Detecting AnomaliesΒΆ

Note

This feature required Professional or Enterprise Edition

An Anomaly may exploit vulnerabilities of a device, group of devices, or to breach network security and therefore cause possible damage. A Vulnerability is an opening that can be exploited by anomalies to cause damage to a device, group of devices, or to network security.

Genian NAC inspects network traffic to identify abnormalities in the network and marks endpoint devices that have Anomalies. You can configure custom Anomaly Definitions or use the seven pre-defined definitions provided by default to detect endpoint devices that are exposed to major Anomalies such as Ad hoc Networks, ARP Bombing, ARP Spoofing, MAC+IP Clones, Port Scanning and more.