10 Security Predictions for 2016
Posted by: LogRhythm Labs
As we approach 2016, security experts are reflecting on the cyber attacks of this year and making predictions as to what the threat landscape may look like in the coming months. This year, there will be innovative security initiatives, different…
Read More
December 22, 2015
Tracking Group Policy Changes: Part 3
Posted by: Andrew Hollister
This is the final part of the series on tracking group policy changes. As I have mentioned a couple of times, one thing that makes monitoring group policy changes difficult is the fact that Microsoft logs the GUID of the…
Read More
December 16, 2015
Security Measures Retailers Should Have in Place
Posted by: Andrew Hollister
It’s the most wonderful time of the year! As the rush towards Christmas continues and spending reaches fever pitch, those tasked with protecting retail networks, Point-of-Sale (POS) systems, and online shopping sites might be tempted to think it’s the most…
Read More
December 14, 2015
LogRhythm for DevOps
Using LogRhythm to Streamline Operations While the LogRhythm platform is typically used as a security solution, it is a flexible and powerful tool that can be used for operational use cases as well. LogRhythm’s ability to process a wide variety…
Read More
December 11, 2015
Tracking Group Policy Changes: Part 2
Posted by: Andrew Hollister
After reading my last post Tracking Group Policy Changes: Part 1, you may wonder what LogRhythm can do with the GPO change logs? Let’s take a look at how this is presented within LogRhythm. As I mentioned previously, LogRhythm has…
Read More
December 7, 2015
Tracking Group Policy Changes: Part 1
Posted by: Andrew Hollister
Following my earlier blog post, Unauthorized Use of Windows Administration Tools Use Case, one of our readers asked about methods for monitoring changes made to group policies. LogRhythm has built-in processing policies for almost any log imaginable in Windows and…
Read More
December 2, 2015