Windows | Telemetry collection | Telemetry auditing
From 4688 to 1102: The Windows event IDs that matter for threat detection
Telemetry collection | Telemetry pipeline management | Log aggregation
Filebeat vs Logstash: when the shipper is enough and when you need a pipeline
Windows | SCADA | Critical infrastructure | Telemetry collection
The case for not ripping and replacing: Securing Win32 infrastructure in place
NIS2 | HIPAA | PCI DSS | Windows | Telemetry collection | Telemetry auditing
NIS2, HIPAA, PCI DSS: What compliance means when you can't upgrade your OS
Centralized logging | Telemetry collection
Centralized log management: What it is, how centralized logging works, and how to choose the right system
Telemetry collection | Elasticsearch | Kibana
From network event logs to insights: Visualizing OpenVPN logs with Elasticsearch and Kibana
Telemetry auditing | Telemetry collection
Security Event Logs: Importance, best practices, and management
Telemetry collection
Leveraging Okta logs for improved security monitoring
Telemetry collection
Ingesting log data from Debian UFW to Loki and Grafana
NXLog Agent | Telemetry collection
NXLog Agent on Submarines
Telemetry collection
The evolution of event logging: from clay tablets to Taylor Swift
Telemetry auditing | Telemetry collection
GLBA Compliance in 2024 - Reporting directly to the FTC
Critical infrastructure | Telemetry auditing | Telemetry collection
Log management for maritime cybersecurity compliance regulations
Telemetry analysis | Telemetry collection
Detect threats using NXLog and Sigma
Centralized logging | Telemetry collection
Looking beyond Cybersecurity Awareness Month
NIST | Telemetry collection
Assertive compliance - using frameworks to extend your coverage
Telemetry collection | DNS | Windows
The disappearing Windows DNS debug log
Windows | Telemetry collection
Security logging on Windows - beyond 4625
Telemetry auditing | Telemetry collection
How NXLog can help meet compliance mandates
Telemetry collection
How to prevent and detect Log4j vulnerabilities
Telemetry collection | DHCP | Telemetry auditing | Windows | Event Tracing for Windows
Collecting DHCP server logs on Windows
Kubernetes | Telemetry collection | Integrations
Collecting Kubernetes logs with NXLog
Telemetry collection
File-based logs? Yes, they're still being used!
Windows | Telemetry collection
Top 5 Windows Security logs everyone should collect
Windows | Telemetry collection
Windows Event Log collection in a nutshell
Telemetry collection | Modbus | Incident Command System | Integrations
Flexible, cloud-backed Modbus/TCP log collection with NXLog and Python
Windows | Windows Event Forwarding | Windows Event Collector | Linux | Telemetry collection
Setting up a Windows Event Collector (WEC) on Linux
Telemetry collection | DNS
DNS Log Collection and Parsing
Telemetry collection | DNS | Windows
DNS Log Collection on Windows
Telemetry collection | DNS | Linux
DNS Log Collection on Linux
FIM | Telemetry collection
What is File Integrity Monitoring (FIM)? Why do you need it?
Agent-based telemetry collection | Agentless telemetry collection | Telemetry collection