Sensor deployment strategy
Sensor placement is prioritized for network locations where security events are most likely to occur. Data collected from multiple locations provides a complete and accurate picture of potential security threats. Below is a prioritized list of data source locations in a typical network environment.
Number |
Location |
Description |
---|---|---|
1 | Egress Points |
Monitoring activity between your network environment and the Internet provides visibility of security events related to malware beaconing, command and control, network tunneling and data exfiltration activity. Benefits:
|
2 | Core Switch |
Activity within your network can include security events related to lateral movement and staging of attacks between workstations and important internal resources such as internal web applications, file servers or your system infrastructure. Benefits:
|
3 | Data Center |
Your data center infrastructure is where your valuable information is stored, making it a target for theft and unauthorized access. Sensors placed between these servers and virtual hosts provide visibility of security events related to this activity. Benefits:
|
4 | DMZ |
Public facing applications such as mail services, web sites and business-to-business applications are constantly attacked. Monitoring network zones that host these applications provides visibility of security events related to unauthorized access and data exfiltration. Benefits:
|
5 | External Link |
Benefits:
|
6 | Cloud Visibility |
Benefits:
|