LEM - Logs on Windows file copy
Hi everyone, I wanted to know if events are generated when file copy are started between windows workstations, server and to USB key when the remote agent is installed.Thank you.
View ArticleReports by user
Hey guys, I need some help. Once in a while I get to collect information on a specific user and his/her activity on the network. Since we now have LEM, it is one of the sources of the information I can...
View ArticleRECOMMEND LEM ON SPREAD THE WORD FOR A $25 AMAZON GIFT CARD!
Let the community know how impressed you are with LEM and earn a $25 Amazon gift card! Simply post your review in Spread The Word with the questions answered below: What was life like before...
View ArticleCreating custom Email Templates & Correlation of Fields
I am trying to create a custom template to alert me on failed authentication on the firewalls. I get the notice but it does not have any information in the email, just "at" What am I missing?
View ArticleUpgrade to 6.0.1 Flex error
When I load the GUI after the upgrade I get this error:Flex Error #1001: Digest mismatch with RSL https://10.162.1.40:8443/lem/rsl/TriGeoFlexFramework.swf. Redeploy the matching RSL or relink your...
View ArticleHello, What is the appropriate connector for Barracuda SSL VPN?
Is it not supported yet or its connector can be replaced with another one?
View ArticleRC1 code in LEM 6.2 GA release?
Was watching the console as I performed the upgrade from version 6.0.1 to 6.2 of LEM and saw the following for the swi-sql-dk.deb package: "Version: 6.2.0RC1.87.551337" Just curious if this is by...
View ArticleFilter LEM User Account Modified alerts by Directory Service membership
I've got directory service groups for all privileged groups in AD, and I'm looking for a way to trigger email only if the account is in one of those groups. I have...
View ArticlePBX
Hi, We are using Sangoma free PBX that is installed on Linux.Is it possible to receive log and events from the PBX?If so. Which connector do i have to use for this?
View ArticleMonitoring SCCM deployments in LEM
Hey folks, Any one got any idea if it is possible using LEM to monitor who deployed a package in SCCM? Cheers in advance!
View ArticleDetecting anomalous levels of user downloads from a SAN
Hi I am pretty new to LEM and trying to figure out if I can leverage the LEM to detect when users download an anomalous amount of data from our SAN. In general, I guess I'm thinking that if I can...
View ArticleReports by user
Hey guys, I need some help. Once in a while I get to collect information on a specific user and his/her activity on the network. Since we now have LEM, it is one of the sources of the information I can...
View ArticleShould SolarWinds support be allowed to close calls without customer agreement
Quite often if I send a support request that proves difficult for support to answer they seem to just wait a few days and then close the call, I think they should have customer approval to close the...
View ArticleLEM Ports for IP Reputation Feed?
What are the communication requirements for the LEM IP Reputation Feeds to work? I run LEM in a secure environment and I need to know what specific type of traffic is required for this to work and it...
View ArticleLEM - NetFlow & sFlow
I noticed in the Port Requirement guide that ports are specifically noted for NetFlow and sFlow with regard to LEM. Could somebody please explain or point me to a document that explains how that works...
View ArticlethwackCamp videos are live! Sessions on LEM and Security
(original post)Hey everyone! In case you've missed the announcements or mostly stuck just to your areas of interest on Thwack, here's a reminder about thwackCamp 2015 this week. For LEM customers and...
View ArticleHow Do i Used LEM New Feature Threat Intelligence Feed in 6.2
Hi All, How do i used this new feature Threat Intelligence Feed in LEM 6.2. I appreciate your help in advance. Regards,Saroop
View ArticleLEM Ports for IP Reputation Feed?
What are the communication requirements for the LEM IP Reputation Feeds to work? I run LEM in a secure environment and I need to know what specific type of traffic is required for this to work and it...
View Article