Tracking Network Assets and Users
The summer release of Threat Defender is here. This new version 20180814.0 includes asset tracking and user mapping – revealing new perspectives in network analytics, network reporting and risk evaluation.
As soon as Threat Defender is connected to the network, it starts tracking the MAC addresses of all devices it detects. Threat Defender uses this information to create enriched assets by storing metadata such as last seen IP addresses, operating system type, hostname etc.
Assets can also be edited manually. Assigning descriptive names, consolidating MAC addresses of devices with multiple network interfaces and mapping users to assets creates a clear network inventory. Identifying any new devices that connect to the network then becomes a piece of cake.
Threat Defender stores all asset and user information in dedicated logs that provide a clear overview of the network structure. Furthermore, the data in the drill-down reporting system can be filtered based on specific asset properties or by users. For example, they can be set up to display the activity of all Windows computers in the network or what assets and/or users triggered threat intelligence hits.
For a complete list of the new features and improvements, see the release notes.
Would you like to try out cognitix Threat Defender? Get your 30-day free trial version here.