Critical vulnerability in Linux and Mac

Critical vulnerability in Linux and Mac

libssh vulnerability: Critical flaw in Linux and Mac SSH/SFTP services A critical vulnerability has been discovered in libssh – the implementation library for Secure Shell (SSH) that could allow anyone connect to computers remotely without knowing your password....
Windows 10 Start menu

Windows 10 Start menu

About AppLocker Creating AppLocker rules Summary Introduction Recently our security team discovered several issues with Windows 10 (Enterprise and Education versions) in Active Directory domain. We will try to describe how it all started, below. We needed to implement...
Eset Remote Administrator App for Splunk

Eset Remote Administrator App for Splunk

About data visualization and Splunk apps Shortly about app App Description Summary Links About data visualization and Splunk apps The best method to explain the significance of information is to display it in a visual context. Recently we have created an add-on for...
How to Configure Log Sending from Cisco Firepower to Splunk [2023]

How to Configure Log Sending from Cisco Firepower to Splunk [2023]

In this article, we are going to describe the process of connecting Cisco FirePower Threat Defense with Splunk in the case of using the Cisco Firepower Management Center. The Main Reason to Connect CISCO Firepower eStreamer to Splunk SIEM Cisco ASA FirePower is Next...
Windows Event Collector orchestration 2

Windows Event Collector orchestration 2

Create a Group Policy Add WEC to the special user group Add read access to security logs for winRM services Restricted Group creation WinRM service configuration Summary Introduction As the continuation of the previous article, we are going to share information about...
Windows Event Collector orchestration

Windows Event Collector orchestration

Different Methods of log collection Splunk Universal Forwarder VS WEC How it works (Solution overview) Installation description Subscription creation process Summary Introduction This blog is one of many in a series that will discuss log collection variants. Today we...