Last Updated on 13 Aug. 2015, Total: 27 Blog Posts
Dnstest is a free tool that helps you monitor your DNS for Hijacking... Read More
A suite of open source tools for monitoring large-scale networks using flow data... Read More
OneClick version of Network Monitor is a quick solution that allows you to capture network traffic from a Windows computer without the need of installing the complete Network Monitor package. Still, you need Network Monitor installed on a separate computer in order to able to analyze the saved data. This tool is useful for customer support scenarios. The two One... Read More
Useful commands when troubleshooting DAS issues with McAfee SIEM Enterprise Security Manager and Event Receiver... Read More
ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet... Read More
Track Web Service Outages in Real Time... Read More
There are a number of tools which give you details about resource utilization on Windows based machines. Detailed reports are best used when digging further down into an existing problem or analyzing a complex problem that requires a lot of details but an ad hoc quick performance check would suffice with few details. Actually, routine quick checks would benefit most... Read More
Having set up all remote hosts that you will be retrieving Events from, it is time to configure the Collecting workstation. The collecting computer would normally be an admin computer running Windows Vista, Windows 7 or Windows Server 2008. Assuming our collecting computer is named env1client01 then, from an elevated command prompt type: wecutil qc This command will set Windows... Read More
Windows Event forwarding requires the setup of forwarding computers and a collecting computer as we have seen in Managing Windows Events. In this post we start by setting up a typical forwarding computer and proceed to the collecting computer setup in another post. Let's assume that we are collecting events from a Windows 2008 server named Win2k8Web, hence our first... Read More
If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More