Category: Security

author:

Security

Windows Workstation Logs – Integration


In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. The most common way of doing this is by forwarding event logs to a syslog …


author:

Security

Microsoft Workstation Logs – Configuration


Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in place. This blog will walk you through configuring event logging on client workstations, and …



author:

Security

An A-B-C Approach to Improving Security Compliance


Security is always an important topic with our government customers. Here’s an applicable article from my colleague, Joe Kim, in which he offers some tips on compliance. Ensuring that an agency complies with all of the various standards can be a job in itself. …






author:

Database Networks Security Systems

The Legacy IT Pro


In the fast-paced world of IT, can you afford to be a legacy IT pro? This is a concern for many, which makes it worth examining. IT functions have been clearly separated since the early days of mainframes. You had your storage team, your …


author:

Security

Landing on a Secure File Sharing Solution


Back in October, I wrote about Shadow IT and how some users are turning to popular file sharing applications like Dropbox, OneDrive, and Google Drive to get their work done without the friction. One point I made in that post was that “if an …