Using Logger to Send File Data to SYSLOGD
If you find yourself needing to have the contents of an ASCII text file written to syslog, then consider the use of the logger command. This comes with most Unix distributions and has also been ported to the Windows platform.…
Read More
February 27, 2012
Controlling Access to Windows 2008 Event Logs
On systems running 2003, any user account needing the ability to read other system’s event logs required that the registry to be edited and some SDDL (Security Descriptor Definition Language) entries be made on all respective remote systems. In 2008 it has…
Read More
February 16, 2012
The Benefits of Logging Disk Space Warnings or Errors
Disk capacity requirements will vary depending on the purpose of the associated system and applications utilizing the storage space. When there is no longer any free disk space available, the effect can be minor to border-line catastrophic. And a catastrophic failure usually…
Read More
November 1, 2011
Key Features of 6.0
We are incredibly excited to share with you the new features available in our 6.0 release. This update provides an amazing depth of functionality and features to expand the impact SIEM can deliver to any organization. We are fortunate at LogRhythm…
Read More
October 13, 2011
The Nuances of Advanced Correlation Rules for Authentication Logs
Using the Advanced Intelligence (AI) Engine with LogRhythm allows users to correlate among all the logs in a network and alert when there is anything unusual in the log patterns. My team, the Knowledge Engineers, is tasked with creating rules for…
Read More
May 6, 2011
Initial Thoughts on The Hartford Breach: Using Pattern Recognition to Identify Outbreaks
The recent compromise at The Hartford Insurance Company highlights the fact that AV software by itself isn’t always an adequate defense—even for malware that has been in the wild for quite some time. It was reported that a W32-Qakbot variant was…
Read More
April 13, 2011