Plixer Scrutinizer terms and conceptsΒΆ
- Alarm Policy
Rule sets that define what types of network behavior or activity should be monitored as Events and trigger Alarms
- Flow Analytics
A library of field-tested algorithms used to analyze network behavior, detect unexpected activity, and report Events and Alarms
- IPFIXify
A software agent that reads text-based logs, syslog messages, Windows EventLogs and various other types of data sources and sends the information in flows using the IPFIX protocol
- Plixer ML Engine
Software component providing AI capabilities to allow the ingestion and processing of extremely large volumes of flow data for intelligent anomaly and threat detection
- Protocol Exclusions
Defines protocols to exclude during the collection process per Exporter, Exporter interface, and/or all Exporters and interfaces
- Reverse-Path Filtering
Allows Collectors to receive non-local traffic that may have been forwarded by a proxy or flow replication solution, such as Plixer Replicator
- SAF (Summary and Forensic)
An optimized system of storing flow data that uses summary tables to condense collected information without compromising transparency or accuracy
- TI (Threat Index)
A single value comprised of events with different weights that age out over time