Additional settings

Plixer Scrutinizer’s flow analytics functions can be further adapted to more unique network and/or security requirements through the configuration options below.

Global settings

The following global settings (Admin > Settings > Flow Analytics Settings) can be used to enable or configure additional FA-based features:

Setting

Description

Auto-Enable Defender

When checked, Plixer FlowPro Defender is automatically enabled for algorithms that support it.

Jitter by Interface

Sets the variation in packet delay due to queueing, contention, and/or serialization (Default: 80 ms);
Also used for record highlighting in Status reports

Latency

Sets the latency value used for record highlighting in Status reports (Default: 75 ms)

Share Violations

When checked, allows the system to share details of cyber attacks coming from Internet IP addresses with the Plixer Security Team (May require firewall permissions);
This information is used to further improve the global host reputation list. No internal addresses will be shared.

Top Algorithm Devices

Controls whether Top X FA algorithms are applied to all exporters or need to be configured individually

Algorithm settings

In addition to inclusions and exclusions, most FA algorithms have additional settings that control how they are applied to collected flow data. These settings include thresholds for adjusting detection sensitivity and traffic directionality inclusion/exclusion options.

For a full list of algorithm settings, see this table.

Custom reputation lists

The Host Reputation FA algorithm is capable of using custom lists in conjunction with Plixer Scrutinizer’s default host reputation lists. When a host in any reputation list becomes the target of traffic, the event is reported under the Host Reputation alarm policy.

To import a list of IP addresses as a custom host reputation list, follow these steps:

  1. Add the hosts to a file, using one line for each IP address.

    Example:

    10.1.1.1
    10.1.1.2
    10.1.1.3
    
  2. Save the file with a .import extension. (e.g., custom_threats.import)

    Important

    The name of the file will be used for artifacts involving the included hosts on the Alarm Summary page.

  3. Move the file to the \scrutinizer\files\threats\ directory.

The file is imported hourly, at the same time that threat lists are updated.

Hint

To manually run the file import operation, use the command scrut_util --downloadhostreputationlists.