Building a Global Ignore Filter
Safelist Synchronization
Filtering Out High Volume Traffic
Alternative DNS Techniques
Improving Packet Capture Performance – 3 of 3



Improving Packet Capture Performance – 2 of 3



Improving Packet Capture Performance – 1 of 3

Threat Simulation – Threat Intel

Threat Simulation – Beacons

Threat Simulation – DNS

Threat Simulation – Client Signatures (User Agent)

Want to See What Port Is Most Commonly Used in a Packet Capture File? – Video Blog