Using PowerShell to Search and Troubleshoot Windows Event Logs

Using PowerShell to Search and Troubleshoot Windows Event Logs

Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what […]

Don’t be like Facebook. How Configuration Management Can Prevent Outages and Security Issues

Don’t be like Facebook. How Configuration Management Can Prevent Outages and Security Issues

Improper configuration changes to a network—or even just one server on a network—can cause huge issues. They can degrade network performance, shut down key services, and even result in noncompliance with regulatory standards like SOX, PCI, HIPAA and FISMA. And they can compromise network security. You don’t have to look far to see the disastrous […]

How Device Roles Reduce Administrative Headaches

How Device Roles Reduce Administrative Headaches

Here’s a familiar refrain in IT media: Today’s corporate networks are much different than they were 10, five, or even two years ago. It’s cliched, but it’s true: Modern IT networks are bigger, messier, and more dynamic than they used to be. For system and network administrators, that means it’s now a lot more difficult […]

How to Tune Windows System Monitor (Sysmon)

How to Tune Windows System Monitor (Sysmon)

One of the more disheartening aspects of log collection within the Windows Operating system are the limited number of out of the box events related to security. It is often desirable to capture any unknown or malicious running processes, capture the source process for outbound connections, identify modifications to files and the registry, and to […]

Centralizing Windows Event Forwarding

Centralizing Windows Event Forwarding

If you are a systems administrator or a security engineer, it is probable you have a requirement to filter and forward Windows event logs either directly or hierarchically. There are many alternatives available to accomplish this goal, one of which is Windows Event Forwarding (WEF).  In this article, you will learn to configure a simple […]

As The Web Turns 30, The Digital Dark Age is Coming

As The Web Turns 30, The Digital Dark Age is Coming

The World Wide Web’s 30th birthday came and went this week, and though there was much to celebrate—just look how far we’ve gone since the days of America Online CDs and Yahoo! chat rooms— it also seems like the problems the Internet causes are beginning to outweigh the problems it solves. Tim Berners-Lee, who is considered the founder […]

Network Bandwidth Usage: How To Optimize Your Network

Network Bandwidth Usage: How To Optimize Your Network

Company bandwidth usage has, for reasons other than expected growth, increased dramatically and continues to do so every year. Over time this usage is going to increase beyond your workforce’s limitations, which poses an important challenge for IT teams. How do you calculate and optimize the use of the bandwidth you have available to ensure your […]

How to Strengthen Your SIEM Capabilities by Leveraging Log Management

How to Strengthen Your SIEM Capabilities by Leveraging Log Management

It’s certainly clear that IT teams that utilize a Security Information and Event Management (SIEM) solution are better positioned to protect the digital assets of their companies. SIEM aggregates vital data from multiple sources and provides alerts that enable IT to detect, prevent, isolate and mitigate security threats. But given today’s cybercriminal environment, where new […]

Are Disruptive Technologies Making Bandwidth Monitoring More Important?

Are Disruptive Technologies Making Bandwidth Monitoring More Important?

As a former cubicle-based drone, I can readily identify with the bandwidth problems faced by users, with slowdowns and interruptions suffered for a variety of reasons, whether it is essential backups best run after-hours, problems with new security patches or updates, failing hardware or streaming video addicts. Unfortunately, when even data centers are debating how […]

How to Easily Monitor Bandwidth Usage Per Device

How to Easily Monitor Bandwidth Usage Per Device

For home users, monitoring bandwidth usage per device may seem like a pointless exercise but their business counterparts typically recognize the value of doing so. Bandwidth is not a limitless resource and total broadband bandwidth (as provided by your internet service provider or ISP) is shared between all the devices connected to the network. If […]