<rss xmlns:webfeeds="http://webfeeds.org/rss/1.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
  <atom:link href="https://nxlog.co/news-and-blog/index.xml" rel="self" type="application/rss+xml" />
  <title>Event Tracing for Windows</title>
    <link>https://nxlog.co/news-and-blog/tags/event-tracing-for-windows/</link>
    <description>Recent content in Event Tracing for Windows on NXLog Blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
  <lastBuildDate>Mon, 11 Oct 2021 14:07:35 +0200</lastBuildDate>
  
  <item>
    <title>Collecting DHCP server logs on Windows</title>
    <link>https://nxlog.co/news-and-blog/posts/collecting-dhcp-server-logs-on-windows/</link>
    <pubDate>Mon, 11 Oct 2021 14:07:35 +0200</pubDate>
    
    <enclosure url="https://nxlog.co/news-and-blog/images/categories/security.webp" type="image/webp" />
    <atom:logo>https://nxlog.co/news-and-blog/images/categories/security.webp</atom:logo>
    
    <guid>https://nxlog.co/news-and-blog/posts/collecting-dhcp-server-logs-on-windows/</guid>
    <description>
    
    &lt;img src=&#34;https://nxlog.co/news-and-blog/images/categories/security.webp&#34; width=500 /&gt;
    
    DHCP server log collection made simple DHCP (Dynamic Host Configuration Protocol) is a network management protocol that dynamically assigns IP addresses to each client machine on your network. However, its importance does not stop there. DHCP can even generate numerous critical events that indicate your network’s security has been compromised.
You might then wonder how you can use these events to safeguard your organization from intrusion. Well, these event logs store valuable information that contain the ID and IP address associated with each client.
    </description>
    
    <dc:creator><![CDATA[ John Kirch ]]></dc:creator>
    
  </item>
   
  <item>
    <title>Sending ETW Logs to Splunk with NXLog</title>
    <link>https://nxlog.co/news-and-blog/posts/send-etw-logs-to-splunk/</link>
    <pubDate>Tue, 03 Mar 2020 05:53:00 +0000</pubDate>
    
    <enclosure url="https://nxlog.co/news-and-blog/images/categories/siem.webp" type="image/webp" />
    <atom:logo>https://nxlog.co/news-and-blog/images/categories/siem.webp</atom:logo>
    
    <guid>https://nxlog.co/news-and-blog/posts/send-etw-logs-to-splunk/</guid>
    <description>
    
    &lt;img src=&#34;https://nxlog.co/news-and-blog/images/categories/siem.webp&#34; width=500 /&gt;
    
    NXLog supports direct collection of Event Tracing for Windows (ETW) data. DNS Analytical logs, for example, can be forwarded to Splunk or another SIEM for monitoring and analysis.
Collecting ETW Logs Event Tracing for Windows (ETW) is a kernel-level tracing facility that provides high-performance logging of kernel and application events. ETW events can be written to a log file or collected directly from the system in realtime via the Consumers API.
    </description>
    
    <dc:creator><![CDATA[ Arielle Bonnici ]]></dc:creator>
    
  </item>
   
  </channel>
</rss>
