FlowPro Online Documentation

FlowPro Online Documentation#

Getting started#

Virtual appliances

Deploy your ESXi, Hyper-V, or KVM virtual appliance

Virtual appliances

Hardware appliance

Deploy your hardware appliance

Hardware appliance

Appliance setup

Complete initial setup and licensing after deployment

Initial configuration

Using FlowPro#

Custom rules

Enable and manage NIDS rules on FlowPro and custom Suricata rules

Custom rules

Rule updates

Manage and customize Suricata rules

Rule updates

Selective packet capture

Configure FlowPro to capture specific network packets for targeted traffic analysis

Selective packet capture

FlowPro exclusions

Exclude trusted hosts or networks from FlowPro detections

FlowPro exclusions

Untrusted domain lists

Configure domain reputation rules using external or custom domain lists for threat detection

Untrusted domain lists

ERSPAN

Configure ERSPAN to mirror and route traffic over GRE to the FlowPro monitor interface

ERSPAN

Advanced Services#

Version upgrades

Upgrade procedures and instructions

Version upgrades

Help and references#

Changelog

Version history and release notes

FlowPro changelogs

Glossary

Glossary of terms used in FlowPro

Glossary

Attributions

Open source and third-party licenses

Third-party atttributions

About FlowPro

FlowPro is an advanced module of the Plixer One platform that delivers network visibility and actionable insights across both performance and security. It allows your team to capture, analyze, and forward enriched flow data even in environments with infrastructure constraints.

  • Selective packet capture for targeted traffic analysis

  • Event detection using a threat feed and custom NIDS rules

  • DNS monitoring, including:

    • Identifying domains likely associated with malware

    • Analyzing DNS Start of Authority and DNS TXT messaging to identify potentially suspicious behavior

    • Supporting user-defined domain whitelists and blacklists

  • Malware and botnet detection, including:

    • Monitoring for data exfiltration and command-and-control traffic

    • TLS and JA3 signature reporting

    • Reporting on HTTP connections and transferred file hashes