Operations | Monitoring | ITSM | DevOps | Cloud

Do you already know what Active Directory is and how to use it with Pandora FMS?

As you may already know, in this blog, we’re so into answering the big questions. After answering in previous episodes what the meaning of our existence is or explaining everything you need to know about Office 365 Monitoring, in today’s episode we are going to discuss what Active Directory is. I hope you are very comfortable sitting in your respective gamer chairs or in your two-seater sofas, because here we go!

Experience Elasticsearch from the Microsoft Azure portal

We are excited to share the latest development in our ongoing partnership with Microsoft. Available in public preview, you can now find, deploy, and manage Elasticsearch from within the Azure portal. Bring powerful enterprise search, observability, and security capabilities to your Azure environment with a user interface and tools that are already familiar to you.

How to deploy and manage Elastic on Microsoft Azure

We recently announced that users can find, deploy, and manage Elasticsearch from within the Azure portal. This new integration provides a simplified onboarding experience, all with the Azure portal and tooling you already know, so you can easily deploy Elastic without having to sign up for an external service or configure billing information.

Elastic 7.13.0 released: Search and store more data on Elastic

We are pleased to announce the general availability (GA) of Elastic 7.13. This release brings a broad set of new capabilities to our Elastic Enterprise Search, Observability, and Security solutions, which are built into the Elastic Stack — Elasticsearch and Kibana. This release enables customers to search petabytes of data in minutes cost-effectively by leveraging searchable snapshots and the new frozen tier.

The What and The Why of TLS Inspection

Connecting to nearly any web page today, you’re more often to see a URL that begins with “https://” instead of “http://”. Wondered what the “S” is for? It stands for “secure”, but more importantly, it identifies that the connection is taking place over a secure channel using the Transport Layer Security (TLS) protocol. But what is TLS, and beyond that, what’s a TLS inspection?

3 Steps to Optimize Collaboration Solutions and Drive Adoption Today

It’s hard to imagine our work lives without collaboration tools. Whether you attend Zoom meetings or brainstorm projects (and send the occasional humorous GIF) on Slack, these solutions have become foundational elements of the workplace – even moreso in recent times, when most workplaces became more digital than ever before.

Monitor Your InfluxDB Open Source Instances with InfluxDB Cloud

Everyone says the cloud is the future. Sure, but try telling that to someone who has terabytes of sensitive data stored in an on-prem InfluxDB Open Source (OSS) instance, and they will bring up a whole set of reasons why it doesn’t make sense for them to move into the cloud right now. There are also some use cases which make more sense for on-prem software deployments.

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete network security checklist is crucial for organizations with computers connected to the internet or to each other. Think of it like an antivirus scan you might run on your computer to find Trojans or malware, except you’re scanning your entire network to find anything that may cripple it.