Plixer Scrutinizer terms and conceptsΒΆ

Alarm Policy

Rule sets that define what types of network behavior or activity should be monitored as Events and trigger Alarms

Flow Analytics

A library of field-tested algorithms used to analyze network behavior, detect unexpected activity, and report Events and Alarms

IPFIXify

A software agent that reads text-based logs, syslog messages, Windows EventLogs and various other types of data sources and sends the information in flows using the IPFIX protocol

Plixer ML Engine

The core module behind PSI and PNI that is designed to to ingest and process extremely large volumes of flow data

Plixer Network Intelligence (PNI)

A machine-learning-powered add-on component for Plixer Scrutinizer that analyzes collected flow data to identify utilization trends, streamline investigative workflows, and predict future capacity needs

Plixer Security Intelligence (PSI) A machine-learning-powered add-on component for Plixer Scrutinizer that ingests and interrogates collected flow data to automatically detect and report potential security threats

Protocol Exclusions

Defines protocols to exclude during the collection process per Exporter, Exporter interface, and/or all Exporters and interfaces

Reverse-Path Filtering Allows Collectors to receive non-local traffic that may have been forwarded by a proxy or flow replication solution, such as Plixer Replicator

SAF (Summary and Forensic)

An optimized system of storing flow data that uses summary tables to condense collected information without compromising transparency or accuracy

TI (Threat Index)

A single value comprised of events with different weights that age out over time