Ga naar hoofdinhoud

Rogue Machine

notitie

Rogue Machine Event Monitor

The Rogue Machine Event Monitor scans the network for new devices that may have connected without permission.

info

Overview

The Rogue Machine Event Monitor searches your network for unrecognized systems.

Use Cases

  • Detecting new systems that have connected to the network

Monitoring Options

This event monitor provides the following options:

  • Look for rogues in the local NetBIOS network: Search in the local NetBIOS tables for unrecognized systems.
  • Look for rogues in the following IP ranges: Specify IP address ranges where the event monitor will search for unrecognized systems.
  • Use ICMP pings to detect rogues: Use ICMP pings to detect unrecognized systems, which is one of the best methods.
  • Use ARP requests to detect rogues: Use ARP requests to detect unrecognized systems, effective only on the local subnet.
  • Use HTTP requests to detect rogues: Use HTTP requests to detect unrecognized systems hosting web servers.
  • Use SNMP requests to detect rogues: Use SNMP requests to detect unrecognized systems, including networking equipment.
  • Alert with [Warning/Error/Critical] about changes in the list of found rogues since the last run: Alert if there are changes in the list of found systems compared to the last run.
  • Don't alert about these devices: Exclude selected devices from alerts.

Authentication and Security

This event monitor does not require any authentication.

Protocols

Data Points

This event monitor generates the following data points:

Data PointDescription
Rogue CountThe number of rogues detected.

Sample Output

Sample Output