VRadar Tutorial — Episode 14: Network Traffic Analysis
In this episode, we look at the Network Monitoring tab using Suricata I D S. Open the Network tab. Suricata ships with over fifty thousand detection signatures, inspecting every packet across HTTP, DNS, TLS, SMB, FTP, RDP protocols. The dashboard shows realtime traffic with flow charts. Below is the list of detected network events, classified as: malware, exploit, scan, brute force, or protocol anomaly. Each event shows source I P, destination, port, signature ID, and description. Click an event to see the full packet capture. Filters let you query by I P, port, protocol, or time range. Data persists ninety days in ClickHouse for retrospective analysis. This is the early-detection layer before attacks reach the endpoint. 🌐 Sign up: https://vradar.io 📧 Support: [email protected] 📺 Playlist: VRadar Tutorial Series (English) Tutorial series for VRadar — Vietnam's SOC SaaS platform. 18 episodes from login to post-quantum PQ-Agent install. #VRadar #tutorial #SOC #cybersecurity #Wazuh #English
Download
0 formatsNo download links available.