top of page

HP ArcSight Technical Overview - EA v01 Extra Notes 1.1

  • Writer: Pavan Raja
    Pavan Raja
  • Apr 8, 2025
  • 2 min read

Summary:

This document outlines a method for ensuring end-to-end chain of custody during litigation, effective across Canada, US, and Europe. It emphasizes the importance of not dropping data, prioritizing cache, and managing high volume traffic (100K EPS, 1M records per second). The system includes correlation methods like location, session, and vulnerability-based analysis to detect threats effectively. "Dd" is used as a placeholder for detailed information which may be found in the full document.

Details:

This text appears to be a summary of some sort of technical or security document about monitoring for threats and risks, specifically focusing on how to ensure the end-to-end chain of custody for litigation purposes, with proven effectiveness in courts across Canada, US, and Europe. The document highlights that they do not drop data, understand its priority-based cache, and can handle high volumes such as 100K EPS (events per second) and 1M records per second for searching. They also mention scaling horizontally using Logger cubes to manage scale and provide actionable alerts without disrupting the network admin's nighttime sleep. The document goes on to describe several methods of correlation, including location correlation by physically logging into two different locations at the same time (for possible hacking or shared account usage), session correlation through analyzing logs tied to a user’s IP address over an 8-hour period, and vulnerability-based correlation for assessing the probability of compromise. The repeated use of "Dd" throughout the text seems to be a placeholder or filler for actual data points or details that are presumably covered in more depth elsewhere within the document. Overall, this summary suggests a focus on comprehensive threat monitoring with a strong emphasis on actionable alerts and efficient handling of large volumes of information from various sources.

Disclaimer:
The content in this post is for informational and educational purposes only. It may reference technologies, configurations, or products that are outdated or no longer supported. If there are any comments or feedback, kindly leave a message and will be responded.

Recent Posts

See All
Zeus Bot Use Case

Summary: "Zeus Bot Version 5.0" is a document detailing ArcSight's enhancements to its Zeus botnet detection capabilities within the...

 
 
 
Windows Unified Connector

Summary: The document "iServe_Demo_System_Usage_for_HP_ESP_Canada_Solution_Architects_v1.1" outlines specific deployment guidelines for...

 
 
 

Comments


@2021 Copyrights reserved.

bottom of page