The most recent content from our members.
Good lords, good ladies, let it be proclaimed amongst all the lands that a challenge has been put forth by the realm of THWACK. Their royal highnesses request assistance in vanquishing the knaves which dost set our countryside aflame with their most heinous acts. Through deeds most devilish, these scofflaws have waylaid…
I am going to create accounts and the accounts should have privilege to add their nodes, but if there will be multiple account with the right to add their nodes should not see the information of other accounts.
If you aren't aware by now, the world is a dangerous place. Hackers are on the loose, insider threats are rising, and worst of all – compliance auditors are double and triple checking everything. Your mission, if you choose to accept is to be the best Security IT Pro the world has ever seen. To help you complete your…
Hello, After creating customized filtered report (SolarWinds Knowledge Base :: Creating a Custom Filtered Report), I would like to rename the Report title name in the GUI (Category - Custome reports). How can I rename the report ?? Regards, HA
The day starts like any other. You’re finally starting to feel like you’ve got a handle on the security posture of your enterprise, because you’ve been able to add a reasonable amount of visibility into the infrastructure: * You have a Netflow collector reporting anomalies. * Taps or network packet brokers are installed at…
Does anyone know the credentials? Or how to set this up? Many thanks
Those of you in IT administration (particularly IT security) know the challenges involved with protecting corporate data stored in your network. You also know that you regularly face an onslaught of new and sophisticated hacking methods, malware, and other threats. It is an uphill task to safeguard data—especially the…
Hi, I have Synology NAS device, where there is no connector for it in LEM. But this device is capable of sending logs to any Syslog server, configured. I want to know if I can receive the raw logs in LEM, without being normalized by connectors, as there is none. And later query those logs using nDepth etc??? Please advise.
Hi, I created OPSEC connector When I started it, internal warning appears immediately and no event is collected. Can you give me a hand? Thanks in advance
I have a Rule setup in LEM to detect failed logins, after 5 failed logins in 5 minutes the Source Machine will be added to a User Defined Group as a Suspect System. I have a 2nd rule that will look for successful logins from the Suspect System list of Source Machines and if detects a successful login from a system on that…
It looks like you're new here. Sign in or register to get started.