n.Scope NDR v2.0 - EN
  • πŸ‘‹Welcome
  • Product Guides
    • πŸ“ŽExplore your Network
    • 🚨Using Alerts
  • Deployment
    • πŸ› οΈDeployment Guide
    • πŸ—ΊοΈn.Scope Deployment Planning
    • πŸ“‘Installing Nanocorp n.Scope
      • πŸ‘“Deploy n.Scope
      • πŸͺDeploy n.Probes, n.Rewind, n.Fusion
  • Ressources
    • πŸ”¦Alerts
      • Command & Control
        • CNC01 - Oversized UDP DNS
        • CNC02 - Protocols Ports Missmatch
        • CNC03 - BETA - Threat Intelligence Match
      • Denial of Service
        • DOS01 - DHCP Starvation
        • DOS02 - AI Smart Alert - Distributed Denial of Service
        • DOS03 - Excessive ICMP Rate
      • Exfiltration
        • EXF01 - Deprecated TLS
      • Initial Access
        • IAC01 - Suspicious SSH Admin
        • IAC02 - Unauthorized Application
        • IAC03 - Malicious TLS Signatures
      • Reconnaissance
        • REC01 - Suspicious Port Scan
        • REC02 - BETA - AI Smart Alert - Suspicious Port Sweep
      • Security Policies
        • NPC01 - Unwanted Protocol
        • NPC02 - Subnet Whitelist
        • NPC03 - Trusted Protocol
        • NPC04 - Insecure Email Protocol
        • NPC05 - Device Whitelist
    • πŸ”ŒIntegrations
      • 🚦Alerting
        • Discord
        • Slack
      • πŸ›°οΈCyber Threat Intelligence
      • πŸ”‘Single-Sign-On
        • πŸͺŸAzure AD SSO
    • πŸ€–Network Protocols
Powered by GitBook
On this page
  1. Ressources
  2. Alerts

Security Policies

Last updated 1 year ago

Effective enforcement of security policies ensures that all network traffic and behaviors are continuously monitored, with deviations from the norm promptly identified and mitigated. By adhering to a well-defined policy, organizations can maintain the integrity, confidentiality, and availability of their systems and data.

Moreover, it acts as a deterrent against potential attackers by signaling a proactive and resilient security infrastructure. The templates not only streamline the protection of digital assets but also align with compliance requirements, thereby reducing legal and financial liabilities. Ultimately, it empowers the n.Scope NDR to deliver on its promise of safeguarding an organization's network by turning policy into practice, translating into a hardened security stance against the evolving landscape of cyber threats.

Supported Templates

Security Policing Templates rely on the Network Protocols supported by the product. that can be used as parameters for this category of alert templates.

πŸ”¦
NPC01 - Unwanted Protocol
NPC02 - Subnet Whitelist
NPC03 - Trusted Protocol
NPC04 - Insecure Email Protocol
NPC05 - Device Whitelist
Check out the list of supported network protocols