Использование неавторизованными устройствами
The Network Performance Appliance provides the user the ability to drill down into all facets of network usage. Verify that network utilization is not the only consumer of network resources. (click to view larger) 
In this screen, a single host is conversing with many other hosts. This type of activity is common when systems are compromised and attempting to scan the network looking for other systems to exploit.(click to view larger)


Powered By OneLink