The most recent content from our members.
Have you ever struggled to keep up with a flood of compliance report requirements? Or have you found it challenging to distill security data into clear, concise formats for management? Perhaps you've been searching for a SIEM solution that balances simplicity with customization. If you've nodded along to any of these…
The Log & Event Manager team is pleased to announce the official release of LEM 6.1. Features included in this release: * NEW: Getting Started experience - configure LEM basic settings and easily walk through all the steps to get LEM up and running from one place * NEW: Rules Configuration Wizard - quickly enable LEM rules…
Last week, we released version 6.0.1 of Log & Event Manager. Normally we don't make too much noise about service releases (minor dot releases) 'round these parts, but this time we decided to make an exception. We packed a lot of security enhancements and customer requests into this release that you should definitely be…
The Log & Event Manager team is proud to announce General Availability of our 5.3 version. All customers can download the upgrade via the SolarWinds Portal. We think there's a bunch of features that make LEM 5.3 as cool as a Lunar Excursion Module, but here's the rundown so you can decide for yourself! Download a Free and…
We wrote back in 2012 about the challenges of SharePoint auditing and how to address them via Auditing SharePoint with LEM & LOGbinder SP, but the folks over at Monterey Technology Group (the same folks who brought you Ultimate Windows Security) went on to create even MORE useful Microsoft auditing tools. This time…
Hey All, With the recent release of Log & Event Manager 5.3 (read more about that on the blog over here), our development team is working on some pretty great features requested by a lot of customers. Hyper-V Virtual Appliance Support It's hard to ignore Microsoft's increased presence in the virtualization market, and…
In case you missed it, the Log & Event Manager team has recently rolled out new pricing related to monitoring workstation nodes. The goal of this addition is to make it much more affordable for you to monitor workstations together with your servers and network devices in LEM - or even by themselves, if you're solely…
Some say they can secure the unsecureable, manage the unmanageable, and that even Chuck Norris is forced to be compliant. All we know is, they are called… the STIGs. Updated June 29, 2015 The Department of Defense’s Defense Information Systems Agency (DISA) has a set of security regulations that help set a baseline…
Microsoft has taken to increasing the complexity of some of their product auditing functions, starting with Exchange and SharePoint's auditing implementations in the 2010 versions. Gone are the days of simple configurations to log to the event log, here are the days of audit tables, databases, and API calls. This makes it…
One of the things that we wanted to do for this release was to split out the Windows Filtering Platform (WFP) from the Windows Security log connector. Why are we splitting this out into a separate connector? This is being split out because customers frequently call into support after being completely overwhelmed with the…
It looks like you're new here. Sign in or register to get started.