Critical vulnerability in Linux and Mac

Critical vulnerability in Linux and Mac

libssh vulnerability: Critical flaw in Linux and Mac SSH/SFTP services A critical vulnerability has been discovered in libssh – the implementation library for Secure Shell (SSH) that could allow anyone connect to computers remotely without knowing your password....
Windows 10 Start menu

Windows 10 Start menu

Windows 10 Start menu About AppLocker Creating AppLocker rules Summary Introduction Recently our security team discovered several issues with Windows 10 (Enterprise and Education versions) in Active Directory domain. We will try to describe how it all started, below....
Eset Remote Administrator App for Splunk

Eset Remote Administrator App for Splunk

Eset Remote Administrator App for Splunk About data visualization and Splunk apps Shortly about app App Description Summary Links About data visualization and Splunk apps The best method to explain the significance of information is to display it in a visual context....
How to configure log collection from Cisco FirePower to Splunk

How to configure log collection from Cisco FirePower to Splunk

How to configure log collection from Cisco FirePower to Splunk Installing and configuration of a Splunk Add-on Prerequirements Firepower Management Center configuration Installing and configuration Splunk eStreamer eNcore App Summary Troubleshooting Example 1 Example...
Windows Event Collector orchestration 2

Windows Event Collector orchestration 2

Windows Event Collector orchestration Create a Group Policy Add WEC to the special user group Add read access to security logs for winRM services Restricted Group creation WinRM service configuration Summary Introduction As the continuation of the previous article, we...
Windows Event Collector orchestration

Windows Event Collector orchestration

Windows Event Collector orchestration Different Methods of log collection Splunk Universal Forwarder VS WEC How it works (Solution overview) Installation description Subscription creation process Summary Introduction This blog is one of many in a series that will...