You must manually turn on the NSX Suspicious Traffic detectors that you want to monitor. Only the detectors that are activated will be used for monitoring suspicious network traffic events.
Use the following steps to turn on a supported NSX Suspicious Traffic detector to perform network traffic analysis on the collected traffic data.
Procedure
- From your browser, log in with the required privileges to an NSX Manager appliance at https://<nsx-manager-ip-address>.
- Use the following steps to activate supported NSX Suspicious Traffic detector to perform network traffic analysis on the collected traffic data.
Note that the following steps are for all available detectors, except for the DNS-based detectors, which must be manually configured before they can be used. See the next step after this one for information about configuring DNS-based detectors.
- Navigate to the tab.
- Locate single or multiple detectors that you want to activate.
- Click the check box next to each detector and click Activate.
The activated detectors show as
Activated in the
NTA Detector Definitions tab.
- To turn on DNS-based detectors, such as Domain Generation Algorithm (DGA) and DNS Tunneling, perform the following steps only once.
- Create a custom DNS context profile or use a default system-provided context profile.
- Create a distributed firewall rule, using ANY in the Sources and Destinations columns; and using the DNS context profile, if you created one.
- Navigate to the tab.
- Locate the detector that you want to activate.
- Click the check box next to the detector and click Activate.
The Status column displays
Activated status for the activated detectors.
- (Optional) Use the following steps to deactivate supported NSX Suspicious Traffic detector to stop network traffic analysis.
- Navigate to the tab.
- Locate single or multiple detectors to deactivate.
- Click the check box next to each detector and click Deactivate.
The Status column displays
Deactivated status for the deactivated detectors.
Results
The Status column displays Activated or Deactivated status.
What to do next
Monitor and analyze the detected suspicious traffic events.