security logs  |  security log management

Security Event Logs: Importance, best practices, and management

Understanding security event logs for stronger cybersecurity. Whether a multinational corporation or a small business, organizations face ever-increasing risks of data theft, insider threats, and system intrusions. In 2025, the security landscape is further complicated by the growing influence of artificial intelligence, as cybercriminals are leveraging AI to enhance the sophistication and scale of attacks. One of the most powerful tools for detecting and responding to attacks is the humble security event logs.

releases  |  Platform

Announcing NXLog Platform 1.7

We are happy to announce the latest release of NXLog Platform, version 1.7. This release introduces key enhancements focused on the usability and performance of the log discovery UI, as well as the SMTP integration with Microsoft 365. Read on for more details about these updates. Improved log discovery NXLog Platform 1.7 introduces the beta release of a new log discovery UI with significant improvements in usability and performance:

strategy  |  telemetry data pipeline  |  optimization  |  NXLog Platform

Current challenges in log and telemetry data management

Today, most enterprises use a security log analytics solution or SIEM (Security Information & Event Management), but analytics are only as good as the data fed into your solution. If you’re missing data sources or are failing to extract full value from the data, you won’t see the big picture. This is an issue new customers commonly mention to NXLog. That’s why one of our key goals is to provide a solid data collection layer that ensures all relevant data is collected and properly fed into the SIEM.

okta  |  security  |  iam

Leveraging Okta logs for improved security monitoring

Most corporate environments require a login, and Identity and Access Management (IAM) is a solution that helps manage that process in different ways. IAM ensures that only the necessary people can access the relevant IT resources. Each user, device or service is assigned a unique digital identity. So, when an employee logs into a company system, IAM confirms that person’s identity. This might involve a login/password check, multi-factor authentication, or both.

microsoft  |  cloud logs  |  cisa

Enhancing security with Microsoft's Expanded Cloud Logs

Nation-state-sponsored hacking stories are everyone’s favorite Hollywood movies — until our personal or corporate sensitive data shows up on the dark web for sale, being compromised. In real life, cyber espionage groups’s activities trigger security enforcement. First in the government sector, then the government standards slowly shift industry norms starting by gently forcing vendors who are also selling into government contracts. In the case of the recently announced playbook on MICROSOFT EXPANDED CLOUD LOGS IMPLEMENTATION PLAYBOOK, issued by the US Cybersecurity and Infrastructure Security Agency (CISA), it all started in July 2023, when the Chinese cyber espionage group Storm-0558 exploited a vulnerability in Microsoft’s Outlook email system to gain unauthorized access to email accounts belonging to U.

rdp  |  windows event log

Remote Desktop logs – A comprehensive guide to RDP logging and monitoring

Monitoring and centralizing Remote Desktop logs is critical for IT security, compliance, and operational efficiency, and NXLog Platform makes it simple and scalable. Remote Desktop Protocol (RDP) is a powerful Windows feature that allows users to access a computer remotely over the network. While convenient and widely used, it’s also a potential entry point for attackers. Understanding how to check and analyze RDP connection logs can help detect unauthorized access, troubleshoot issues, and maintain system integrity.

More

From NXLog Community Edition to NXLog Platform

Monitoring NXLog Agent with Zabbix using the Agent Management API

Announcing NXLog Platform 1.6

NXLog Agent vs. Snare Agent - A practical comparison of log collection capabilities

All Posts