Operations | Monitoring | ITSM | DevOps | Cloud

Three Ways MSPs Can Benefit From Dynamic Thresholds

People around the world depend on Managed Service Providers (MSPs) to keep their businesses running like clockwork, even as their IT infrastructure evolves. Keeping workflows efficient leads to higher profits, but this can be a challenge due to a mix of on-premise infrastructures, public and private cloud, and other complex customer environments. The shift to remote work in 2020 due to the COVID-19 pandemic has only made this more challenging for MSPs.

What is YAML? A Beginner's Guide

YAML is a digestible data serialization language that is often utilized to create configuration files and works in concurrence with any programming language. YAML is a data serialization language designed for human interaction. It’s a strict superset of JSON, another data serialization language. But because it’s a strict superset, it can do everything that JSON can and more.

Can devs and designers get along? - Dev Matters S1E02

In this episode of Dev Matters, Don and his guest Ben Sanders discuss whether software developers and designers can really get along. Ben shares stories, tips, and strategies pulled from his experience of over 15 years in the software industry. This episode was recorded in front of a live studio audience on Twitch.

Splunk SOAR Playbooks: Azure New User Census

Hafnium is the latest cyberattack that utilizes a number of post-exploitation tools after gaining access to Exchange servers through a zero-day exploit. One of their persistence methods was creating new user accounts in the domain, giving them the ability to log back into the network using normal authentication rather than use a web shell or continue to re-exploit the vulnerability (which has since been patched). Learn how you can use Splunk Phantom to automate account monitoring to ensure that threat actors are not exploiting vulnerabilities to access sensitive information through authenticated accounts.

Resource check profile - Monitor Windows event logs and Linux syslogs

Track server resources such as Windows event logs and Linux syslogs to monitor specific events and strength your server's security. Internet-facing systems constantly confront the risk of security hacks and data theft. While you're monitoring key performance metrics of your servers, keeping an eye out for security incidents is also necessary. This can be achieved through event log monitoring for Windows servers, and syslog monitoring for Linux servers.