Quantcast
Channel: THWACK: Popular Discussions - Security Event Manager (SEM) - Formerly Log & Event Manager
Browsing all 5911 articles
Browse latest View live

Logon failed while running LEM reports

Hi, After installing Log and Event Manager Reports, while running a report, its showing this error: Logon failed. Error code: -2147189176, What is this error and how can it be resolved so I can run...

View Article


Cisco ASA and syslog severity levels

What severity level is recommended for Cisco ASA? Thoughts? We are seeing dropped connection and this feels informational. Cisco ASA 5500 Series Configuration Guide using the CLI, 8.2 - Configuring...

View Article


nDepth : find source of AD account deletion

I want to get builld an nDepth filter to find the source of an active directory account deletion.   I wouldn't mind getting email alerts for this either. but primarily I need to build an nDepth filter...

View Article

Powershell event logging

PowerShell v5 has improvements for logging and a new Event Group PowerShell (in v2 the group was called Windows PowerShell)It would be really useful to have a connector for this

View Article

Maximum LEM volume size?

What is the maximum size I can increase my LEM volume to for maximizing my log data retention?

View Article


Windows Log Subscriptions

Will LEM import logs collected using Windows Log Forwarding?

View Article

Agent Log Forwarding?

In our environment, we are about to have three different networks. For simplicity, I will call them A, B, and C. The situation:Network A can talk to Network B.Network B can talk to Network C.Network A...

View Article

Checkpoint connector for r75.40 SPLAT

Hi guru, Please help me to get Checkpoint r75.40 SPLAT log into LEMI tried OPSEC/Check Point NG LEA Client but it fails to startMany thanks

View Article


How do I search a string in a log?

I'm using LEM on a client. But not this bringing the logs. And I need to know how to search for a string (word) within the logo. How to do this?

View Article


Log Forwarder Syslog Message Text missing

Guys, I'm running the log forwarder on my Windows 2008 SP2 (not R2) domain controllers and subscribing to many events that I forward to my Kiwi Syslogger running on Windows 2012 R2. From there I have...

View Article

LEM and USB defender on surface book

I've been testing LEM and USB defender on my MS Surface book with Virtual Box and have been enjoying the experience the trial is providing. The USB defender works well on my Surface book as a test...

View Article

Correlation condition for port scan

What is the ideal correlation condition for port scan? I mean the No of Events per Second so it doesn't result in to false positives.

View Article

LEM on AWS

How can I host LEM on AWS?

View Article


i created a custom filter. now how do i generate a report from this ?

how do i generate a report from a custom filter? preferably in excel?

View Article

Data Compression

Does LEM agent performs data normalization and compression both? If yes, how much the compression is done by agent before it sends data to LEM manager? In my case, I would be pointing Firewall to send...

View Article


Stop logging AV checks

I assume this has been answered before, but I'm new to everything Solarwinds.  We have 14 nodes, and those nodes consume 2TB of transaction logs every 4 weeks.  I have notice a HUGE number of...

View Article

Brute force attack

Is there any default rule in LEM to detect below attacks? If not with default, How can we create custom rules for them? BruteForce AttackDirectory Harvesting AttackInValid TCP Traffic

View Article


Threat Intelligence with LEM

How threat intelligence with LEM works for Syslog traffic received from Firewall/UTM?   Does it check IP reputation with external threat database or downloads and stores threat database locally on...

View Article

LEM Portscan rule

Hi all, I have a question based on LEM portscan conditions. See attached snapshot for guidance.I want to create a portscan rule which will ignore posrtscan activities originating from public IP's, but...

View Article

Image may be NSFW.
Clik here to view.

LEM vulnerability, how to solve it?

Becauseinformation securitypolicy,Vulnerability scanningmust bedoneusingIPS,There is avulnerabilityscan results follows,How do Irepairit ?HTTP Server Prone To Slow Denial Of Service AttackCVE-2007-6750...

View Article
Browsing all 5911 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>