The most recent content from our members.
It would be incredibly valuable to extend the Vulnerability and Risk Dashboard to include visibility into Red Hat Enterprise Linux (RHEL) systems. Currently, the dashboard provides excellent insights for Windows environments, but many organizations — including ours — rely heavily on Linux infrastructure, particularly RHEL,…
The status of antivirus and firewall investigated upon the installation of SolarWinds agent. The agent works fine and the status information is correct on the inventory list. The issue is when the information retrieves from the report section, instead of on or off state ambiguous numbers are generated based on AV or…
In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a secure environment. We’ve all heard the phrase, “you can’t defend what you can’t see,” but, you also “can’t defend what you don’t understand.” Use cases…
This blog series has been all about taking a big step back and reviewing your ecosystem. What do you need to achieve? What are the organization’s goals and mandates? What assets are in play? Are best practices and industry recommendations in place? Am I making the best use of existing infrastructure? The more questions…
The first three blogs in this series were all about building a blueprint for a well-designed environment. In this article, we’ll review more practical considerations to influence the overall architecture and design of the ecosystem, which in turn require specific features and methodologies as dictated by the required data…
A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan, one more assessment should be done involving the application of best practices and compliance mandates. Best practices are informative rule sets to…
I want to monitor Kaspersky security center 10 in SolarWinds LEM (Logs & Events Manager), Would you please guide me which connectors i need to configure for Kaspersky security center 10, which settings need to configure in connectors, and a requirement i need to configure to get Kaspersky security center10 complete logs in…
Now that we all carry supercomputers complete with real-time GPS mapping in our pockets, a reference to physical maps may feel a bit antiquated. You know the ones I’m talking about; you can still find them at many malls or theme parks, and even some downtown city streets. It’s usually a backlit map on a pillar with a…
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several methodologies that can be part enterprise protection plan. Let’s first clarify “protection.” There is no silver bullet for preventing all attacks.…
In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The most common way of doing this is by forwarding event logs to a syslog server or SIEM tool. The benefits of telemetry consolidation are: * Scalability…
It looks like you're new here. Sign in or register to get started.