Plixer Scrutinizer terms and conceptsΒΆ

Alarm Policy
Rule sets that define what types of network behavior or activity should be monitored as Events and trigger Alarms
Flow Analytics
A library of field-tested algorithms used to analyze network behavior, detect unexpected activity, and report Events and Alarms
IPFIXify
A software agent that reads text-based logs, syslog messages, Windows EventLogs and various other types of data sources and sends the information in flows using the IPFIX protocol
Plixer ML Engine
The core module behind PSI and PNI that is designed to to ingest and process extremely large volumes of flow data
Plixer Network Intelligence (PNI)
A machine-learning-powered add-on component for Plixer Scrutinizer that analyzes collected flow data to identify utilization trends, streamline investigative workflows, and predict future capacity needs

Plixer Security Intelligence (PSI) A machine-learning-powered add-on component for Plixer Scrutinizer that ingests and interrogates collected flow data to automatically detect and report potential security threats

Protocol Exclusions
Defines protocols to exclude during the collection process per Exporter, Exporter interface, and/or all Exporters and interfaces

Reverse-Path Filtering Allows Collectors to receive non-local traffic that may have been forwarded by a proxy or flow replication solution, such as Plixer Replicator

SAF (Summary and Forensic)
An optimized system of storing flow data that uses summary tables to condense collected information without compromising transparency or accuracy
TI (Threat Index)
A single value comprised of events with different weights that age out over time