Windows | Telemetry collection | Telemetry auditing
From 4688 to 1102: The Windows event IDs that matter for threat detection
Windows | SCADA | Critical infrastructure | Telemetry collection
The case for not ripping and replacing: Securing Win32 infrastructure in place
NIS2 | HIPAA | PCI DSS | Windows | Telemetry collection | Telemetry auditing
NIS2, HIPAA, PCI DSS: What compliance means when you can't upgrade your OS
Windows | Critical infrastructure
Legacy Windows systems: Enterprise security's biggest blind spot
OpenTelemetry | Telemetry pipeline management
Data format chaos costs you weeks of visibility
OpenTelemetry
Security dashboards go dark: why visibility isn't optional, even when your defenses keep running
Log noise | Telemetry pipeline management
The GeoServer breach that could have been stopped in hours, not weeks
Linux
Linux security monitoring with NXLog Platform: Extracting key events for better monitoring
NXLog Agent | Windows
Security advisory for CVE-2025-67900 affecting NXLog Agent 6.10 and older on Windows
Telemetry auditing
Identity and Access Management (IAM): Guide for 2026
Elasticsearch | Kibana | Linux
Linux security monitoring: Collecting and visualizing events in Elasticsearch and Kibana
Prometheus | Grafana
From web server logs to metrics: Visualizing NGINX logs with Prometheus and Grafana
Elasticsearch | Kibana | Windows
Windows security monitoring: Collecting and visualizing events in Elasticsearch and Kibana
Telemetry collection | Elasticsearch | Kibana
From network event logs to insights: Visualizing OpenVPN logs with Elasticsearch and Kibana
Telemetry auditing | Telemetry collection
Security Event Logs: Importance, best practices, and management
Telemetry collection
Leveraging Okta logs for improved security monitoring
Windows | Cloud logs
Enhancing security with Microsoft's Expanded Cloud Logs
Windows
Remote Desktop logs – A comprehensive guide to RDP logging and monitoring
Telemetry pipeline management
World of OpenTelemetry
Telemetry pipeline management
What is a telemetry pipeline? Understanding and building effective telemetry data pipelines
NXLog Agent
The CrowdStrike incident and how the NXLog agent operates
NIS2
NIS2 Directive: a strong request for better incident handling
Windows
Onboarding Microsoft NPS logs
Encryption
Harnessing TPM encryption with NXLog
NXLog Agent | Telemetry collection
NXLog Agent on Submarines
SCADA | Critical infrastructure
Digital substations and log collection
Aviation
The cybersecurity challenges of modern aviation systems
Telemetry analysis | Telemetry collection
Detect threats using NXLog and Sigma
HIPAA
HIPAA logging requirements and how to ensure compliance
SCADA
Industrial cybersecurity - The facts
Infrastructure monitoring | Telemetry auditing
BROP attacks - What is it and how to defend yourself?
CISO
CISO starter pack - Security Policy
CISO
CISO starter pack - Log collection fundamentals
Critical infrastructure | Infrastructure monitoring
The EU's response to cyberwarfare
Centralized logging | Telemetry collection
Looking beyond Cybersecurity Awareness Month
Incident Command System
NXLog in an industrial control security context
Perl
Send email alerts from NXLog using Python, Perl, or Ruby
Windows | Telemetry collection
Security logging on Windows - beyond 4625
Elasticsearch | Kibana | Linux | Integrations
Collecting kernel events with NXLog for analysis in the Elastic stack
Critical infrastructure
Cyberattacks on the power grid - are you prepared?
Telemetry collection
How to prevent and detect Log4j vulnerabilities
Telemetry collection | DHCP | Telemetry auditing | Windows | Event Tracing for Windows
Collecting DHCP server logs on Windows
Kubernetes | Telemetry collection | Integrations
Collecting Kubernetes logs with NXLog
Telemetry collection
File-based logs? Yes, they're still being used!
Windows | Telemetry collection
Top 5 Windows Security logs everyone should collect
DNS
Top 5 security concerns revealed with DNS logging
Linux | Red Hat
NXLog Containers were certified by Red Hat
Telemetry collection | DNS
DNS Log Collection and Parsing
Telemetry collection | DNS | Windows
DNS Log Collection on Windows
Telemetry collection | DNS | Linux
DNS Log Collection on Linux
Telemetry auditing
Insufficient logging and monitoring, TOP 10 security risk
FIM | Telemetry collection