Hi Jeff,
Thanks for the reply, I appreciate it. I originally started down this path by creating the fingerprints from scratch. I still had traffic that was showing up in the generic CIFS group though. After reading the manual, I went the path of right clicking on the actual flow to fingerprint it that way.
Essentially, what I've done is created fingerprints for TCP 139, 445 on network A and UDP 137, 138 on network A, categorize as Backup CIFS. When I say network A, I'm adding a fingerprint by address, mask and port. So I say 12.34.56.78/24 on 445 is Backup CIFS.
However, when I look at the flows, I see traffic on TCP 445 on network A as generic CIFS. Some of the traffic does match as it should, which is where I start to scratch my head. Is there a gotcha to fingerprinting client traffic? I think the issue is that the backup software initiates a CIFS connection, which tells purview that it's the client. I'm not sure if fingerprints have a bias towards identifying the server side of the traffic?
Thanks much.
Andrew