Device groupsΒΆ
Plixer Scrutinizer supports multiple user-defined entity grouping schemes, which can further enhance the way teams monitor, visualize, and derive insights from network data.
- IP groups
IP groups can be used to categorize similar (e.g., device type, ownership/department, geolocation, etc.) flow-exporting devices for use in reports, filters, and FA algorithm exclusion rules. Plixer Scrutinizer factory configuration includes default IP groups that should be populated as part of tailoring the system to the environment.
IP group definitions can be created/managed from the Admin > Definitions > IP Groups page.
- Mapping groups
Mapping groups consist of devices that have been grouped together for the purpose of network mapping. Network maps will show network topology up to the interface level (i.e., not including endpoints) and can be tailored to a wide range of use cases using customizable elements.
The Monitor > Network Maps page is the primary interface for customizing and viewing network maps, while additional management options for mapping groups and map objects can be accessed via their respective pages under Admin > Settings.
- Security groups
Security groups are device groups that can be used to enable one or more FA algorithms for exporters of the same type. The Plixer Scrutinizer factory configuration includes predefined security groups, which can be populated to automatically enable the recommended algorithms for the indicated device type.
Security groups can be created/managed from the Admin > Alarm Monitor > Security Groups page.