Last Updated on 13 Aug. 2015, Total: 27 Blog Posts

  1. Monitor Your DNS for Hijacking

    Dnstest is a free tool that helps you monitor your DNS for Hijacking... Read More

  2. Monitoring tools for Large-Scale Networks

    A suite of open source tools for monitoring large-scale networks using flow data... Read More

  3. Network Monitor OneClick

    OneClick version of Network Monitor is a quick solution that allows you to capture network traffic from a Windows computer without the need of installing the complete Network Monitor package. Still, you need Network Monitor installed on a separate computer in order to able to analyze the saved data. This tool is useful for customer support scenarios. The two One... Read More

  4. News from Intel Security McAfee Knowledge Center

    Useful commands when troubleshooting DAS issues with McAfee SIEM Enterprise Security Manager and Event Receiver... Read More

  5. Open-source network scanner

    ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet... Read More

  6. Outage Analyzer

    Track Web Service Outages in Real Time... Read More

  7. Quick resource utilization check on Windows 2008 Servers

    There are a number of tools which give you details about resource utilization on Windows based machines. Detailed reports are best used when digging further down into an existing problem or analyzing a complex problem that requires a lot of details but an ad hoc quick performance check would suffice with few details. Actually, routine quick checks would benefit most... Read More

  8. Setting up an Event Collecting Computer

    Having set up all remote hosts that you will be retrieving Events from, it is time to configure the Collecting workstation. The collecting computer would normally be an admin computer running Windows Vista, Windows 7 or Windows Server 2008. Assuming our collecting computer is named env1client01 then, from an elevated command prompt type: wecutil qc This command will set Windows... Read More

  9. Setting up an Event Forwarding Computer

    Windows Event forwarding requires the setup of forwarding computers and a collecting computer as we have seen in Managing Windows Events. In this post we start by setting up a typical forwarding computer and proceed to the collecting computer setup in another post. Let's assume that we are collecting events from a Windows 2008 server named Win2k8Web, hence our first... Read More

  10. Track Privileged Identities!

    If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More

Featured Links