Plixer Scrutinizer terms and conceptsΒΆ
- Alarm Policy
Rule sets that define what types of network behavior or activity should be monitored as events and trigger alarms
- Collectors
SIEMs, flow collectors, SNMP trap receivers, and other network management systems that capture, analyze, and report on flow data sent by exporters
- EULA (End-User License Agreement)
A legal agreement between Plixer Scrutinizer and the user, outlining the terms and conditions, including usage rights, restrictions, and liability limitations
- Exporters
Network devices, such as routers, switches, or servers that can send traffic/activity logs as flows to external systems, such as Plixer Replicator and Plixer Scrutinizer
- Flow Analytics
A library of field-tested algorithms used to analyze network behavior, detect unexpected activity, and report events and alarms
- IPFIXify
A software agent that reads text-based logs, syslog messages, Windows EventLogs and various other types of data sources and sends the information in flows using the IPFIX protocol
- Plixer ML Engine
Software component providing AI capabilities to allow the ingestion and processing of extremely large volumes of flow data for intelligent anomaly and threat detection
- Protocol Exclusions
Defines protocols to exclude during the collection process per exporter, exporter interface, and/or all exporters and interfaces
- Reverse-Path Filtering
Allows collectors to receive non-local traffic that may have been forwarded by a proxy or flow replication solution, such as Plixer Replicator
- SAF (Summary and Forensic)
An optimized system of storing flow data that uses summary tables to condense collected information without compromising transparency or accuracy
- TI (Threat Index)
A single value comprised of events with different weights that age out over time