EventSentry

Chicago, IL, USA
2002
Mar 18, 2020   |  By Ingmar Koecher
When China built an entire emergency hospital in a matter of days in Wuhan – a city about the size of NYC that most of us had never heard of – the world was watching with concern, but somehow still expected and hoped that the crisis would somehow remain contained to China, or at least Asia. People in Europe and the U.S.
Dec 12, 2019   |  By Ingmar Koecher
EventSentry v4.1 builds on v4.0 released earlier this year and offers a lot of exciting new & improved features that enhance a variety of different monitoring scenarios.
Jul 22, 2019   |  By Ingmar Koecher
The recently discovered BlueKeep RDP vulnerability reminds us yet again (as if needed to be reminded) that monitoring RDP is not a luxury but an absolute necessity. Many organizations still expose RDP ports to the Internet, making it a prime target for attacks. But even when RDP is only available internally it can still pose a threat – especially for large networks.
Mar 28, 2019   |  By Ingmar Koecher
Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.
Jul 31, 2018   |  By Ingmar Koecher
EventSentry v3.5 continues to increase visibility into networks with additional vantage points, making it easier for EventSentry users to reduce their attack surface as well as discover anomalies.
Mar 16, 2018   |  By Ingmar Koecher
Windows supports a code-signing feature called Authenticode, which allows a software publisher to digitally sign executable files (e.g. .exe, .msi, …) so that users can verify their autenticity. The digital signature of a file can be viewed in the file properties in Windows explorer on the “Digital Signature” tab.
Jan 30, 2018   |  By Ingmar Koecher
In part one I provided a high level overview of PowerShell and the potential risk it poses to networks. Of course we can only mitigate some PowerShell attacks if we have a trace, so going forward I am assuming that you followed part 1 of this series and enabled: Module Logging, Script Block Logging, Security Process Tracking (4688/4689)
Jan 29, 2018   |  By Ingmar Koecher
Imagine someone getting the seemingly innocent ability to run a couple of commands on a machine on your network WITHOUT installing any new software, but those commands resulting in a reverse shell running on that same machine – giving the intruder a convenient outpost in your network. Now stretch your imagination even further and pretend that all of this happens without leaving any unusual traces in logs – leaving you completely in the dark.
Dec 21, 2017   |  By Ingmar Koecher
In Mr. Robot‘s episode 9 of season 2 (13:53), Angela Moss needs to obtain the Windows domain password of her superior, Joseph Green, in order to download sensitive documents that would potentially incriminate EvilCorp. Since her attack requires physical access to his computer, she starts with a good old-fashioned social engineering attack to get the only currently present employee in the office to leave.
Dec 4, 2017   |  By Ingmar Koecher
With the proper auditing enabled (Logon/Logoff – Logon (Failure)) and EventSentry installed however, we can permanently block remote users / hosts who attempt to log on too many times with a wrong password. Setting this up is surprisingly simple.
Sep 21, 2020   |  By NETIKUS.NET LTD
Tray app that features a system information dialog that shows uptime, hostname, ip address, CPU/Memory/Disk utilization, logged on users, top 3 processes based on current CPU and memory consumption and more. End users can also submit support tickets directly from their desktop, and EventSentry admins can document system activity with notes.
Aug 1, 2020   |  By NETIKUS.NET LTD
How to monitor the logs and performance metrics of a Java-based Minecraft server on Windows with EventSentry.
May 19, 2020   |  By NETIKUS.NET LTD
Shows the most popular applications from the tool set in action. The split screen video illustrates how much more easier common tasks are with the SysAdmin Tools!
Feb 11, 2020   |  By NETIKUS.NET LTD
This video show how to configure EventSentry (Light) to send email alerts from log files such as IIS. For example, you can receive an email alert if the server encounters an internal server error, or when a bad URL is requested.
Jan 20, 2020   |  By NETIKUS.NET LTD
Brief overview of all new features in v4.1, including NetFlow malicious traffic detection, enhanced performance monitoring via command line output capture, Active Directory password reminder emails, BitLocker, Pending Reboot & battery detection, lots of visual & functional improvements to the web reports and more!
May 8, 2019   |  By NETIKUS.NET LTD
EventSentry v4.0 installation from start to finish.
Apr 8, 2019   |  By NETIKUS.NET LTD
EventSentry's ADMonitor natively monitors Active Directory™ to detect all object changes down to the attribute with before and after values. ADMonitor also captures group policy changes and includes a complete user inventory to quickly identify at-risk user accounts.
Nov 2, 2018   |  By NETIKUS.NET LTD
Put netstat on steroids and reduce your attack surface by revealing all processes on your network that are listening for incoming TCP connections. EventSentry can also alert when a new process is listening for incoming connections, or when critical processes are not running.
Sep 21, 2018   |  By NETIKUS.NET LTD
Explains how to exclude email alerts in EventSentry using Outlook, the built-in event viewer, or manually.
Jun 24, 2018   |  By NETIKUS.NET LTD
3 reasons why our fping utility is better than the Windows built-in ping utility.
Jul 3, 2018   |  By EventSentry
Justifying the purchase and implementation of a system monitoring solution can be difficult, since IT department software purchases are faced with more scrutiny than ever in today’s extremely competitive marketplace.
Jul 3, 2018   |  By EventSentry
This guide gives you a quick, architectural overview of EventSentry to get you started using the product. Browse or search the documentation for detailed product information.
Jul 3, 2018   |  By EventSentry
Once you are familar with the basic concept of EventSentry we recommend that you take a look at the best practices. It contains useful tips & tricks and configuration examples to help you get the most out of EventSentry with the least amount of administration.

NETIKUS.NET develops EventSentry an award-winning Hybrid SIEM which features real-time eventlog, system health and network monitoring to proactively monitor networks and preemptively respond to threats.

Many of our award-winning products and online services are offered for free, including the free version of EventSentry, EventSentry Light, the EventSentry SysAdmin Tools as well as the EventSentry Admin Assistant.

Why EventSentry?

  • Single Pane of Glass: EventSentry looks beyond events and log files - by monitoring multiple aspects of Windows-based systems to give you a complete picture - and not just a few pieces of the puzzle. Server monitoring (CPU, Memory, Disk space), performance monitoring, inventory and more monitoring features are all included.
  • Real-Time Event Log Monitoring: Our state-of-art agents monitor all Windows servers, workstations & laptops securely, efficiently and in real-time - with native 64-bit support. Data is encrypted & compressed, and collected metrics are cached and re-transmitted during temporary network outages.
  • Descriptive Email Alerts: EventSentry's email alerts go the extra mile to make troubleshooting faster and more effective by providing additional context. Footers provide a status of the monitored host, security codes are automatically explained and performance alerts include embedded visual charts. IP addresses contained in emails are supplemented with reverse DNS lookup and geolocation data.

At NETIKUS.NET we make customer support our number one priority, and we work very closely with our users who help us shape and improve our products.