005-7-Cyber Security: Electronic Security Perimeter(s)
In the Reports Portal, select > > > .
NERC Standard 005-7: Electronic Security Perimeter identifies specific electronic security perimeters for your BES cyber system, ensuring that your organization supports and maintains appropriate cyber security requirements for your organization.
| Dashboards | Reports |
|---|---|
| Traffic Anomaly Overview |
n/a |
-
Traffic Anomaly Overview
-
Helps you identify anomalies in network traffic.
Charts:
-
Anomalies Detected
-
Targeted Ports
-
Source IPs
-
Targeted IPs
-
Timeline
-
Events Table
Special Views:
-
Source IP- Target IP Relationship which provides a scatter chart displaying the relationship between source and target IPs.
-
Traffic Anomaly Distribution which provides a distribution map displaying traffic anomalies.
-
Traffic by Volume, which provides a line chart displaying traffic volume over time.
Filters:
-
Device Vendor and Device Product
-
Anomaly Type
-
Application Protocol
-
Transport Protocol
-
Category Significance
-