Monitoring

Last Updated on 16 Oct. 2014, Total: 23 Blog Posts

  1. FlowBAT - Flow Analysis GUI

    Network Flow data provides a significant amount of context with minimal storage overhead providing historical data that can account for every connection into and out of your network, but its adoption has been slowed because most of the tools available for performing flow data analysis can be challenging to use... Read More

  2. Handling malicious Internet route leaks – check list

    Anyone connecting to the Internet must have this contingency as part of their routing policy... Read More

  3. Log system activity with System Monitor (Sysmon)

    Creators of Windows Sysinternals Mark Russinovich and Thomas Garnier announce a new Sysinternals utility that monitors and reports key system activity via the Windows event log... Read More

  4. Who Has Your Back? 2014 Report

    This year, EFF (Electronic Frontier Foundation) reports major improvements in industry standards for informing users about government data requests, publishing transparency reports, and fighting for the user in Congress... Read More

  5. Free tool that detects Netgear switches

    German IT security firm Curesec releases a set of tools that helps you catalog all Netgear switches on your internal infrastructure... Read More

  6. Outage Analyzer

    Track Web Service Outages in Real Time... Read More

  7. Open-source network scanner

    ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet... Read More

  8. How to Manage Multiple Servers in Windows Server 2012

    Managing Multiple Servers in Windows Server 2012... Read More

  9. Monitoring tools for Large-Scale Networks

    A suite of open source tools for monitoring large-scale networks using flow data... Read More

  10. Track Privileged Identities!

    If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More

Featured Links