Administration
Installing Stealthwatch 7.0
ISE 2.6 Policy Sets & Using Network Device Groups
Tetration - Forensics and Alerts
Tetration - Policy Analysis
Tetration - Dynamic Policies and Vulnerability Detection
Tetration - More Application Mapping and Policy Creation
We previously went into application mapping in this blog post and we will delve into it further in this post to explain how that application mapping is used to create whitelists that can be used for micro-segmentation.
Vendor Specific RADIUS Dictionaries for ISE
I took some time to import and update quite a bit of RADIUS vendor dictionaries for 3rd party vendors into ISE. I grabbed this information from various community and open source sites but I obviously can't test it against every vendor out there since I don't have a selection of 140+ 3rd party NADs sitting in my lab. After I imported them to ISE, I exported them and have uploaded them here.