Operations | Monitoring | ITSM | DevOps | Cloud

Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as many as 30,000 computers were affected per day. Although classified as adware, Adrozek is also designed to collect information extracted from browsers by modifying browser settings and extensions.

Loki 2020 year in review

What a year 2020 has been for Grafana Loki! Just a little more than a year ago, we announced Loki’s 1.0.0 GA release. We’re excited to report that 2020 brought a big uptick in its adoption (users have quickly realized the advantages of a small index—plus, Loki has non-technical advantages, too); significant performance enhancements; and the recent release of Loki 2.0.

Track Datadog metrics in Sleuth

Data from monitoring tools like Datadog are useful for developers to help them understand whether the code they've deployed is healthy or needs to be fixed or rolled back, or when there is an incident to investigate. As a deployment mission control, Sleuth helps developers see metrics data from a developer-centric point of view - by deployment - and interpret such data for them. ‍‍

Introducing: Business Impact Alerts

Anodot is the only monitoring solution built from the ground up to find and fix key business incidents, as they’re happening. As opposed to most monitoring solutions, which focus on machine and system data to track performance, Anodot also monitors the more volatile and less predictable business metrics that directly impact your company’s bottom line. Now there’s an easy way to measure the business impact of every incident.

How Active Directory Management Tools Help Quickly Find and Troubleshoot Issues

Active Directory is part of Microsoft Windows software environments primarily for networks where some sort of domain control is required. The service is much more than just authenticating and authoring access to network resources. Active Directory is also used to enforce various network security policies, enable various processes, and enable various services. Active Directory consists of a logical structure that allows the server to execute the appropriate actions, authentication, services, and so on.

Best practices for monitoring authentication logs

If you are running a user-facing web application, you likely implement some form of authentication flow to allow users to log in securely. You may even use multiple systems and methods for different purposes or separate groups of users. For example, employees might use OAuth-based authentication managed by a company-provided Google account to log in to internal services while customers can use a username and password system or their own Google credentials.

Synthetic Monitoring: When Bad things Happen to Good Checks

Running synthetic monitoring thinking it will match up with a user’s reality throw for throw is a fool’s game. While you can test in prod, your testing parameters are limited by an insider’s knowledge of the transaction’s pathways – making true objectivity challenging to achieve in testing. Yet still, every transaction tells a story.