Critical vulnerability in Linux and Mac

Critical vulnerability in Linux and Mac

libssh vulnerability: Critical flaw in Linux and Mac SSH/SFTP services A critical vulnerability has been discovered in libssh – the implementation library for Secure Shell (SSH) that could allow anyone connect to computers remotely without knowing your password....
Windows 10 Start menu

Windows 10 Start menu

About AppLocker Creating AppLocker rules Summary Introduction Recently our security team discovered several issues with Windows 10 (Enterprise and Education versions) in Active Directory domain. We will try to describe how it all started, below. We needed to implement...
Eset Remote Administrator App for Splunk

Eset Remote Administrator App for Splunk

About data visualization and Splunk apps Shortly about app App Description Summary Links About data visualization and Splunk apps The best method to explain the significance of information is to display it in a visual context. Recently we have created an add-on for...
How to configure log collection from Cisco FirePower to Splunk

How to configure log collection from Cisco FirePower to Splunk

Installing and configuration of a Splunk Add-on Prerequirements Firepower Management Center configuration Installing and configuration Splunk eStreamer eNcore App Summary Troubleshooting Example 1 Example 2 Introduction In this article we are going to describe the...
Windows Event Collector orchestration 2

Windows Event Collector orchestration 2

Create a Group Policy Add WEC to the special user group Add read access to security logs for winRM services Restricted Group creation WinRM service configuration Summary Introduction As the continuation of the previous article, we are going to share information about...
Windows Event Collector orchestration

Windows Event Collector orchestration

Different Methods of log collection Splunk Universal Forwarder VS WEC How it works (Solution overview) Installation description Subscription creation process Summary Introduction This blog is one of many in a series that will discuss log collection variants. Today we...
Share This