{"id":727,"date":"2018-07-15T23:09:36","date_gmt":"2018-07-15T22:09:36","guid":{"rendered":"http:\/\/www.balajibandi.com\/?p=727"},"modified":"2023-01-14T19:13:42","modified_gmt":"2023-01-14T19:13:42","slug":"cisco-stealthwatch-understanding-my-way","status":"publish","type":"post","link":"https:\/\/www.balajibandi.com\/?p=727","title":{"rendered":"Cisco Stealthwatch Understanding My way"},"content":{"rendered":"<h1><span style=\"text-decoration: underline; color: #3366ff;\"><strong>Cisco Stealthwatch Understanding My way<\/strong><\/span><\/h1>\n<p>Cisco Stealthwatch drastically enhances threat defence by giving detailed network visibility and security analytics. It helps you know every host, record every conversation, understand what is normal, it alerts you to change, and enables you to respond to threats quickly.<\/p>\n<p>With Cisco Stealthwatch and its enhanced analytics capabilities, you can better understand whether encrypted traffic on the network is malicious. The enhanced network telemetry from the latest Cisco routers and switches is collected by Cisco\u00a0Stealthwatch Enterprise. It uses advanced entity modeling and multilayered machine learning, constantly identifying who is on the network and what they are doing, and can detect anomalous behavior in real time to identify threats.<\/p>\n<p id=\"rSijpxe\"><img loading=\"lazy\" decoding=\"async\" width=\"525\" height=\"465\" class=\"alignnone size-full wp-image-728 \" src=\"http:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/img_5bcb0313a73f7.png\" alt=\"\" srcset=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/img_5bcb0313a73f7.png 525w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/img_5bcb0313a73f7-300x266.png 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/p>\n<p><strong>Various connection with port information :<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/static1.squarespace.com\/static\/565b775de4b02fbb0a4961df\/t\/574c87d5859fd022e5b1f8a4\/1470786964012\/?format=750w\" \/><\/p>\n<p id=\"MxxfLkZ\">\n<p><strong>These are the primary features of Stealthwatch:<\/strong><\/p>\n<p>Deep visibility across the network perimeter, interior, data center, and private and public cloud<br \/>\nSimplified understanding of normal network behavior through the use of NetFlow<br \/>\nContinuous monitoring of devices, applications, and users throughout your distributed networks<br \/>\nIn-depth forensic investigations and post-incident response with contextual threat intelligence and detailed, historic audit trails of NetFlow data<br \/>\nEasy integration with your existing network infrastructure (compatible with non-Cisco telemetry), Cisco Security Packet Analyzer, Cisco ASA Firewalls, Cisco ISE, Cisco TrustSec technology-supported hardware, and a variety of other security solutions, all available through Cloud Network Solutions .<\/p>\n<p>Cisco Stealthwatch Enterprise Components<\/p>\n<p>Cisco Stealthwatch Management Console<br \/>\nThe console coordinates, manages, and configures Stealthwatch appliances deployed at various segments throughout your enterprise. The management console can also collect data from other types of technologies, including firewalls, web proxies, network access control (NAC) systems, and more. Disparate IT teams can easily obtain pervasive network visibility and actionable security intelligence to detect and prioritize security threats through a single viewpoint. The console is available as a hardware appliance or a virtual machine.<br \/>\nFeatures include:<br \/>\n\u2022 In-depth visibility and behavior-based context defends against APTs, malware, insider threats, worms, viruses, targeted attacks, DDoS attempts, and evolving attacks. Advanced detection capabilities decrease the time between threat onset and resolution.<br \/>\n\u2022 Real-time telemetry delivers data flow for monitoring traffic across hundreds of network segments simultaneously to detect suspicious network behavior.<br \/>\n\u2022 Robust network intelligence facilitates performance monitoring, capacity planning, and enhances network management. It also reduces time-consuming and resource-intensive manual analysis often associated with other vendors.<br \/>\n\u2022 Network groupings, graphical representations, and relationship maps deliver simple views of your organization\u2019s traffic within seconds, illustrating where to focus your attention.<br \/>\n\u2022 Multiple alarm categories and context-based alerts on the home dashboard provide quick assessments of your organization\u2019s security posture. This allows for decisive action to mitigate potential damage.<br \/>\n\u2022 Scalable functionality performs well in high-speed environments and can protect every part of the network that is accessible by IPs, regardless of size.<\/p>\n<p>Cisco Stealthwatch Flow Collector<br \/>\nThe flow collector collects and analyzes massive amounts of network data from your current devices. The result is visibility and security intelligence across physical and virtual environments, improving incident response. Flow Collector provides cost-effective behavioral analytics and advanced security context. This enables early anomaly detection, quick root-cause determination, and enhanced protection for a wide range of threats, including APTs, insider threats, DDoS, and zero-day malware. The solution is available as a hardware appliance or a virtual machine.<br \/>\nFeatures include:<br \/>\n\u2022 Flow-based anomaly detection pinpoints unusual behavior and immediately sends an alarm with actionable intelligence, promoting quick and decisive mitigation.<br \/>\n\u2022 Stitched, duplicated, and 1:1 flows simplify network and security monitoring. In addition to detecting anomalies in real time, the solution can store years of data, creating a complete audit trail to improve forensic investigations and compliance.<br \/>\n\u2022 Easy upgrading allows you to start small and expand as your capacity needs change. At full scale, Flow Collector can process data from as many as 50,000 flow sources at up to 6 million flows per second (fps).