Blog Entries

29. 03. 2019 Angelo Rosace Log Management, NetEye

Host Creation via Icingacli Commands for Monitoring and Deploying a Safed Agent Configuration

Creating hosts in NetEye’s Director module can sometimes be time-consuming and a repetitious, tiring and boring job. Especially if you have to populate Director with a large number of hosts for setting up a test environment, for example. One solution is to create a script consisting of nothing but icingacli commands. Each command line instruction…

Read More
25. 03. 2019 Oreste Attanasio Log Management, Log-SIEM, NetEye, Unified Monitoring

Safed improvements since 1.10.1

The Safed agent keeps track of the events it receives from the Eventlog by keeping the LastEventID in registry. At start time the agent tries to retrieve all events from Windows Eventlog since starting from the LastEventID. When the amount of events since LastEventID is too large or the LastEventID has been removed from the…

Read More
21. 03. 2019 Franco Federico Log-SIEM, NetEye

Field Anonymization with NetEye 4 for GDPR

The regulations of the GDPR in many cases require that some user data is not always present, and / and or that they are anonymized.  So I would like to show you now how NetEye 4 responds to this new requirement. NetEye 4 is composed of various modules. In the NetEye 4 Log Manager, we have Elastic…

Read More
20. 03. 2019 MarinovMihail Downloads / Release Notes, Log Management

Updated Safed Agent v1.10.1

– Retrieved events from eventlog (win 2008 +) starts from bookmark but should not be older than defined cache days

Read More
11. 03. 2019 Stefano Bruno Log-SIEM, NetEye

Segregated Multitenancy Monitoring: The Satellite and the Essential Role of the CA-Proxy

In many circumstances, monitoring systems need to be extended to locations where we have no direct control. We can think for instance of a company that provides monitoring services to various customers: each with its own firewalls and each with its own security rules. The deployment of firewall rules from the central monitoring node to…

Read More
07. 02. 2019 MarinovMihail Log-SIEM, NetEye

Secure Connections for the Safed Agent

The Safed agent can be configured via https and send its collected logs to the log collector though a TLS connection. The latest released version – 1.9.1 – supports TLS 1.2 (at a minimum) and TLS 1.3. The first step is to upload the private key, the local certificate and the CA certificate to the…

Read More
15. 10. 2018 Tobias Goller Log Management, NetEye

NetEye 4 Log Management with Search Guard

With the release of NetEye 4, we have also redesigned the Log Management module. In this blog post I would like to briefly discuss the main innovations and improvements in NetEye 4 Log Management. First, the management and configuration interface of NetEye 4 Log Manager appears in the unified NetEye 4 layout. Basically, it has…

Read More
05. 10. 2018 Michele Santuari Log Management, Log-SIEM, NetEye

How an Elasticsearch Cluster Fits in with a NetEye Cluster

This blog post describes the basic architecture of an Elasticsearch cluster.  The deployment of a cluster is needed to provide high-availability and, whenever possible, to increase performance. NetEye 4’s clustering service is based on RedHat 7’s High Availability Clustering technologies: Corosync:  Provides group communication between a set of nodes, application restart upon failure, and a quorum…

Read More
25. 09. 2018 Gianluca Piccolo Log Management, Log-SIEM, NetEye

NetEye 4 Log Management: Rsyslog and the Elastic Stack

When you need to manage and collect large amounts of data, there can be a lot of hard tasks to do.  So we decided to take some of the best Open Source tools to help us do it in the best possible way.  Let me introduce you to Rsyslog and the Elastic Stack implementation for…

Read More
14. 05. 2018 NetEye Blog Admin Events, Log-SIEM, NetEye

IT Security Conference 2018 – Get your VIP tickets

Our rapidly changing digital world is demanding new monitoring strategies  for managing your IT infrastructure and adapting business transformations in real time. IoT, mobility and Hybrid Clouds offer opportunities as well as potential risks and challenges. How can you succeed in shifting your security posture from reactive to active, and your IT service monitoring from…

Read More
13. 03. 2018 Arianna Cunaccia APM, Asset Management, ITOA, Log Management, NetEye, Service Management

Out Now – The New NetEye & EriZone Training Program

Ready to take your IT process skills beyond the traditional?  Our new training offerings will help you acquire, maintain and improve your knowledge and skills around our solutions.  This year’s training program contains courses for NetEye, EriZone or Alyvix customers and partners, each lasting between 2 and 4 working days. The main focus will be…

Read More
07. 03. 2018 Juergen Vigna Log Management, NetEye

Analyze your OpenLDAP Logs

Suppose you have an OpenLDAP Server and you want to analyze what it does.  A good way to do this is to send the logs to NetEye’s LogServer.  Some elements you will see include: – Returned Entries! (ENTRY) – Search Operations! (SEARCH) – Total Connections! (BIND) To do this you need to add a new…

Read More
07. 02. 2018 Juergen Vigna Log Management, Log-SIEM, NetEye

Harmonize Your Monitoring with Your Elasticsearch Database Entries

If you have an Elasticsearch Database like the one in the NetEye Elastic Stack Module then you are surely interested in integrating this information into your Monitoring environment.  To do this, use this new plugin: check_elasticsearch_query # /data/neteye/usr/lib/nagios/plugins/local/check_elasticsearch_query –help Check a count of number of events fount in elasticsearch over a query and timeframe Usage:…

Read More
29. 01. 2018 Roberto Palmarin Log-SIEM, NetEye

From Software Inventory to Vulnerabilities!

Now that your company has invested time and resources in gathering information about your entire installed base of software and equipment, how can we analyze and measure its level of security protection?  Can we identify the vulnerabilities in your company’s software?  Can we create a scoring function that measures security and how it changes over…

Read More
21. 12. 2017 Massimiliano De Luca Log-SIEM, NetEye

GROK: Instructions for Use

Grok is a plug-in installed by default in Logstash, which is supplied with the Elastic package (the ELK – Elasticsearch, Logstash and Kibana), one of the integrated modules in our NetEye Unified Monitoring solution.What is this plug-in for? First of all, Grok is an English neologism that means  “to understand profoundly, intuitively or by empathy,…

Read More

Archive