Familiarize yourself with the terminologies that are used with the NSX Suspicious Traffic feature.

Terminology

Definition

Anomaly Event

The terminology used in the previous NSX Intelligence release where the NSX Anomaly Detection (now NSX Suspicious Traffic) feature was introduced as a technology preview feature. This terminology is now replaced by Detection Event.

Campaign

A correlated set of incidents that affect one or more devices over a period of time.

If the NSX Network Detection and Response feature is activated, links to campaigns are displayed on the NSX Suspicious Traffic UI, when applicable.

Confidence Score

The score calculated to indicate how confident the system is that an event is anomalous based on the proprietary algorithms that the NSX Suspicious Traffic feature uses.

Detection Event

A network traffic activity that deviates from what is considered standard or expected. The data is generated by a NSX Suspicious Traffic detector.

Detector

A sensor designed for detecting events in your network traffic flow. A detector maps to a single MITRE ATT&CK category or technique.

Impact Score

A score calculated by a proprietary algorithm which uses a combination of the confidence score for the detection event and its severity, if correctly detected.

Severity

Indicates how bad a threat is. The valid values are Critical, High, Medium, or Low.

Tactic

Represents the reason why an adversary is performing an action using an ATT&CK technique or sub-technique. See https://attack.mitre.org/ for information about the MITRE ATT&CK framework.

Technique

Represents how an adversary tries to achieve a tactical goal of their attack by performing an action. See https://attack.mitre.org/ for information about the MITRE ATT&CK framework.