Gigamon Rogue Activities Dashboard

The detection of rogue activities like cryptojacking and unsanctioned peer-to-peer (P2P) applications is essential for maintaining a secure and compliant environment. Cryptojacking involves the unauthorized use of your infrastructure's resources to mine cryptocurrency, which can severely degrade performance and increase operational costs. Monitoring for traffic associated with cryptomining sources allows you to detect and shut down these unauthorized activities quickly.

Gigamon Rogue Activities Dashboard screenshot 1
Gigamon Rogue Activities Dashboard screenshot 2

The detection of rogue activities like cryptojacking and unsanctioned peer-to-peer (P2P) applications is essential for maintaining a secure and compliant environment. Cryptojacking involves the unauthorized use of your infrastructure’s resources to mine cryptocurrency, which can severely degrade performance and increase operational costs. Monitoring for traffic associated with cryptomining sources allows you to detect and shut down these unauthorized activities quickly.

Revisions
RevisionDescriptionCreated

Get this dashboard

Import the dashboard template

or

Download JSON

Datasource
Dependencies