Home
Download Trial
Compliance
GDPR
CIS CSC 20
Bandwidth
All Clients
All Servers
Applications by Number of Network Connections Created
Busiest Connection Pairs
DNS Servers
Excessive Bandwidth by User
Flows
Flows (with RTT) - Beta report
Flows Breakdown
Flows by Packets Sent / Received
Flows by User
Inbound TCP Connections
Inter Subnet Flows
Inter Subnet Sessions
Inter Subnet Traffic
Net Exporters of Data
Network Traffic Protocols in Use on the Network
Outbound TCP Connections
Ports, Services and Protocols
Ransomware: Outbound 445
Server Systems by Number of Network Connections Received
Session by Packets Sent / Received
Sessions
Sessions (In)
Sessions (In) by User
Sessions (In/Out)
Sessions (Out)
Sessions (Out) by User
Sessions by User
Switch Interface Drilldown
Switch Interface Sessions
Systems by Number of Network Connections Created
Systems generating more than 2GB of Bandwidth
TCP Traffic Distribution
TOS Distribution
Top AD Departments
Top MACs and IPs
Top Network Connections
Top Network Protocols Based on Connections Created
Top Packet Generators
Top Packet Generators by Protocol
Top Policy Groups
Top Talkers
Top Talkers by Packets Sent / Received
Top Talkers by Traffic Volume
Top User Conversations by Traffic Volume
Top Users
Top Users in Policy Group
Total Traffic
Total Traffic by Protocol
Traffic (In/Out)
Traffic Distribution by User
Traffic Distribution by User and IP
Traffic IN (Top Receivers)
Traffic In (Top Senders)
Traffic In (Top Users)
Traffic Out (Top Receivers)
Traffic Out (Top Senders)
Traffic Out (Top Users)
Traffic Volumes Grouped by Ports
pcAnywhere Network Traffic
Services
DHCP Servers
DNS Clients
DNS Servers
MAC Addresses
Network Events (DNS Lookups)
Network Services
Network Services by IP
Operating Systems
Operating Systems by IP
Ransomware: Wannacry Domain
Resolved Hostnames
Identity
Directory Logins
Directory Logins by IP
Directory Logins by Login Time
Logins by Directory Type
Total Number of Logins
IP Activity
Systems Using an Excessive Amount of Bandwidth
Ethernet
DHCP Lease Assignments
Flows
Sessions
Sessions with IP
Top Broadcasters
Top Sources
Traffic Distribution
Security
Clients associated with DNSChanger name servers
Conficker
Conficker Brute Force Logins
DNS Lookups Associated with Malware Domains by User
Events by User
Heartbleed
Heartbleed Events (Server and Client List)
Heartbleed Exploit
Network Events (Conficker Worm Brute Force Logins)
Network Events (DNS_MX lookups, possible SPAM)
Network Events (Exploits)
Network Events (IDS) by User
Network Events (User Defined)
Network Events Summary (User Defined)
Network Scanners
Network Security Events (IDS)
Protocols on Non-standard Ports
SSL/TLS Servers
Spyware HTTP Requests
Spyware Http Requests by User
Systems Accessing Malware Domains
Systems Accessing Malware Websites
Systems Connecting to Conficker Websites
Top Events by IP
Top Network Events
Web
LOIC tool downloads
Network Events (Web Accesses)
Network Events (Web Accesses) by User
P2P Signatures
Potential Operation Payback hosts
Proxy :: Top Websites by User
Proxy Sessions by User
Search by Website Name
Skype Activity
Skype Activity by IP
Skype Activity by IP Address and User
Skype Activity by User
Social Networking HTTP Requests
Top Proxy Client IPs
Top Proxy Flows
Top Proxy Flows by User
Top Proxy Servers
Top Proxy Servers with Client IPs by Traffic Volume
Top Proxy Users
Top Web Users
Top Web Users by Volume
Top Website Categories
Top Website Domains
Top Website Domains (Page Hits)
Top Website Domains by User (Bandwidth)
Top Website Domains with Client IPs
Top Website Domains with Client IPs (Page Hits)
Top Website Domains with Client IPs by User (Page Hits)
Top Websites (Page Hits)
Top Websites (Social Networks Excluded)
Top Websites and URI
Top Websites and URIs
Top Websites and URIs by User
Top Websites and URIs with Client IPs
Top Websites and URIs with Client and Server IPs
Top Websites and URIs with Server IPs
Top Websites by User
Top Websites with Client IPs
Top Websites with Client IPs (Page Hits)
Top Websites with Client and Server IPs
Top Websites with Client and Server IPs (Breakdown)
Top Websites with Server IPs
Top Websites with client IPs (Page Hits) by user
Users Accessing External Proxy
Windows File Shares
Deleted Files
Deleted folders
Filename Actions
Filenames and Actions by Server
Filenames and Clients by Server
Filenames and File Servers by User
Filenames by Actions
Filenames by Client
Filenames by Server
Media Files
Microsoft Office Files
Network Events (SMB)
Network Events (SMB) by User
Ransomware: Top Clients Renaming Files
Ransomware: Wannacry Extensions
Ransomware: Wannacry Ransom Text File
Ransomware: Wannacry SMBv1
Search by File/Folder Name
Search by File/Folder Name and User
Search by User
Top Client IPs by Number of Actions
Top File Share Actions
Top File Share Conversations by Data Volume
Top File Share Users
Top File Share active Client IPs
Top File Share servers by Number of Actions
Top Filenames by Number of Actions
Top Fileservers and Clients
Top Fileservers and Clients (Breakdown) by User
Top Fileservers, Clients and Actions
Top Servers by Number of Events and User
