Also this year, we had the great opportunity to attend FOSDEM, the most important open-source conference in Europe. This year was no exception, and among the many exciting talks, one that particularly ...
In a complex distributed RDS environment, it’s difficult to measure RDS performance: the end user typically notices responsiveness in a different way compared to measuring a single Windows Performance ...
Ever since they began using Grafana Dashboards in the NetEye monitoring system, my customers have asked again and again whether they can create PDF files of what they see on their Grafana Dashboards.
Basically, the log source continuously sends log messages encrypted via TLS to the NetEye server. 1 TLS is handled by stunnel and then content is internally forwarded unencrypted to an Elastic Agent ...
The new version 1.0 of the GLPI Plugin allows advanced abilities in terms of listing and searching for network devices. Until now, you had the possibility to seach for associated contracts, but now ...
The Cyber Apocalypse CTF is back with the 2022 edition. It’s a Jeopardy-style competition organized by Hack The Box and is open to everyone. Together as a security-focused guild (a concept taken from ...
Double extortion ransomware attacks have reached very high numerical values. One of the key elements, when suffering such an attack, concerns the negotiation that can be initiated (not always!) with ...
In this blog post I’d like to show the remarkable improvement in one particular case using the ES|QL language. Suppose we want to detect the creation of a considerable number of files on a Windows ...
In order to analyze the quality level of the delivered IT services the traditional monitoring systems used to focus exclusively on the control of hardware and software components and the network, ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果