Clicky

Name Description
CSC 1 - Inventory of Authorized and Unauthorized Devices
   SQL Databases All MS SQL Server databases
   Windows File Share Servers All MS Windows file share servers
   SSL/TLS Servers All servers running SSL/TLS
   DNS Servers All DNS servers
   DHCP Servers All DHCP servers
   New Machines Detected on Network All new MAC addresses
   All Servers All server machines
   All Clients All client machines
CSC 2 - Inventory of Authorized and Unauthorized Software
   Web Browsers on the Network All web browsers detected and their versions
   Applications in Use All applications detected
   Operating Systems All operating systems detected
   Encryption Protocols in Use (SSL/TLS) Summary of encryption protocols (SSL/TLS) and ciphers in use, with client and server counts
CSC 7 - Email and Web Browser Protections
   Web Browsers on the Network All web browsers detected and their versions
CSC 8 - Malware Defenses
   Network Security Events (IDS) All network IDS events
   Network Scanners All network scanners detected
   Clients associated with DNSChanger name servers All clients associated with DNSChanger name servers detected
   Conficker All devices associated with Conficker virus
   Bittorent All devices using peer to peer file sharing
   Systems Accessing Malware Websites All devices connecting to websites associated with malware
   Users Accessing External Proxy All devices accessing the Internet via an external proxy
   Systems Accessing Malware Domains All DNS lookups associated with malware domains
   Countries by Server Location All countries by server accessed by clients on the network
   Countries by Client Location All countries by client accessing servers on the network
CSC 9 - Limitation and Control of Network Ports, Protocols, and Services
   Ports, Services and Protocols All ports, services and protocols detected
   Network Services All network services detected
   Protocols on Non-standard Ports All protocols detected using non-standard ports
CSC 12 - Boundary Defense
   Network Security Events (IDS) All network IDS events
   Network Traffic Protocols in Use on the Network All protocols detected
   Protocols on Non-standard Ports All protocols detected using non-standard ports
   Clients associated with DNSChanger name servers All clients associated with DNSChanger name servers detected
   Users Accessing External Proxy All devices accessing the Internet via an external proxy
CSC 13 - Data Protection
   Users Accessing SQL Databases All users accessing MS SQL databases and their activity
   Users Accessing Windows File Shares All users accessing MS Windows file shares and their activity
   SMTP Emails Sent with Attachments All SMTP emails sent with attachments
   Countries by Client Location All countries by client accessing servers on the network
   Countries by Server Location All countries by server accessed by clients on the network
   Top Website Domains Most active website domains
   All Users and Their Activity All users on the network and their activity