<\/p>\n<p>Cisco Stealthwatch Flow Sensor<\/p>\n<p>This component provides robust visibility of network, application, and server performance metrics. The flow sensor gives you a cost-effective method of troubleshooting both security incidents and application performance problems, while eliminating dangerous network blind spots. It can provide Layer 7 application information for environments where Cisco Network-Based Application Recognition (NBAR) is disabled. The solution is available as hardware appliances or as software for monitoring virtual machine environments.<br \/>\nFeatures include:<br \/>\n\u2022 Network anomaly alerts pinpoint unusual behavior and immediately send alarms with contextual intelligence, allowing you to act quickly and mitigate damage.<br \/>\n\u2022 URL data allows administrators to see exactly which websites users are going to, including the file path. This improves the identification of applications causing performance or security problems.<br \/>\n\u2022 Enhanced operational efficiency reduces costs by identifying and isolating the root cause of an issue or incident within seconds.<\/p>\n<p>UDP Director<\/p>\n<p>The UDP Director simplifies the collection and distribution of network and security data across the enterprise. It helps reduce the processing power on network routers and switches by receiving essential network and security information from multiple locations and then forwarding it to a single data stream to one or more destinations.<br \/>\nFeatures include:<br \/>\n\u2022 Reduces unplanned downtime and service disruption on the high availability UDP Director 2200 appliance.<br \/>\n\u2022 Simplifies network security and monitoring by providing a single standard destination for NetFlow, SFlow, syslog, and SNMP information.<br \/>\n\u2022 Directs UDP data from any UDP application to one or more destinations, duplicating the data if required.<\/p>\n<p>StealthwatchSystem Components<\/p>\n<p>-StealthwatchManagement Console<\/p>\n<p>. Management and reporting<br \/>\n\u2022Up to 25 Flow Collectors<br \/>\n\u2022Up 6 million fps globally<br \/>\n\u20222 physical and virtual models<br \/>\n\u2022High Availability<\/p>\n<p>Cisco Security Packet Analyzer<br \/>\n\u2022Rolling full packet capture<br \/>\n\u20222 physical models<\/p>\n<p>&#8211; StealthwatchFlow Collector<\/p>\n<p>. Collect and analyze<br \/>\n\u2022Up to 4000 exporters<br \/>\n\u2022Up to sustained 240,000 fps<br \/>\n\u20224 physical and 3 virtual models<\/p>\n<p>&#8211;\u00a0StealthwatchFlow Sensor<br \/>\n\u2022Generate IPFIX from SPAN\/TAP<br \/>\n\u2022Contextual fields (ex. App,URL,SRT,RTT)<br \/>\n\u2022Physical and virtual models<\/p>\n<p>UDP Director<br \/>\n\u2022UDP Packet copier<br \/>\n\u2022Forward to multiple destinations<br \/>\n\u2022High Availability<br \/>\n\u20222 physical and virtual models<\/p>\n<p>Endpoint License Concentrator<br \/>\n\u2022Collect AnyConectNVM flow data and forward to Flow Collector<br \/>\n\u2022Virtual Appliance<\/p>\n<p>Cloud License Concentrator<br \/>\n\u2022Collect flow data from Cloud License Agents and forward<\/p>\n<p>Here are a few more of the many benefits you will gain when you implement Cisco Stealthwatch.<\/p>\n<ol>\n<li>Gain visibility across all network conversations, including east-west and north-south traffic, to detect both internal and external threats<\/li>\n<li>\u00a0 \u00a0Drastically simplify your network segmentation, performance monitoring, and your capacity planning<\/li>\n<li><span style=\"font-size: 1rem;\">Conduct advanced security analytics and obtain in-depth context to detect a wide range of anomalous behaviors that may signify an attack<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">Ensure enterprise compliance by identifying the extent as well as the quality of encryption in the network<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">Accelerate and improve threat detection, forensics, and incident response across your entire network, including encrypted traffic<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">Achieve far greater visibility and and anomaly detection with advanced and accurate global and local traffic correlation<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">Enable deeper forensic investigations with audit histories of network activity<\/span><\/li>\n<li><span style=\"font-size: 1rem;\">Identify insider threats by obtaining contextual information from cloud services<\/span><\/li>\n<\/ol>\n<p>Dashboard :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-731\" src=\"http:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/stealth-300x157.jpg\" alt=\"\" width=\"697\" height=\"365\" srcset=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/stealth-300x157.jpg 300w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/stealth-768x402.jpg 768w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/stealth-1024x536.jpg 1024w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2018\/10\/stealth.jpg 1216w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/p>\n<p>I will be soon going to make my hands dirty with stealth watch in my lab environment soon and real time example post soon..happy labbbing&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.!!!!!!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco Stealthwatch Understanding My way Cisco Stealthwatch drastically enhances threat defence by giving detailed network visibility and security analytics. It helps you know every host, record every conversation, understand what is normal, it alerts you to change, and enables you to respond to threats quickly. With Cisco Stealthwatch and its enhanced analytics capabilities, you can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,2],"tags":[],"class_list":["post-727","post","type-post","status-publish","format-standard","hentry","category-ccie-sec","category-cisco"],"_links":{"self":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=727"}],"version-history":[{"count":3,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/727\/revisions"}],"predecessor-version":[{"id":1820,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/727\/revisions\/1820"}],"wp:attachment":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}