This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Network Traffic Analyzer (NTA)

What is the NTA?

The Samurai Network Traffic Analyzer (NTA) is a virtual appliance designed to provide deep visibility into network activity and detect suspicious or malicious behaviour. It can be deployed in a virtual environment or as an AWS EC2 instance, enabling passive monitoring and analysis of east-west and north-south traffic for security threats and anomalies. The NTA compliments existing security measures, delivering deeper insight into traffic and potential risks. Our approach leverages core capabilities to maximize protection and visibility:

Advanced Analytics

  • Utilizing machine learning and behavioral analysis, the Samurai Real-Time Engine (deployed on the NTA) identifies anomalous network activities that could indicate security threats, even those that evade traditional detection methods.

Cyber Threat Intelligence Integration

  • We apply our global threat intelligence feeds to enrich network data with context about known malicious actors, emerging threats, and attack patterns. This enhances the accuracy and speed of threat detection.

Network Layer Threat Hunting

  • The ability to proactively hunt for threats at the network layer, our Samurai SOC analysts can identify suspicious patterns and indicators of compromise that automated systems might miss.

Full Packet Capture (PCAP)

  • With full packet capture capabilities, the Samurai NTA allows for comprehensive forensic analysis. In the event of a security incident, Samurai SOC analysts can reconstruct sessions and examine payloads to understand the full scope and impact of the breach.

What are example use cases for the NTA

  • Clients with bespoke or unsupported systems e.g no current integration
  • Clients who want to expand their monitoring capabilities leveraging NTTs global threat intelligence
  • Clients who want to expand monitoring beyond telemetry data sources integrated into Samurai MDR, or have systems that do not produce telemetry data with limited threat detection capabilities, refer to Telemetry Data Source Categorization to understand how Samurai categorizes supported integrations
  • Clients who wants to get a quick cyber security grip on new acquisitions
  • Clients with distributed branch offices with heterogenous environments and no central log collection

What are the components of the NTA?

The NTA gains visibility of network traffic through traffic mirroring. The NTA monitors the traffic utilizing specific components and generates security detections (alerts) which are sent to the Samurai platform and triaged, investigated and validated by SOC analysts potentially leading to a security incident reported to you. Refer to the high level diagram below:

nta_internals.png

Figure 1: The NTA internal components

Traditional IDS Meets Advanced Analytics

  • The NTA includes a traditional Intrusion Detection System (IDS) component (Suricata), which provides baseline network monitoring. However, its true strength lies in its ability to decode network protocols, converting them into detailed activity logs.

Real-Time Detection with Advanced Analytics

  • These activity logs are processed by the NTA resident Samurai Real-Time Engine, which applies:
    • Advanced Analytics to identify subtle anomalies.
    • Threat Intelligence to detect known malicious patterns.
  • This approach ensures a proactive, accurate understanding of network activity.

Full Traffic Recording (Stenographer)

  • The NTA records all traffic flowing through its sensor.
  • This enables comprehensive forensics and retrospective analysis, providing critical insights into historical activity.

Automatic Alert Data Collection

  • When an alert is triggered, the NTA automatically captures related packet data and sends it upstream to the Samurai platform for investigation by SOC Analysts.
  • This allows for immediate analysis and a deeper understanding of a potential incident.

What data is analyzed by the NTA?

All network traffic you decide to mirror to the NTA is analyzed. The NTA operates passively monitoring the mirrored taffic without introducing latency or affecting production systems. Even when network traffic is encrypted (e.g HTTPS, SSL/TLS), the NTA can still extract and analyze unencrypted meta data such as IP addresses, port numbers, traffic patterns etc and correlate this metadata with Threat Intelligence such as known malicious IPs, domains or abnormal behaviors - the NTA can identify potential threats and suspicious activity maintaining effective threat detection without decrypting the payload.

If a client has the capability to decrypt traffic before mirroring to the NTA it is of course advantageous, however we recognize this may not be optimal or available in many cases.

