Quantcast
Channel: Logging, Monitoring, & Intrusion Detection
Browsing all 65 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Windows Daily Command and User Summary

This template produces daily summaries of commands and users for the past seven days. It also reports on installed software.July 30th 2012, version 1, SecurityCenter 4.4Required Tools: Nessus and...

View Article



Image may be NSFW.
Clik here to view.

Snort Events

LCE collects and correlates data from many IDS/IPS systems on the market. This report focuses on events generated by Snort, and presents a high-level overview of the current trends and threats reported...

View Article

Image may be NSFW.
Clik here to view.

Windows Unique Executables and New Commands

This template reports programs and commands observed running for the first time.August 3rd 2012, version 1, SecurityCenter 4.4Required Tools: LCEDownload Example - Windows Unique Executables and New...

View Article

Image may be NSFW.
Clik here to view.

SANS Top 20 Report Template

As published by SANS, the goal of the Top 20 Critical Controls is to protect assets, infrastructure, and information by strengthening your organizations defensive posture through continuous automated...

View Article

Image may be NSFW.
Clik here to view.

Event Indicator Alert Report

This report provides the event summaries of each system that has been identified to have more than one "indicator" event type. The indicator event is a correlation of specific events associated with...

View Article


Image may be NSFW.
Clik here to view.

Copyright Report

This report presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files, that are being shared without the owner's permission. If...

View Article

Image may be NSFW.
Clik here to view.

Errors and Warnings Report

This report displays details on all warnings and errors identified in the environment.The report has two main customizable sections.The error section contains tables that present the reviewer with all...

View Article

Image may be NSFW.
Clik here to view.

Insider Threat Report

This report displays details on new user events that have been found in your environment. The report is broken down into 3 main areas. The first area is Graphs and Trends.Graphs and Trends contains...

View Article


Image may be NSFW.
Clik here to view.

Council on CyberSecurity - Critical Security Controls Report

This report covers many controls found in the Council on CyberSecurity 20 Critical Security Controls. As published by Council on CyberSecurity, the goal of the 20 Critical Security Controls is to...

View Article


Image may be NSFW.
Clik here to view.

Group Management Report

This report provides a detailed analysis of the group membership across many platforms. The supported platforms are Windows, OS X, and LDAP. The report is structured to provide a summary list of...

View Article

Image may be NSFW.
Clik here to view.

Unknown Processes

View Article

Image may be NSFW.
Clik here to view.

Incident Response Report

View Article

Image may be NSFW.
Clik here to view.

Event Analysis Report

View Article


Image may be NSFW.
Clik here to view.

FireEye Events Report

View Article

Image may be NSFW.
Clik here to view.

Synchronized Log Collection Report

View Article


Image may be NSFW.
Clik here to view.

Backoff Malware Report

View Article

Image may be NSFW.
Clik here to view.

Shellshock Report

View Article


Image may be NSFW.
Clik here to view.

Detections Report

View Article

Image may be NSFW.
Clik here to view.

VPN Summary Report

View Article

Image may be NSFW.
Clik here to view.

Sophos Virus Event Activities

View Article
Browsing all 65 articles
Browse latest View live




Latest Images