{"id":2767,"date":"2022-05-20T05:43:04","date_gmt":"2022-05-20T05:43:04","guid":{"rendered":"https:\/\/vpxd.dc5.cz\/?p=2767"},"modified":"2022-05-20T05:43:05","modified_gmt":"2022-05-20T05:43:05","slug":"vmware-nsx-detecting-suspicious-network","status":"publish","type":"post","link":"https:\/\/vpxd.dc5.cz\/index.php\/2022\/05\/20\/vmware-nsx-detecting-suspicious-network\/","title":{"rendered":"VMware NSX \u2013 Detecting Suspicious Network&#8230;"},"content":{"rendered":"<p><a href='https:\/\/dy.si\/Bk57rh2' target='_blank' rel=\"noopener\"><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/6aaf0ffa-07f0-4d98-a11d-5c76fecf8a07\/?size=Box320'><\/a><\/p>\n<h4><a href='https:\/\/dy.si\/Bk57rh2' style='text-decoration: none' target='_blank' rel=\"noopener\">VMware NSX \u2013 Detecting Suspicious Network&#8230;<\/a><\/h4>\n<p>This blog post is intended to guide you on how to enable Network Suspicious Traffic in NSX-T 3.2 to detect suspicious traffic such as abnormal activity and malicious behaviour, across your NSX-T Data Center environment. This feature is now generally available as part of NSX Intelligence 3.2. [&#8230;]<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.vmware.com' target='_blank' rel=\"noopener\">VMware Social Media Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>VMware NSX \u2013 Detecting Suspicious Network&#8230; This blog post is intended to guide you on how to enable Network Suspicious Traffic in NSX-T 3.2 to detect suspicious traffic such as abnormal activity and malicious behaviour, across your NSX-T Data Center environment. This feature is now generally available as part of NSX Intelligence 3.2. [&#8230;] VMware &hellip; <a href=\"https:\/\/vpxd.dc5.cz\/index.php\/2022\/05\/20\/vmware-nsx-detecting-suspicious-network\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;VMware NSX \u2013 Detecting Suspicious Network&#8230;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-2767","post","type-post","status-publish","format-standard","hentry","category-vmware"],"_links":{"self":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts\/2767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/comments?post=2767"}],"version-history":[{"count":1,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts\/2767\/revisions"}],"predecessor-version":[{"id":2768,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/posts\/2767\/revisions\/2768"}],"wp:attachment":[{"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/media?parent=2767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/categories?post=2767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vpxd.dc5.cz\/index.php\/wp-json\/wp\/v2\/tags?post=2767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}