{"id":6740,"date":"2019-11-05T01:01:09","date_gmt":"2019-11-04T21:31:09","guid":{"rendered":"https:\/\/www.apk.co.ir\/security\/?p=6740"},"modified":"2019-11-05T01:01:09","modified_gmt":"2019-11-04T21:31:09","slug":"what-is-advanced-threat-analytics","status":"publish","type":"manual_kb","link":"https:\/\/www.apk.co.ir\/kb\/what-is-advanced-threat-analytics\/","title":{"rendered":"ATA \u06cc\u0627 \u0622\u0646\u0627\u0644\u06cc\u0632 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0686\u06cc\u0633\u062a\u061f"},"content":{"rendered":"

(Advanced Threat Analytics (ATA \u06cc\u06a9 \u0633\u0627\u062e\u062a\u0627\u0631 On-Premise \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u0645\u062d\u0627\u0641\u0638\u062a \u0627\u0632 \u0633\u0627\u0632\u0645\u0627\u0646 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u0627\u0646\u0648\u0627\u0639 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u062f\u0627\u062e\u0644\u06cc \u0648 \u062d\u0645\u0644\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0647\u062f\u0641\u0645\u0646\u062f \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u06a9\u0645\u06a9 \u0645\u06cc\u200c\u06a9\u0646\u062f.<\/p>\n

\u0646\u062d\u0648\u0647\u200c\u06cc \u0639\u0645\u0644\u06a9\u0631\u062f <\/strong>ATA<\/strong><\/h2>\n

ATA \u0627\u0632 \u06cc\u06a9 \u0645\u0648\u062a\u0648\u0631 \u062c\u062f\u0627\u06a9\u0646\u0646\u062f\u0647\u200c\u06cc \u0634\u0628\u06a9\u0647\u200c\u06cc \u0627\u062e\u062a\u0635\u0627\u0635\u06cc \u0628\u0647\u0631\u0647 \u0645\u06cc\u200c\u0628\u0631\u062f \u062a\u0627 \u062a\u0631\u0627\u0641\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0645\u0627\u0646\u0646\u062f \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc\u06cc \u0646\u0638\u06cc\u0631 Kerberos \u060c DNS \u060c RPC \u060c NTML \u0648 \u063a\u06cc\u0631\u0647\u060c \u0631\u0627 \u0628\u0631\u0627\u06cc \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a\u060c \u062d\u0642 \u062f\u0633\u062a\u0631\u0633\u06cc \u0648 \u06af\u0631\u062f\u0622\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a Capture \u0648 \u0645\u062c\u0632\u0627 \u0646\u0645\u0627\u06cc\u062f. \u0627\u06cc\u0646 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062a\u0648\u0633\u0637 ATA \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0645\u0648\u0627\u0631\u062f \u0630\u06cc\u0644 \u06af\u0631\u062f\u0622\u0648\u0631\u06cc \u0645\u06cc\u200c\u06af\u0631\u062f\u062f:<\/p>\n