Integrating AIFF with NVIDIA DOCA Argus

This section assumes that you are familiar with these products and how to configure them:

This section describes only the specific steps to integrate these components.

Prerequisite

The AIFF Container must connect to the Internet to communicate with Check Point ThreatCloud.

Configuration Steps

Example Detection of a Malicious Process

  1. A new process starts on the Host Server.

  2. The DOCA Argus Container identifies that a new process started and reports it.

  3. The Check Point AIFF Container sends the process hash to the Check Point ThreatCloud database.

  4. The process is identified as malware.

  5. The Check Point AIFF Container sends a log to the Management Server.

    Example: