Select a different country or region to see content specific to your location and make online purchases.
x
GB
/
GBP
GB
/
GBP
Use Case Workshop: Is My Network Configured Correctly
WGAC-CSC-UCWCC
Schedule
See all CoursesProfessional Services & Support
Description
In this workshop, you will work through a series of activities that focus on using Cisco Stealthwatch Enterprise to determine whether your network policies are configured correctly and being enforced.
How you’ll benefit
In a lab environment, you will learn how to use:
- Monitor remote access users
- Detect unauthorized hosts in a bypass VLAN
- Detect who is not using the Web Proxy
To complete this workshop, the following components must be installed and configured on your network:
- Stealthwatch Release 7.0 or later
- Stealthwatch Flow Collector
- Integration with Firewall
- Integration with Proxy/Nat Device
- Integration with Proxy/Nat Device
After taking this course you should be able to
- Explain how Customer Security Events (CSE) can be used.
- Demonstrate how to implement relationship alarms.
- Create, modify, and review host group and host group policies.
- Create and modify flow searches.
The description for this course is currently being updated.
To complete this workshop, the following components must be installed and configured on your network:
- Stealthwatch Release 7.0 or later
- Stealthwatch Flow Collector
- Integration with Firewall
- Integration with Proxy/Nat Device
- Integration with Proxy/Nat Device
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.