Terms Flashcards
Plugins
software packages that can easily be integrated and expand the functionality of CounterACT
What is information from plugins used for?
– Creating polices which enable Actions and Reports
– Displaying Information Panel data
– Triggering Threat Protection events
Plugin updates
CounterAct will check automatically if new updates are availble for your plugins.
What are default plugins?
- User Directory
- Switch
- Macintosh/Linux
- Host Property Scanner (HPS)
- NBT Scanner
- Syslog
- DNS Client
- Reports
Default plugin: User Directory
Resolves user details via a User Directory
server such as Microsoft Active Directory or any
other LDAP-based directory server such as
SUN or Novell via LDAP protocol.
Default plugin: Switch
Allows CounterACT to display information about
hosts connected to specific switch ports
including information about the switch and
ports. Required for blocking network access via
ACL/VLAN or port assignment
Default plugin: Macintosh/Linux
Enables deep inspection of Macintosh/Linux
endpoints via SSH or SecureConnector access.
Default plugin: Host Property
Scanner (HPS)
Enables all of the windows endpoints operation
including vulnerability scanning, remediation
actions and windows host polling. Responsible
for organization operating system classification
using built-in components. Also contains
SecureConnector code and operations.
Default plugin: NBT Scanner
Attempts to obtain the username, MAC,
hostname and domain name that is logged onto
a given host.
Default plugin: Syslog
Lets you forward, receive and format event
messages to/from an external Syslog server.
Default plugin: DNS Client
Allows CounterACT perform DNS lookups to
resolve host names
Default plugin: Reports
Gathers information from CounterACT and
populates the reports, assets and dashboard
portals.
CounterAct Channels
A channel defines a pair of interfaces used by CounterACT to monitor and protect your network
** It is critical that the proper channel connection and definitions are configured correctly **
There are three interfaces:
- Monitor interface
- Response interface
- Management Interface
Monitor interface
Lets the Appliance monitor and track network traffic. Traffic is mirrored to a port on the switch or via a network tap and monitored by the Appliance.
Response interface
– The Appliance responds to traffic using this interface. Response traffic protects against malicious activity and performs policy actions. – In a Layer 3 Deployment, the response interface is set to “IP Layer”. In this case, the management interface is used for response.