All data resides local to the NTA. Any security detections (alerts) made by the NTA coupled with PCAP data is sent to the Samurai platform for investigation by SOC Analysts.

What are the deployment options?

There are two options for deploying the Samurai NTA, both options cover network traffic visibility but are deployed and configured differently.

  1. Deployment on virtual system(s)
  2. Deployment on an AWS EC2 instance

Who is responsible for the NTA?

You, the client is responsible for installation and configuration of the NTA including the underlying hypervisor/virtual machine settings and/or AWS EC2 configuration and settings.

The Samurai team is responsible for ensuring health and availability of the NTA which includes maintenance of the Operating System and installed software.

Samurai will send email notifications to registered users should your NTA encounter any problems, once any issues have been resolved you will be notified again when a healthy status is reached.

If the Samurai team determines that an NTA is oversubscribed we will liaise with you to determine the best plan forward - this could include requesting you to update assigned virtual resources.

Can I get assistance with deployment of an NTA

Yes, if you require help and guidance with NTA deployment and configuration we can help via the Samurai Onboarding service. The service is typically utilized by new Samurai MDR clients to support transition onto Samurai Managed Detection and Response (MDR) but also for clients who wish to expand or review existing commitment including the NTA.

What’s Next?

Review the requirements to determine what is needed before deployment and configuration of an NTA.

1 - Requirements

What you need to get started

  • Access to the Samurai MDR portal and your specific tenant.

  • A hypervisor to run the virtual machine, for example VMware ESXi, Microsoft Hyper-V or relevant access to AWS for deployment to an Amazon EC2 instance.

  • Make any necessary updates to comply with the NTA Communications Requirements.

  • A static IP address for the NTA management interface and DNS server IP addresses unless you decide to use DHCP.

  • Necessary access to configure traffic mirroring to the NTA.

Supported Hypervisors

The NTA supports the follows hypervisors and versions:

HypervisorVersion
VMware ESXi7.x and above
Microsoft Hyper-V2016 and above
Proxmox Virtual Environment8.4.1 and above

Amazon Web Services Support

For AWS deployment, the NTA requires use of AWS Nitro instances that support traffic mirroring, more information can be found at:

There are two NTA sizes which are based on network throughput, therefore note the specifications based on your requirements.

MediumLarge
Throughput500 Mbit/s1000 Mbits/s
CPU8 Cores8 cores
Memory52 GB RAM
(32 GB RAM for OS and 20GB RAM for ramdisk)
104 GB RAM
(64 GB RAM for OS and 40GB RAM for ramdisk)
DisksSystem disk: 300GB
Data disk 200GB
System disk: 300GB
Data disk 200GB
Network InterfacesManagement:1 x 1 Gbit/s
Network Monitoring:1 x 1 Gbit/s
Management:1 x 1 Gbit/s
Network Monitoring:1 x 1 Gbit/s

Communication Requirements

The NTA requires connectivity to resources outlined within the table below, you may need to update your security controls e.g firewall to allow this connectivity.

FunctionProtocolPortSourceDestinationDetails
Enrolment, NTA backendTCP443NTA*.*.security.ntt

nttsecurity.io
.nttsecurity.io
.*.nttsecurity.io

samurai-xdr-prod-westeurope-xgliuoit.azure-api.net
All regular backend communication
Remote ManagementTCP443NTAra.cto.nttsecurity.io

deb.releases.teleport.dev

apt.releases.teleport.dev
Remote administration of an NTA
NTPUDP123NTAClient infrastructure (NTP server(s)) if configured in Samurai app

OR

0.ubuntu.pool.ntp.org

1.ubuntu.pool.ntp.org

2.ubuntu.pool.ntp.org

3.ubuntu.pool.ntp.org
Time synchronization
DNSUDP53NTAClient infrastructure (DNS server(s)) or external DNS servers (based on your NTA configuration)Domain name resolution
Ubuntu updatesTCP80, 443NTA*.ubuntu.com

api.snapcraft.io
Ubuntu software repository
Container ManagementTCP443NTAdocker.com

*.docker.com (private container registry)

docker.io (private container registry)

*.docker.io (private container registry)
Private container registry
Amazon Cloud dependenciesTCP443NTA*.cloudfront.netAmazon CDN used by NTA API

What’s Next?

