Chicago, IL, USA
Jan 20, 2023   |  By Mariano Bruno
The System Administrator! AKA the Sysadmin. The keeper of the network, computers – well basically all things technology. The one who is hated for imposing complex passwords and other restrictions, but taken for granted when everything works well. They are the first to be called when “” reports: “domain does not exist”.
Oct 12, 2022   |  By ingmar.koecher
File Integrity Monitoring, aka as FIM, is a must-have feature for anyone in charge of security. With FIM, one can detect when a critical file, such as a file that belongs to the Operating System, or a key configuration file, is changed. In most cases, configuring FIM is straightforward: If the file changes then generate an alert.
Apr 15, 2022   |  By ingmar.koecher
I think we’ve all been there before – you log on to a server remotely via RDP, and do the needful – but don’t immediately log off. But then you get distracted by a phone call, an email, a chat, or a good old-fashioned physical interaction with another human being. So when it comes time clock out for the night, you shut down your computer or log off. Or maybe you’ve been working on a laptop and your VPN got interrupted.
Feb 5, 2022   |  By ingmar.koecher
Monitoring temperature and humidity in a server room are quite important if you want to reduce the risk of expensive equipment failure. Yet, many server rooms either aren’t monitored at all or rely on ancient wall-thermostats that, in case of a problem, only emit desperate beeps that nobody will hear.
Dec 20, 2021   |  By ingmar.koecher
Just when the Microsoft Exchange exploit CVE-2021-26855 thought it would win the “Exploit of the year” award, it got unseated by the – still evolving – Log4J exploit just weeks before the end of the year! Had somebody asked Sysadmins in November what Log4J was then I suspect that the majority would have had no idea. It seems that the biggest challenge the Log4J exploit poses for Sysadmins is simply the fact that nobody knows all the places where Log4J is being used.
Jun 28, 2021   |  By ingmar.koecher
Since we’ve accumulated a lot of resources around EventSentry that are updated frequently, we’ve decided to launch a GitHub page where anyone can access and download scripts, configuration templates, screen backgrounds and our brand-new PowerShell module that is still under development.
May 13, 2021   |  By ingmar.koecher
Anybody who’s looked for answers on the Internet has likely stumbled across a “TOP X LISTS”: The “10 things famous people do every day”, “Top 10 stocks to by”, the “20 books you have to read” are just some examples of the myriad of lists that are out there offering answers. You may have even stumbled upon a few “Top 10 (or 12) Events To Monitor” articles too.
Oct 7, 2020   |  By ingmar.koecher
This latest update to EventSentry improves your security posture with validation scripts, simplifies IT troubleshooting for both administrators and users, gives you visibility into installed browser extensions along with many other usability improvements in the web reports.
Mar 18, 2020   |  By Ingmar Koecher
When China built an entire emergency hospital in a matter of days in Wuhan – a city about the size of NYC that most of us had never heard of – the world was watching with concern, but somehow still expected and hoped that the crisis would somehow remain contained to China, or at least Asia. People in Europe and the U.S.
Dec 12, 2019   |  By Ingmar Koecher
EventSentry v4.1 builds on v4.0 released earlier this year and offers a lot of exciting new & improved features that enhance a variety of different monitoring scenarios.
Apr 5, 2021   |  By NETIKUS.NET LTD
Overview of EventSentry's compliance features, using CMMC compliance as an example.
Dec 10, 2020   |  By NETIKUS.NET LTD
This video helps new users get started with EventSentry quickly by walking them through the most important areas of the management console and web reports.
Oct 22, 2020   |  By NETIKUS.NET LTD
Explains the new features in v4.2 in the management console.
Sep 21, 2020   |  By NETIKUS.NET LTD
Tray app that features a system information dialog that shows uptime, hostname, ip address, CPU/Memory/Disk utilization, logged on users, top 3 processes based on current CPU and memory consumption and more. End users can also submit support tickets directly from their desktop, and EventSentry admins can document system activity with notes.
Aug 1, 2020   |  By NETIKUS.NET LTD
How to monitor the logs and performance metrics of a Java-based Minecraft server on Windows with EventSentry.
May 19, 2020   |  By NETIKUS.NET LTD
Shows the most popular applications from the tool set in action. The split screen video illustrates how much more easier common tasks are with the SysAdmin Tools!
Feb 11, 2020   |  By NETIKUS.NET LTD
This video show how to configure EventSentry (Light) to send email alerts from log files such as IIS. For example, you can receive an email alert if the server encounters an internal server error, or when a bad URL is requested.
Jan 20, 2020   |  By NETIKUS.NET LTD
Brief overview of all new features in v4.1, including NetFlow malicious traffic detection, enhanced performance monitoring via command line output capture, Active Directory password reminder emails, BitLocker, Pending Reboot & battery detection, lots of visual & functional improvements to the web reports and more!
May 8, 2019   |  By NETIKUS.NET LTD
EventSentry v4.0 installation from start to finish.
Apr 8, 2019   |  By NETIKUS.NET LTD
EventSentry's ADMonitor natively monitors Active Directory™ to detect all object changes down to the attribute with before and after values. ADMonitor also captures group policy changes and includes a complete user inventory to quickly identify at-risk user accounts.
Jul 3, 2018   |  By EventSentry
Justifying the purchase and implementation of a system monitoring solution can be difficult, since IT department software purchases are faced with more scrutiny than ever in today's extremely competitive marketplace.
Jul 3, 2018   |  By EventSentry
This guide gives you a quick, architectural overview of EventSentry to get you started using the product. Browse or search the documentation for detailed product information.
Jul 3, 2018   |  By EventSentry
Once you are familar with the basic concept of EventSentry we recommend that you take a look at the best practices. It contains useful tips & tricks and configuration examples to help you get the most out of EventSentry with the least amount of administration.

NETIKUS.NET develops EventSentry an award-winning Hybrid SIEM which features real-time eventlog, system health and network monitoring to proactively monitor networks and preemptively respond to threats.

PingSentry Availability Monitoring to help you quickly monitor the availabilty of your criticial resources. From the creators of EventSentry we now offer a way to be notified when your site is unreachable or if your SSL/TLS certificate is experiencing unexpected errors.

Many of our award-winning products and online services are offered for free, including the free version of EventSentry, EventSentry Light, the EventSentry SysAdmin Tools as well as the EventSentry Admin Assistant.

Why EventSentry?

  • Single Pane of Glass: EventSentry looks beyond events and log files - by monitoring multiple aspects of Windows-based systems to give you a complete picture - and not just a few pieces of the puzzle. Server monitoring (CPU, Memory, Disk space), performance monitoring, inventory and more monitoring features are all included.
  • Real-Time Event Log Monitoring: Our state-of-art agents monitor all Windows servers, workstations & laptops securely, efficiently and in real-time - with native 64-bit support. Data is encrypted & compressed, and collected metrics are cached and re-transmitted during temporary network outages.
  • Descriptive Email Alerts: EventSentry's email alerts go the extra mile to make troubleshooting faster and more effective by providing additional context. Footers provide a status of the monitored host, security codes are automatically explained and performance alerts include embedded visual charts. IP addresses contained in emails are supplemented with reverse DNS lookup and geolocation data.

At NETIKUS.NET we make customer support our number one priority, and we work very closely with our users who help us shape and improve our products.