Top Servers by Volume and Users
Users Accessing Windows File Shares
Windows File Share Servers
Netscan
Hosts Scanning for pcAnywhere
Morto Worm Scans
Network Events (Netscans)
Network Events (Netscans) by User
Network Events (Portscans)
Network Events (Portscans) by User
Network Scanners by Port
Port 445,139
Service Inspector
Hosts Down
Network Events (Service Inspector)
E-mail
Emails by Recipient
Emails by Sender
Emails by Source
Emails by Subject
Emails by User
Network Events (Emails)
SMTP Emails Sent with Attachments
SMTP Events (Emails with Mislabeled HyperLinks)
Web Browsers
Internet Explorer Versions
Mobile Devices Connected to the Network
Ransomware: Wannacry XP Clients
Systems Connecting to Microsoft SMS Server
Systems Running Linux
Systems Running Mac OS X
Systems Running Multiple Web Clients
Systems Running Windows 2000/2003
Systems Running Windows 7
Systems Running Windows Update
Systems Running Windows Vista
Systems Running Windows XP
Systems not Running Windows Update
Systems running Windows XP - User Agent Details
Web Browsers on the Network
Web Clients
Web Clients by Version and Timestamp
Custom
Exceptions: New Devices in Server VLAN
Exceptions: Non Standard DHCP Servers
Exceptions: Non Standard DNS Servers
Exceptions: Non Standard File Servers
Exceptions: Non Standard Proxy Servers
Exceptions: Non Standard SQL Servers
Failed Access: File Opens
All Events
Events by Destination
Events by Signature
Network Events (New Server Ports)
Network Events (Report Alert)
Network Events (Signature Breakdown) by User
Network Events (Trend)
Network Events (Volume Overflows) by User
Network Events (all)
Network Events (all) by User
Network Events (volume overflows)
Network Events by Category
Network Events by Category Group
Network Events by Priority
Network Events by Source
New Machines Detected on Network
User Network Events
SQL Server
Automatic Database Discovery
Data Modification
Network Events (MS SQL)
Privileged DB Users
Queries to Agresso DB Not Coming From Agresso Client
SQL Databases
Schema Modification
Statement Audit Log
Top Active Directory User
Top Database by Client
Top MS SQL Application
Top MS SQL Client by Number of Queries
Top MS SQL Clients by Data Volume
Top MS SQL Servers by Data Volume
Top MS SQL Statement
Top MS SQL Statement Type
Top MS SQL Users
Top Users by Database
Users Accessing SQL Databases
Bandwidth Quota
Bandwidth Quota Status
Bandwidth Quota Status Summary
Bandwidth Quota Status by Group
Network Events (User Policy)
DCE/RPC
Network Events (DCE RPC)
Top DCE/RPC Clients Services and Calls
Top DCE/RPC Services
Top DCE/RPC Services and Calls
Top DCE/RPC Services by Clients
BitTorrent
Network Events (Torrent Downloads)
Network Events (Torrent Downloads) by User
Search by Info Hash
NFS
Network Events (NFS)
Search by Filename
Search by Filename and Action
Search by Filename, Action and Client
Top NFS Fileservers
Top NFS Fileservers and Clients
Top NFS Fileservers by User
Top NFS Fileservers, Clients and Actions
Top NFS Fileservers, Clients and Actions by User
Traffic Analysis
All Users and Their Activity
Applications in Use
Countries by Client Location
Countries by Server Location
Sessions by Countries
Encryption (SSL/TLS)
Encryption Protocols and Cipher Sessions (SSL/TLS)
Encryption Protocols in Use (SSL/TLS)
IP Address
$External
$Internal
$WhitelistApprovedServers
$WhitelistDHCPServers
$WhitelistDNSServers
$WhitelistFileServers
$WhitelistProxyServers
$WhitelistServerVLAN
$WhitelistSQLServers
User Name
File or Folder Name
Website
Time Range
last
24
hours
last
1
hour
last
4
hours
last
24
hours
Sensors
PCAP File Reader
Customisation
Settings
Shutdown
1
Date
Alert
Delete selected
27.03 08:16:55
New IDS signatures have been downloaded and installed. See the
Emerging Threats
for more information
Delete
Administrator
Account Settings
Logout
Services :: Operating Systems
All operating systems detected
All Reports
Traffic Analysis
Applications in Use
All Users and Their Activity
More »
Bandwidth
Top Talkers
Top Users
More »
Security
Top Network Events
Network Scanners
More »
Web
Top Website Domains
Top Web Users
More »
Windows File Shares
Search by File/Folder Name
Search by User
More »
Ethernet
Top Sources
Traffic Distribution
More »
Inventory
BitTorrent
E-mail
Encryption (SSL/TLS)
Identity
Services
SQL Server
Web Browsers
My Reports
Exceptions: New Devi..
Exceptions: Non Stan..
Exceptions: Non Stan..
Exceptions: Non Stan..
Exceptions: Non Stan..
More »
Integration
SolarWinds Orion
CSV
Excel Web Data Source
iFrame
Actions
Trend Report
Save As
Sensor
?
Any
1: Core Packet Sensor
3: NetFlow Sensor
2: PCAP Sensor
Operating System
?
Contains
Contains
Does not contain
Begins with
Does not begin with
Ends with
Does not end with
Equals
Is not equal to
Matches regexp
Does not match regexp
IP / Subnet
?
$External
$Internal
$WhitelistApprovedServers
$WhitelistDHCPServers
$WhitelistDNSServers
$WhitelistFileServers
$WhitelistProxyServers
$WhitelistServerVLAN
$WhitelistSQLServers
Email report results
HTML
CSV
Chart Settings
Chart settings saved. Re-run the report to see the changes.
Always display charts in reports