Now you have an understanding of the recommended specifications and communication requirements we recommend you proceed to Samurai NTA Deployment

2 - Deployment

Deployment Considerations

Traffic Source

The NTA is a passive device and relies on client infrastructure to stream a copy of network traffic to the NTA’s monitoring interface. When deploying an NTA in a virtual environment or on AWS EC2, several key consideration should be addressed to ensure effective monitoring and minimal impact on performance:

Resource Allocation

  • Ensure the NTA meets the recommended specifications. In some circumstances the resources may not be sufficient and we will work with you on any modifications we recommend based on your traffic throughput once the NTA is deployed and running.

Multi-NTA Deployments

  • If your network throughput figures exceeds what a single NTA can accomodate you have the option to deploy multiple NTA’s to ensure coverage.

Network Topology and Segmentation

  • Map out the virtual network topology and identify where the NTA should be deployed for optimal coverage e.g east-west traffic which typically flows between VM’s connected in the same virtual switch or virtual network, or EC2 instances in the same VPC. Additionally north-south traffic which typically flows between internal and external networks such as web traffic.

Traffic Visibility

  • A stream copy of data needs to be provided to the NTA monitoring interface. Capturing traffic requires configuring network mirroring or traffic monitoring as outlined below based on your deployment:

    Virtual Environment

    • Network mirroring on a virtual switch is a method used to capture and analyze traffic passing through a virtual machine (VM) or virtual networks. This is typically achieved by configuring a port mirror, where a copy of the network traffic from one or more source ports is sent to a designated mirror port i.e the NTA mirror interface.
    • In a virtualized environment, network mirroring and promiscuous mode can be configured on a virtual switch (such as those in VMware vSphere, Microsoft Hyper-V or others) to facilitate traffic analysis without affecting the networks performance.

    virtual_nta.png

    Figure 1: The NTA in a virtual environment

    Amazon EC2

    • For deployment on an EC2 instance, VPC Traffic Mirroring is utilized which allows you to copy traffic from an Elastic Network Interface (ENI).

    aws_nta.png

    Figure 2: The NTA running atop AWS

Create Configure and Download an NTA

  1. Login to the Samurai MDR portal, click Telemetry and select Network Traffic Analyzer from the main menu

  2. Select Create

  3. Complete the fields as required.

FieldDescription
NTA nameA name for the NTA
Description (Optional)A description of your NTA
Location (Optional)Useful if you have NTAs in multiple locations
HostnameA hostname for your NTA
Proxy Server address (Optional)Optional HTTP proxy server (URL that contains a hostname or IP address with port e.g https://192.168.1.254:8080)
NTP Servers (Optional)Input your own NTP server IP addresses
SizeSelect the appropriate Size based on throughput
DHCP or StaticDetermine whether the NTA will use DHCP or specify static IP address and network information
  1. Select Create NTA once you have completed all relevant fields

  2. Select the NTA you created by clicking the NTA Name used in Step 3

  3. Select Download

  • The files you need to download are based on your deployment and hypervisor. The options available for download are:

    • Configuration
      • ISO - configuration file for the NTA, this file is always required for virtual machines
    • Cloud init
      • AWS - used to provide cloud-init data to an AWS EC2 instance
    • Virtual machine
      • vmdk - disk image (not needed if using the ova)
      • vhdx - virtual hard disk format used for Hyper-V
      • ova - virtual machine that the NTA will run (includes disk image) for VMware and/or Proxmox
  1. Download the appropriate files for your deployment.

NTA Installation

Based on your chosen deployment follow the relevant section:

VMware vSphere Installation

Follow the documentation from VMware:

  1. Provide a virtual machine name.
  2. Be sure to select the .ova file you downloaded when asked for the file to deploy your virtual machine from.

