Arbor Pravail (APS)
Arbor Pravail (APS): Monitors and mitigates advanced persistent threats and malware with inline packet inspection.
To onboard such a source to Axoflow, complete the generic appliance onboarding steps.
Labels
Axoflow automatically adds the following labels to data collected from this source:
| Analytics label | Message field | value |
|---|---|---|
vendor |
meta.vendor |
netscout |
product |
meta.product |
arbor-pravail |
service |
meta.service.name |
arbor-networks-aps, pravail |
You can use the labels as:
- Filter labels on the Analytics page,
- in the Filter By Label field during log tapping.
You can use the message fields
- in Flow Processing steps, for example, in the Query field of Select Messages steps,
- in AQL expressions in the search bars.
Sending data to Splunk
When sending the data collected from this source to Splunk, Axoflow uses the following sourcetype, source, and index settings:
| sourcetype | source | index |
|---|---|---|
netscout:aps |
netscout:aps |
netids |
Sending data to Google SecOps
When sending the data collected from this source to a dynamic Google SecOps destination, Axoflow sets the following log type: ARBOR_EDGE_DEFENSE.
Earlier name/vendor
- Arbor Networks Pravail (APS)