Popular Articles
Some Common High-Risk Ports
In PacketViper we will often use deception and dynamic perimeter technology to trap, observe, alert, and respond to certain patterns of traffic. One of the most invaluable tools in that sort of pattern analysis is the target or destination port that ...
Send PacketViper logs to 3rd party Event Manager
PacketViper can be configured to forward its logs to any 3rd party event manager via SYSLOG. This is useful should the customer wish to integrated PacketViper logging into a current solution for long term storage or leverage existing alerting and ...
How can I isolate IP, Company, or Country Traffic?
Throughout PacketViper you are able to view only the traffic you have selected in real-time. By clicking on the: IP Address - Once you NetCheck an IP address you can select the LOGS tab, and you will see the IP selected traffic. Company and ...
GNL Dashboard: Threat Intelligence Sources
PacketViper comes with its own unique set of threat intelligence sources. Threat Intelligence requires a combination of people, process, and technology that integrate which deliver less false positives and stronger security. Our Threat Intelligence ...
Custom Rules: Purpose of Interception Rules
Within the Custom Rules, you can create rules that intercept specific types of connections. In addition craft a custom message for the source which matches the custom rules. In order for the interception to function properly, an IP address must be ...