Once complete follow the VMware article to mount the config ISO file

  1. Be sure to select the .iso file you downloaded when asked to select file
  2. The management interface will by default be Network Device (net0)
  3. The monitoring interface will be by default Network Device (net1) - ensure it is connected to your monitoring network.
  4. The VM is now ready to be powered on.
  5. Jump to Deployment Status for next steps.

Proxmox VE Installation

Follow the documentation from Proxmox:

  1. Follow the steps to first setup a new storage for an import source.
  2. Refer to the OVA/OVF Import section to import the OVA file you downloaded from the SamurAI Portal.
  • Import the NTA configuration ISO file to Proxmox
  1. Navigate to the Datacenter - Storage section
  2. Select the storage where you want to store the ISO file
  3. Click on ISO Images

proxmox_step1.png

  1. Click Upload
  2. Choose the NTA ISO file and upload it using default settings

proxmox_step2.png

  • Configure the NTA virtual machine to use the NTA configuration file
  1. Select the NTA virtual machine and click on Hardware and then Add

proxmox_step3.png

  1. Select CD/DVD Drive

proxmox_step4.png

  1. Check Use CD/DVD disk image file (iso) and locate your NTA configuration file. Click Add

proxmox_step5.png

  1. The management interface will by default be Network Device (net0)
  2. The monitoring interface will be by default Network Device (net1) - ensure it is connected to your monitoring network
  3. The VM is now ready to be powered on.
  4. Jump to Deployment Status for next steps.

Microsoft Hyper-V Installation

Follow the documentation from Microsoft:

  1. Provide a virtual machine name
  2. Use the Virtual Machine Requirements when configuring memory and network
  3. When asked to Connect Virtual Hard Disk ensure to use the .vhdx file you previously downloaded
  4. For Installation Options ensure you use the .iso file you previously downloaded
  5. The management interface will by default be Eth0
  6. The monitoring interface will be by default Eth1 - ensure it is connected to your monitoring network
  7. The VM is now ready to be powered on.
  8. Jump to Deployment Status for next steps.

Amazon EC2 Installation

Prerequisitve steps:

  1. Ensure you have the AWS cloud-init.yaml file you downloaded from Create, Configure and Download an NTA.. This file will be used later during EC2 instance deployment.

Follow the vendor documentation from Amazon to launch a EC2 instance:

Follow the steps outlined in Launch an instance

Perform the following adjustments to the vendor documentation when launching the instance:

  1. During step 5.a, select Ubuntu as AMI.
  2. During step 5.b*,* select the latest Ubuntu 24.04 Server AMI
  3. During step 6*,* select a suitable Instance Type based on estimated performance requirements while fulfilling the Recommended Specifications.
  4. During step 7 & 7, Set Key pair & Network Settings as per your AWS policies. Ensuring the the Network settings still fulfills the Communications Requirements.
  5. Before step 9, modify the Configure storage section based on the appropriate NTA size disk requirements.
  6. Before step 9, expand the section Advanced details and paste in the content of the cloud-init.yaml file into the User data section. Ensure that the check box User data has already been base64 encoded is not enabled.
  7. Proceed with step 10 and finish the rest of the installation as per the vendor documentation.
  8. Jump to Deployment Status for next steps.

Deployment Status

Once you have deployed your NTA you can view the deployment steps and status within the Samurai MDR portal.

  1. Login to the Samurai MDR Portal

  2. Click Telemetry and select Network Traffic Analyzer from the main menu

  3. Click the relevant NTA from the presented list

  4. Under General the Status will display as Provisioning.

  5. Deployment Status will be displayed and along with phases and a timestamp. As the NTA builds the status will be listed and cycle green as completed. This includes:

