Back to Browse

VRadar Tutorial — Episode 14: Network Traffic Analysis

May 12, 2026
1:08

In this episode, we look at the Network Monitoring tab using Suricata I D S. Open the Network tab. Suricata ships with over fifty thousand detection signatures, inspecting every packet across HTTP, DNS, TLS, SMB, FTP, RDP protocols. The dashboard shows realtime traffic with flow charts. Below is the list of detected network events, classified as: malware, exploit, scan, brute force, or protocol anomaly. Each event shows source I P, destination, port, signature ID, and description. Click an event to see the full packet capture. Filters let you query by I P, port, protocol, or time range. Data persists ninety days in ClickHouse for retrospective analysis. This is the early-detection layer before attacks reach the endpoint. 🌐 Sign up: https://vradar.io 📧 Support: [email protected] 📺 Playlist: VRadar Tutorial Series (English) Tutorial series for VRadar — Vietnam's SOC SaaS platform. 18 episodes from login to post-quantum PQ-Agent install. #VRadar #tutorial #SOC #cybersecurity #Wazuh #English

Download

0 formats

No download links available.

VRadar Tutorial — Episode 14: Network Traffic Analysis | NatokHD