• Monitoring Users' URL!!!!

    Hi,   In my organization I have some workstations based on Windows 8, Mac book pro, IMac and IPad which are connected to an apple ‘s Router (Airport Utility) .   I need to Monitor and LOG my Users̵...
    Profile Photo
    last modified by nima.gharehdaghi
  • Cisco Compliance Solution for PCI DSS

    This is a helpful document to provide the user with a background on different devices that may be used within the Enterprise. 
    Profile Photo
    last modified by CourtesyIT
  • DISA STIG Configuration Templates for Cisco.pdf

    Hello,   Thank your for downloading this document.  I hope it will assist you in your quest to become DISA STIG Compliant.  These templates were design to make your life easier.  If you enjoy thes...
    Profile Photo
    last modified by thegreateebzies
  • Best Practices for Log Management

    With rob.johnson   Having worked with log management and SIEM (Security Information and Event Management) for several years, I have learned how critical it is to create a log collection plan and determine what y...
    Profile Photo
    last modified by thegreateebzies
  • Log Management for a Security Pro

    With rob.johnson   Having worked with log management and SIEM (Security Information and Event Management) for several years, I have learned how critical it is to create a log collection plan and determine what y...
    Profile Photo
    last modified by thegreateebzies
  • Log Management for a Network Admin

    With rob.johnson As a Network Admin or Engineer, you may be tasked with or have the need to centralize your network device logs into a log management system. Network devices are some of your busiest systems, and ...
    Profile Photo
    last modified by thegreateebzies
  • Log Management for a System Admin

    With rob.johnson   Systems Administrators face a unique challenge when tasked with managing log collection because they have to support a diverse environment. Typically, SysAdmins are responsible for servers and...
    Profile Photo
    last modified by thegreateebzies
  • Compliance for a Security Pro

    Now that you have been placed in charge of security and compliance, how will you prepare for an audit? Here are some best practices that should help you ALWAYS be prepared for future audits.   DOCUMENT, DOCUMENT,...
    Profile Photo
    last modified by thegreateebzies
  • Compliance for a Sys Admin

    If you’re a System Administrator who is also tasked with providing audit data for security compliance, you have an interesting challenge. Server, application, database, Web, and file activity logs are a few exam...
    Profile Photo
    last modified by thegreateebzies
  • Best Practices for Root Cause Analysis

    Best Practices for Root Cause Analysis Root cause analysis (RCA) is probably the most critical function in security outside of maintaining a secure and compliant network. Anytime a security event has been detected or ...
    Profile Photo
    last modified by thegreateebzies
  • Root Cause Analysis for a System Admin

    System Admins face challenges everyday trying to figure out why a server or application is not performing well or why a system crashed during the night. The task of finding the root cause becomes even more difficult w...
    Profile Photo
    last modified by thegreateebzies
  • Root Cause Analysis for a Network Admin

    Root Cause Analysis for a Network Admin   Root cause analysis (RCA) for Network Admins typically centers on network performance issues. Because the network is the backbone of any business, you may also be tasked...
    Profile Photo
    last modified by thegreateebzies
  • Compliance for a Network Admin

    As a Network Administrator, you may be tasked with keeping audit trails and providing reports based on the request of a compliance auditor or a member of management that is undergoing an audit. Here are some best prac...
    Profile Photo
    last modified by thegreateebzies
  • Root Cause Analysis for a Security Pro

    Root cause analysis (RCA) is probably the most critical function in security outside of maintaining a secure and compliant network. Anytime a security event has been detected or even perceived, you are tasked with dis...
    Profile Photo
    last modified by thegreateebzies
  • Securing your UPS from a DOS attack

    A Thwack member asked a question about why their NPM wasn't discovering a UPS, and that discussion brought to mind some ideas that might not be in the front of a UPS Administrator's mind . . .     A UPS is ...
    Profile Photo
    last modified by thegreateebzies
  • Best Practices for Compliance

    As an IT security professional, over the past 10+ years, I’ve had the distinct pleasure of grinding through compliance audits in both government and commercial sectors. I have also assisted many other security p...
    Profile Photo
    last modified by thegreateebzies