No.Deployment Status MessageDescription
1.Initial call to backend. Network connectivity okFirst message sent to NTA Samurai backend, this indicates that the enrolment has started
2.Refreshing OS package listsRefreshing operating system software repository information
3.Upgrading packagesStarting updating operating system
4.Finished upgrading packagesOperating sytem update completed
5.Base OS update completedPost operating system update maintenance jobs completed
6.Initiating CTS Build XNTA installer downloaded and started
7.Running verification to ensure minimal requirementsInstaller started self check to verify minimum requirements and software settings
8.Completed verification to ensure minimal requirementsSelf check completed
9.Request device_idRequesting device identity
10.Request initStarted the registration process
11.Initiator successfully contacted backendContacting backend to retreive basic operating information
12.Downloading configurationDownloaded configuration
13.Logged in to dockerhubAuthorized to Docker hub to access private containers
14.Downloading Docker containersContainers was downloaded from Docker hub and are ready to be used
15.Storing device configuration to the backendSent device information to the backend
16.Starting ManagerStarting NTA manager software, more software/containers will be downloaded in the background
  1. Once the NTA has completed deployment, Status will display as Not Healthy as individual components need to start. Once complete the Status will be updated to Healthy which may take approximately 5 minutes.

Configure Traffic Mirroring

Once you have deployed your NTA you will need to determine the Monitoring interface.

  1. Login to the Samurai MDR Portal

  2. Click Telemetry and select Network Traffic Analyzer from the main menu

  3. Click the relevant NTA from the presented list

  4. Select System Information and view Network which will display the Management and Monitoring interfaces. Take note of each MAC address and ensure it aligns with the relevant configuration for your hypervisor or AWS EC2 configuration.

  5. You will now need to configure traffic mirroring to the monitoring interface of the NTA. Based on your chosen deployment. We advise you to refer to vendor documentation for traffic mirroring as environments may differ. We have provided some useful links based on your deployment model:

VMware VSphere

Microsoft Hyper-V

The following Microsoft documentation is based on Microsoft Defender for IoT, however is applicable to traffic mirroring configuration in general.

Amazon EC2

Delete an NTA

If you need to delete an NTA you can do so by following the steps below:

  1. From the Samurai MDR portal click Telemetry and select Network Traffic Analyzer from the main menu

  2. Select the relevant NTA from your list

  3. On the left hand side of the relevant NTA, click on delete_nta.png (more options) and select Delete NTA

  4. The following warning will appear: ‘Warning: This is a destructive action and cannot be reversed.’. To ensure you intended to delete the NTA you will need to type DELETE in the field and select Delete NTA

What’s Next?

You have now deployed and configured your NTA. Refer to NTA Details.

3 - NTA Details

In this article all elements of the Network Traffic Analyzer are outlined to help you understand the panels available.

List all NTAs

  1. Login to the Samurai MDR Portal

  2. Click Telemetry and select Network Traffic Analyzer from the main menu

  3. A list of all NTAs will be displayed. Various fields are displayed based on information you included when creating the NTA.

  4. Click on an entry to drill into an NTA’s details.

General

The General panel of an NTA provides an overview of the NTA and status.

FieldDescription
StatusStatus of the NTA. See NTA status for list of potential statuses
DescriptionA decription field for your NTA. You can edit this field at any time
LocationPopulated from Location specified during creation of the NTA
HostnameHostname specified during creation of the NTA
SizeThe size selected during creation of the NTA

NTA Status

StatusDescription
OfflineNTA created but not online
Not availableNTA has been online but no longer available
HealthyNTA deployed and components healthy
Not-HealthyComponent(s) deployed on the NTA not healthy
ProvisioningNTA is in setup

Current Status

The Current Status widget provides a visual representation of the CPU, Memory and Disk usage of the NTA. Each metric is displayed as a half-donut chart, offering a quick visual snapshot of system load.

MetricDescription
CPU UtilizationDisplays the percentage utilization across all CPU cores.
Memory UtilizationDisplays the percentage of system memory consumed.
Disk Utilization /Represents the percentage of storage space used for the system disk.
Disk Utilization /srvRepresents the percentage of storage space used for the data disk. Monitoring this metric ensures sufficient space for data/memory cache

This widget may also include status messages of individual components of the NTA, this will assist with identyfing any problems the NTA encounteres. raising a ticket with the Samurai SOC.

