top of page
Search
Various Use Cases 1
Summary: This document outlines a series of user guides for installing and configuring SmartConnectors to integrate various security...

Pavan Raja
Apr 914 min read
0 views
0 comments
Using Baseline Detection for Anomaly Detection in HP ArcSight ESM
Summary: This document outlines the method of baselining, which is used to identify anomalies by establishing a reference point or...

Pavan Raja
Apr 93 min read
0 views
0 comments
Capability Maturity Model
Summary: The provided text does not contain any specific value or numerical data in the field mentioned for assessment. Details: The...

Pavan Raja
Apr 99 min read
0 views
0 comments
Use Case ePHI and HIPAA
Summary: The article outlines specific requirements under HIPAA's Security Rule for covered entities to implement various controls aimed...

Pavan Raja
Apr 93 min read
0 views
0 comments
User Monitoring: Detecting Traffic to Non-Classified Hosts for Secret Networks
Summary: The document "User Monitoring - Detect Traffic To Non Classified Hosts For Secret Networks" is designed to detect traffic aimed...

Pavan Raja
Apr 92 min read
0 views
0 comments
User Geo-Location Tracking Use Case
Summary: The document "User Geo-Location Tracking Use Case and arb" is a part of the i.R.O.C.K. platform's use cases section, detailing...

Pavan Raja
Apr 91 min read
0 views
0 comments
How to Best Practices for Use Case Resource
Summary: ### Creating Effective Use Case Packages in ArcSight Software To create effective use case packages in ArcSight software,...

Pavan Raja
Apr 99 min read
0 views
0 comments
How to Best Practices for Use Case Resource
Summary: **Use Case Configuration Wizard (UCCW) in ArcSight Foundation** The Use Case Configuration Wizard (UCCW) is a crucial tool...

Pavan Raja
Apr 910 min read
0 views
0 comments
SOX Compliance Use Cases
Summary: The document outlines several use cases for using ArcSight solution in monitoring controls related to SOX compliance, including...

Pavan Raja
Apr 96 min read
0 views
0 comments
Use Case Workshop: A Comprehensive Listing and SIOC Methodology
Summary: The document titled "Use Case Workshop Use Case listing and SIOC Methodology v 1.1.pptx" is a presentation designed by Darren...

Pavan Raja
Apr 93 min read
0 views
0 comments
Use Case Examples 1
Summary: The document discusses various use cases for event correlation in security monitoring, including generating automated incident...

Pavan Raja
Apr 95 min read
0 views
0 comments
Use Case 7: Privileged User Monitoring
Summary: The "Privileged User Monitoring Use Case" is a critical approach for organizations to supervise activities of key personnel...

Pavan Raja
Apr 92 min read
0 views
0 comments
Use Case: NBTSTAT Collection of Hostname and Domain Data
Summary: This document outlines a method for gathering remote host information via VPN using NBTSTAT specifically for Cisco ASA VPN...

Pavan Raja
Apr 97 min read
0 views
0 comments
Use Case: Exploring NBTSTAT for Hostname and Domain Collection
Summary: This document outlines a method for detecting unauthorized devices accessing a company's VPN by analyzing network information...

Pavan Raja
Apr 96 min read
0 views
0 comments
USB Device Insertion and Removal Rules in MS Windows
Summary: The document "USB Device Insertion and Removal Rule (MS Windows)" is a technical guide designed to monitor USB device...

Pavan Raja
Apr 93 min read
0 views
0 comments
Suspicious File Uploads via USB: A Network Use Case Analysis
Summary: This document details a procedure for identifying potentially suspicious files uploaded to a network via USB devices,...

Pavan Raja
Apr 91 min read
0 views
0 comments
Unofficial Guide to Maintaining a Standby ArcSight Express 3.0 or 4.0 (CORR Engine) Version 0.4_1
Summary: To ensure that you're not losing any events and that your ArcSight setup remains functional even if one of your Express...

Pavan Raja
Apr 97 min read
1 view
0 comments
Unauthorized Account Management
Summary: The document outlines a security rule for detecting unauthorized users managing accounts in a Windows environment by triggering...

Pavan Raja
Apr 92 min read
0 views
0 comments
UBADemoScript1
Summary: The document provides a comprehensive overview of how User Behavior Analytics (UBA) can be used in an IT environment to detect...

Pavan Raja
Apr 912 min read
0 views
0 comments
UBA 5.0 Demo Script
Summary: This document outlines a series of security incidents detected using User and Behavior Analytics (UBA) technology within a...

Pavan Raja
Apr 910 min read
0 views
0 comments
bottom of page