The most recent content from our members.
By Paul Parker, SolarWinds Federal & National Government Chief Technologist Much has been written about aging government IT networks, but not enough attention has been paid to the maturity of those networks. While it’s important for agency IT professionals to modernize legacy networks, it is equally critical for them to…
Every now and then we keep hearing about the botnet attacks, one of the most significant network security threats that organizations are facing today. What are they and how are they a security threat? A botnet comprises a bunch of computers that are under the control of a single “botmaster” machine, mostly known as command…
I've been poking around in LEM trying to figure out how to get this to occur; it should be as simple as searching for the Event IDs. We want to get an alert when the Security event log for Server 2003 / 2008 is cleared. What's the best way to create this rule? I'm not sure if this falls under MachineAudit, Security Alert,…
It's always good to stay grounded and get back to the basics once in a while. Being in the world of security information and event management (SIEM), we keep hearing of so many securitythreats and breaches, and this was one such thing with which the week started. A Security Week report said some suspected Chinese hackers…
Hi. I am being tasked to report any switch interface where 802.1x is disabled. We have oodles of switches. Are there any canned security audit reports that can tell me this? If not, is it possible to write one?
It looks like you're new here. Sign in or register to get started.