Operations | Monitoring | ITSM | DevOps | Cloud

Windows

How attackers abuse Access Token Manipulation (ATT&CK T1134)

In our previous blog post on Windows access tokens for security practitioners, we covered: Having covered some of the key concepts in Windows security, we will now build on this knowledge and start to look at how attackers can abuse legitimate Windows functionality to move laterally and compromise Active Directory domains. This blog has deliberately attempted to abstract away the workings of specific Windows network authentication protocols (e.g., NTLM and Kerberos) where possible.

Monitoring critical windows services processes

Along with server performance metrics, such as CPU, disk, and memory usage, it is important to monitor the performance of each service and process running on the server to completely analyze the load on the system resources. This video shows how Site24x7 helps you achieve that. Say you're monitoring a Windows server with Site24x7. Along with tracking the performance metrics of the server, you can also track the performance of critical services like MySQL, Apache, and PostgreSQL, and processes like redis-server.exe.

Resource check profile - Monitor Windows event logs and Linux syslogs

Track server resources such as Windows event logs and Linux syslogs to monitor specific events and strength your server's security. Internet-facing systems constantly confront the risk of security hacks and data theft. While you're monitoring key performance metrics of your servers, keeping an eye out for security incidents is also necessary. This can be achieved through event log monitoring for Windows servers, and syslog monitoring for Linux servers.

What is Windows Virtual Desktop?

Microsoft released its desktop-as-a-service (DaaS) offering, WVD (Windows Virtual Desktop), to the general public in September 2019. The service runs on Azure and provides a multi-user version of Windows 10, a feature unavailable for on-premises deployments of Hyper-V. WVD is a free service for Microsoft customers with most types of Windows 10 Enterprise license, however, the subscription or PAYG Azure costs are additional, as are many components you may wish to add.

How to monitor a Windows server with StatusCake

We often get requests from our customers on how to monitor a Windows server or workstation with StatusCake. So today I wanted to take you through a great method of doing this that you should be able to set up in just a few minutes on a Windows 10 workstation, or Windows server. We provide this coverage using the PUSH variant of our uptime monitoring – a type of reverse monitoring that requires the device to contact us in order to demonstrate downtime.

Puppet on Windows: Top questions (and answers!)

Whether you’re a current customer looking to expand across your Windows estate, or thinking of deploying Puppet across your infrastructure for the first time, we hope this blog post — based on real-world customer questions and problems — can help answer some of the questions you may have about Puppet.

Monitoring critical windows services and processes

Along with server performance metrics, such as CPU, disk, and memory usage, it is important to monitor the performance of each service and process running on the server to completely analyze the load on the system resources. This video shows how Site24x7 helps you achieve that. Say you're monitoring a Windows server with Site24x7. Along with tracking the performance metrics of the server, you can also track the performance of critical services like MySQL, Apache, and PostgreSQL, and processes like redis-server.exe.

Windows containers on Kubernetes with MicroK8s

Kubernetes orchestrates clusters of machines to run container-based workloads. Building on the success of the container-based development model, it provides the tools to operate containers reliably at scale. The container-based development methodology is popular outside just the realm of open source and Linux though.

Which Event Log Events Should You Worry About?

When you are configuring your event log monitor settings, you need to decide which event log events you need to worry about. Event logs are generated for a wide array of processes, applications, and events. Logs will record both successes and failures. As such, you need to decide what data is most vital and needs your immediate attention.