Get the latest news about SolarWinds Security Event Manager (SEM)
Wanted to see if the SEM has any abilities to capture the use of a portable application? Software installed are controlled but wanted to see if we can capture the use of portables on the servers and get an email. Let me know if you have tired to set up a rule similar to this. Thanks,
I just have a local login set up for SEM in our environment. I am able to log into the web interface with this login, but when I try to log into the management interface console on the virtual appliance, these same credentials are rejected. Any ideas as to what I am doing wrong?
Hello all! With Adobe Flash officially off the table, the SEM product team wants to check in with you: How are you finding the HTML5 interface? What do you like? Is there anything that you miss about the Flash console? We're all ears! Send an email over to ashley.orr@solarwinds.com to schedule a 1-hour WebEx call to chat.
Sorry but what does SolarWinds use Flash for? I was not aware and told the desktop folks they could remove it. Ugh
I can see the SNMP traps getting to the SEM through the logs but it doesn't show up on the actual UI, This is very frustrating. Is there something I am missing?
Recently we have installed the LEM virtual appliance to collect devices' syslog as PoC. According to the guides, the LEM can block IP via Fortigate. Then we added the Fortigate into LEM, set up the connectors(Fortigate and active response、email active response). After that, we created a rule about logon the fortigate…
So I've noticed that each time I upgrade the SEM agent (local or remote installer), the previous version remains listed in Programs & Features and the old registry key sometimes remains on the system. Is there a reason the old version isn't be cleaned out during the upgrade process? On some machines I've seen 3 or more…
The best thing so far is threaded replies so you can see who replied to who... I still can't understand how any platform wouldn't have that? Anyhow so I have the latest SEM installed in a new area and am about to upgrade my 2020.2.1 larger system to latest version. I got some conflicting info at first and opened a case…
Is there a connector for carbon black app control?
I'm new to SEM so excuse my noob question. I am wanting to monitor a specific Windows Security Event and have this rule alert only 1 specific system. Firstly I would just like to get this to alert on the event, and then narrow it down. I am interested in the FIle Audit event 4663 in the Windows Security log. So far I have…
It looks like you're new here. Sign in or register to get started.