NTA Status Notifications

Samurai will send email notifications to registered application users should your NTA status change from Healthy to Unavailable. The Samurai team monitor deployed NTAs and it is our responsibility to maintain health, availability and rectify any problems, however we may reach out to you if you are required to make any changes. Once any issues have been resolved, you will also be notified when a Healthy status is reached.

System Information

The System Informatiom panel displays important NTA system information and metrics including:

System

FieldDescription
Operating SystemThe NTA leverages Ubuntu, it is our repsonsibility to maintain the Operating System.
CPUCPU information captured
CoresNo. of physical and logical cores of the NTA
MemoryTotal memory of the NTA
SwapAllocated disk space used as virtual memory

Storage

FieldDescription
MountDirectory where storage device or parition is attached to the file system
DeviceRepresents the virtual storage medium by path or Amazon EBS volume
SizeCapacity of storage device or partition
UsageAmount of storage consumed in %

Network Management

FieldDescription
ConfigurationStatic or DHCP
IPv4The assigned IP address. The Monitoring interface will not have an IP address
Proxy serverProxy server configured during cofiguration creation
NTP serversNetwork time protocol servers configured during configuration creation
InterfaceVirtual adapter
TypeManagement interface
MACUnique identifier assigned to the interface
Current BandwidthThe data transfer rate of the network interface measured in Mbit/s

Network Monitoring

FieldDescription
InterfaceVirtual adapter
TypeMonitoring interface
MACUnique identifier assigned to the interface
Current BandwidthThe data transfer rate of the network interface measured in Mbit/s

Metrics

All metrics displayed are by default over the past 2 hours however you can adjust via the Time Picker

MetricDescription
CPU UtilizationDisplays the percentage utilization across all CPU cores. High usage may indicate heavy traffic analysis or potential system strain
Memory UtilizationDisplays the percentage of system memory consumed. Persistent high usage could impact performance and may require optimization
Disk UtilizationRepresents the percentage of storage space used across each disk mount. Monitoring this metric ensures sufficient space for traffic data and system operations
Bandwidth UtilizationDisplays bandwidth utilization of the mirror interface in Mbit/s

Alerts

The Alerts panel displays security detections made by the NTA.

You do not have to act on any alerts as the Samurai SOC analysts triage, investigate and validate alerts as part of the Managed Detection & Response (MDR) service.

As alerts are validated by the Samurai SOC analysts and investigated, they may potentially lead to a reported Security Incident and are marked accordingly. Our strategy includes visibility and transparency of the service we provide to you therefore this feature provides you that visibility showcasing the value of the NTA and service.

Alerts Summary

Alerts are summarized in a panel which can be updated based on a specified time period and includes:

  • Security Incidents - the total number of security incidents reported to you that may correspond to one or more alerts.
  • Alerts - the total number of alerts detected by the NTA.
  • Real-time engine- the total number of alerts created by the NTA resident Samurai real-time engine.
  • Vendor - the total number of alerts created by the NTA resident Intrusion Detection System (IDS) - Suricata.

Filters

Various filters are available to determine the alerts to be displayed.

alerts_filter.png

Figure 1: Time and Display filter

The total number of alerts within the alerts table in displayed to the left of the Time Period filter.

Time period

You can update all panels to specific date and time ranges. We default to the Last 24 hours however have included Quick time ranges.

time_picker.png

Figure 2: Date and time selection

Display Filter

Enter any values you wish to filter and highlight within the display filter.

alert_displayfilter.png

Figure 3: Display filter

Alert Column Filter

Adjust and show/hide any of the column values within the Alert Table.

alert_columnfilter.png

Figure 4: Alert column filter

Alerts Table

All alerts related to the NTA are listed within the alert table, it is important to note is that the table is limited to 10,000 alerts therefore apply filters to narrow the results.

For description of each field within the Alert table refer to Alerts Table