The most recent content from our members.
What’s in a log file? The very purpose of IT security is to be proactive make it difficult for someone who attempts to compromise your network. You also need to be able to detect the actual breaches as they are being attempted. This is where log data really helps. Collecting and analyzing logs, help you can understand what…
I noticed that one of my rules stopped firing emails and upon digging around, I found that wildcards are not performing like they used too. For example... Say I have this log entry where the Event Info was: "Member John Doe was added to group Domain Admins" My rule would first off search for "Member*added to group*". That…
Using LEM Desktop Console managing two appliances (one 5.6.0 full, one 5.6.0 trial), attempt to create a user defined group and assign to the second appliance in the group. When saving, the selected appliance is reverted to the first appliance in the drop down menu. Disconnect from the first appliance in the list and…
It looks like you're new here. Sign in or register to get started.