Security Tips and Tricks

Controlling Access to Windows 2008 Event Logs

On systems running 2003, any user account needing the ability to read other system’s event logs required that the registry to be edited and some SDDL (Security Descriptor Definition Language) entries be made on all respective remote systems. In 2008 it has…

Read More

The Benefits of Logging Disk Space Warnings or Errors

Disk capacity requirements will vary depending on the purpose of the associated system and applications utilizing the storage space. When there is no longer any free disk space available, the effect can be minor to border-line catastrophic. And a catastrophic failure usually…

Read More

Key Features of 6.0

We are incredibly excited to share with you the new features available in our 6.0 release. This update provides an amazing depth of functionality and features to expand the impact SIEM can deliver to any organization. We are fortunate at LogRhythm…

Read More

The Nuances of Advanced Correlation Rules for Authentication Logs

Using the Advanced Intelligence (AI) Engine with LogRhythm allows users to correlate among all the logs in a network and alert when there is anything unusual in the log patterns. My team, the Knowledge Engineers, is tasked with creating rules for…

Read More

Initial Thoughts on The Hartford Breach: Using Pattern Recognition to Identify Outbreaks

The recent compromise at The Hartford Insurance Company highlights the fact that AV software by itself isn’t always an adequate defense—even for malware that has been in the wild for quite some time. It was reported that a W32-Qakbot variant was…

Read More

Heavy Fines Dropped Due to HIPAA Violations

Last week, the Department of Health and Human Services flexed its HIPAA enforcement ability in a ruthless and unprecedented way. Heavy fines were dropped on not one, but two organizations totaling $5.3 million. Last Thursday, a civil monetary penalty of…

Read More