NXLog Team

@Nxlog_team

NXLog is a name known for its exclusive log collection capabilities, and is trusted by network security experts and partners who also rely on our technology.

Vrijeme pridruživanja: srpanj 2018.

Tweetovi

Blokirali ste korisnika/cu @Nxlog_team

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Nxlog_team

  1. prije 12 sati

    However, if you are looking for configuration samples and guidance on to collect see our new section complete with configuration samples to get started.

    Prikaži ovu nit
    Poništi
  2. prije 12 sati

    Very interesting question to ask. Anyone have more ideas? "What are your most commonly excluded IDs? Setting up Event ID to a server and I'm trying to filter out the extra fluff. What IDs are just plain unnecessary?"

    Prikaži ovu nit
    Poništi
  3. 1. velj

    There are several ways that related logs can be acquired; Group Policy Operational logs and Security logs from , Event Tracing for Windows (ETW) and File-based logs found in the file system.

    Poništi
  4. 29. sij

    Efficient log collection is one of the key components for a successful deployment in this whitepaper published by . NXLog can be integrated with USM for

    Poništi
  5. 28. sij

    There are multiple ways to collect events with NXLog: from the , tracing them using ETW, monitoring them in Windows Registry and reading the .log file in the file system.

    Poništi
  6. 27. sij

    MITRE ATT&CK for Industrial Control Systems released. ATT&CK for ICS is a knowledgebase useful for describing the actions an adversary may take while operating within an . Use NXLog to collect to help detect potential adversary tactics.

    Poništi
  7. 24. sij

    On the /r/sysadmin thread "Securing a Windows network", a user suggests "Setup graylog or some other log consolidation tool and use nxlog on everything to start a logging repository." but see the post for the full advice for !

    Poništi
  8. 23. sij

    "Security Engineering includes foundational and wide reaching strategic projects. Examples could include centralized , identity, asset management of devices, policy enforcement of systems and network infrastructure [..]" by

    Poništi
  9. 23. sij

    On /r/Cisco: "If you are on a AD/windows environment, you should be able to use NXlog to redirect the DNS server logs over to graylog." -> See our Cisco ASA section at

    Poništi
  10. 21. sij

    Just released: A new section and sample configuration snippets to monitor for security-relevant Windows Event Log IDs. Use the im_msvistalog module available in the Community and Enterprise Editions.

    Poništi
  11. 20. sij

    The OWASP Foundation has included "Insufficient Logging and Monitoring" in the OWASP Top 10 Risks 2019 list. Read the full list at

    Poništi
  12. 20. sij

    Did you know? You can configure to configure an alarm with NXLog. Interesting thread about configuring a sound alarm but look into invoking a program using xm_exec module

    Poništi
  13. 17. sij

    The process of how you can get threat intelligence into your environment is an important component to consider for your . Our integrations with various SIEM suites will help build a solid foundation in obtaining this intel.

    Poništi
  14. 16. sij
    Poništi
  15. 15. sij

    Very interesting post on how an attacker can go from 0 to lateral movement in 36 minutes? These indicators (ie from PsExec, new logins, RDP events, etc) can actually be logged using NXLog modules such as im_msvistalog for Windows Event IDs.

    Poništi
  16. 13. sij

    "However, reality proves that security analysts are bombarded with long, manual, and time-consuming tasks preventing a speedy response. One of those major roadblocks is data does not exist or limited data is only available in cold storage[...]"

    Poništi
  17. 9. sij

    "The approach is to collect everything as-is and apply different analytics based on the questions you’ll need to answer in the future." (from Omar of )

    Poništi
  18. 9. sij

    " are different because the structure of the logs does not have to be defined when data is captured." (from Omar of )

    Poništi
  19. 7. sij

    Yes, don't try to hunt before there is logging and collection indeed. An interesting post to read and think about to improve your team's capabilities.

    Poništi
  20. 7. sij

    Level up your NXLog admin skills with our enhanced section in the User Guide.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·