This training module covers all NEOX PacketFalcon and PacketGrizzly packet capture and analysis appliances from a network and forensics search and analysis perspective. Watch this training module to learn:
- How to perform and forensic search and PCAP file management based on time filters and preconfigured rules to isolate relevant traffic. The interface supports real-time statistics, including top talkers, application distribution, and network utilization metrics. For persistent analysis, forensic searches can be saved as downloadable files.
- How to perform traffic visualization and expert analysis using a Compass Tool for interactive, time-based graphs to visualize traffic patterns, overlaying Expert Events, or using the Flow Visualizer mapping.
- How to perform advanced network diagnostics/troubleshooting and reporting using a Peer Map for a topological view of network conversations, or a Packet List for traditional decode inspection. Exporting filtered traffic for external analysis or SOS reports for support tickets.