Overview

Overview

The ThreatDefence Network Detection and Response (NDR) Sensor is available in two deployment options:

  • Physical Sensor: High-performance hardware appliances designed for large enterprise or data-center environments.

  • Virtual Sensor: Software-based appliances suitable for smaller deployments and cloud-only environments.

Both types provide passive monitoring of network traffic to deliver visibility, intrusion detection, and behavioral analytics for the ThreatDefence SecOps platform.


Deployment

The NDR Sensor is a passive device that monitors a copy of production traffic. The recommended deployment location is where North-South traffic (internal ↔ external) passes through your environment, typically on the internal firewall interface.

To achieve this, configure a SPAN (port mirroring) session on your switch or firewall to forward traffic to the NDR sensor.


Deployment Diagram

Network Sensor Deployment &#xNAN;Example span port configuration feeding mirrored traffic to a ThreatDefence sensor.


Example: Cisco Switch Port Mirroring

For a typical Cisco switch where the internal firewall is connected on port eth0/1 and the ThreatDefence sensor is connected on port eth0/2, the configuration would be:

monitor session 1 source interface eth0/1
monitor session 1 destination interface eth0/2

This configuration:

  • Creates monitoring session 1.

  • Forwards traffic from the source interface (firewall port).

  • Mirrors traffic to the destination interface (sensor port).

Note: Interface notation (e.g., eth0/1) may vary depending on the switch model and configuration.


Outbound Connectivity Requirements

For the NDR Sensor to operate correctly, outbound HTTPS access is required for updates and threat intelligence feeds.

  • Protocol / Port: TCP/443 (HTTPS)

  • Purpose: OS updates, ThreatDefence Threat Intelligence feeds

  • Proxy Support: Ensure proxy settings are configured to allow SSL/TLS inspection if required.

Last updated