<rss xmlns:webfeeds="http://webfeeds.org/rss/1.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
  <atom:link href="https://nxlog.co/news-and-blog/index.xml" rel="self" type="application/rss+xml" />
  <title>Telemetry analysis</title>
    <link>https://nxlog.co/news-and-blog/tags/telemetry-analysis/</link>
    <description>Recent content in Telemetry analysis on NXLog Blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
  <lastBuildDate>Thu, 27 Jul 2023 09:42:06 +0000</lastBuildDate>
  
  <item>
    <title>Detect threats using NXLog and Sigma</title>
    <link>https://nxlog.co/news-and-blog/posts/detect-threats-using-nxlog-and-sigma/</link>
    <pubDate>Thu, 27 Jul 2023 09:42:06 +0000</pubDate>
    
    <enclosure url="https://nxlog.co/news-and-blog/images/categories/security.png" type="image/webp" />
    <atom:logo>https://nxlog.co/news-and-blog/images/categories/security.png</atom:logo>
    
    <guid>https://nxlog.co/news-and-blog/posts/detect-threats-using-nxlog-and-sigma/</guid>
    <description>
    
    &lt;img src=&#34;https://nxlog.co/news-and-blog/images/categories/security.png&#34; width=500 /&gt;
    
    The analysis of events produced by various systems and applications can offer insights into the infrastructure health and the operational resilience of an enterprise. From an Infosec perspective, the end-goals are: threat detection, forensics and remediation.
However, we can’t query or analyse data that we haven’t collected in the first place! Before threat hunting and incident response are even possible, security events need to be collected from various sources, parsed, transformed, and then forwarded to data sinks such as security information and event managements (SIEM), security analytics platforms, cloud ecosystems and long term storage.
    </description>
    
    <dc:creator><![CDATA[ Konstantinos Samalekas ]]></dc:creator>
    
  </item>
   
  <item>
    <title>NXLog Community Edition support for Raijin Database</title>
    <link>https://nxlog.co/news-and-blog/posts/nxlog-ce-raijin-database-support/</link>
    <pubDate>Tue, 22 Feb 2022 20:12:59 +0100</pubDate>
    
    <enclosure url="https://nxlog.co/news-and-blog/images/categories/announcement.webp" type="image/webp" />
    <atom:logo>https://nxlog.co/news-and-blog/images/categories/announcement.webp</atom:logo>
    
    <guid>https://nxlog.co/news-and-blog/posts/nxlog-ce-raijin-database-support/</guid>
    <description>
    
    &lt;img src=&#34;https://nxlog.co/news-and-blog/images/categories/announcement.webp&#34; width=500 /&gt;
    
    Last month saw the release of NXLog Community Edition version 3.0. One of the major new features in this release is the added support for sending log data to Raijin Database. This feature opens up exciting possibilities for implementing a custom centralized log collection and storage solution.
What is Raijin Database? Raijin Database is a free-of-charge schemaless database engine explicitly designed to store data for analytics efficiently. The fact that it does not require you to define a schema up-front makes it well suited for storing event logs from diverse sources containing different types of information in a structured format.
    </description>
    
    <dc:creator><![CDATA[ Arielle Bonnici ]]></dc:creator>
    
  </item>
   
  <item>
    <title>Using Raijin Database Engine to aggregate and analyze Windows security events</title>
    <link>https://nxlog.co/news-and-blog/posts/using-raijin-database-engine-to-aggregate-and-analyze-windows-security-events/</link>
    <pubDate>Thu, 29 Jul 2021 01:14:19 -0500</pubDate>
    
    <enclosure url="https://nxlog.co/news-and-blog/images/categories/strategy.webp" type="image/webp" />
    <atom:logo>https://nxlog.co/news-and-blog/images/categories/strategy.webp</atom:logo>
    
    <guid>https://nxlog.co/news-and-blog/posts/using-raijin-database-engine-to-aggregate-and-analyze-windows-security-events/</guid>
    <description>
    
    &lt;img src=&#34;https://nxlog.co/news-and-blog/images/categories/strategy.webp&#34; width=500 /&gt;
    
    In this post, we will look at how to use Raijin Database Engine as a backend in a centralized logging environment for collecting and aggregating Windows security events. We will also show you how to integrate Raijin with an open source data exploration tool. Finally, you will see how you can track suspicious network activity and identify specific types of intrusion on Windows hosts using these tools.
A low-cost, lean and mean data discovery solution Although the combination of tools we present here cannot compete with a full-fledged SIEM solution, they do offer quite a few advantages for security analysts who need a responsive, highly customizable data discovery solution that accepts ad hoc SQL.
    </description>
    
    <dc:creator><![CDATA[ John Kirch ]]></dc:creator>
    
  </item>
   
  </channel>
</rss>
