Monitoring Windows Remotely via WMI with Icinga
2025-01-28
Comprehensive guide to monitor Windows machines without agents using WMI (Windows Management Instrumentation) with Icinga and check_wmi_plus plugin.
1226 words
|
6 minutes
CoreDNS Setup for Local Network with SSL
2025-01-28
Step-by-step guide to set up CoreDNS for local network DNS resolution with SSL configuration, including client configuration and troubleshooting tips.
338 words
|
2 minutes
The Open XDR Revolution: Breaking Free from Vendor Lock-in with Interoperable Security
Discover how Open XDR transforms security operations by breaking vendor lock-in, enabling seamless integration across security tools, and providing unprecedented visibility into modern threat landscapes.
2525 words
|
13 minutes
CoreDNS: A Comprehensive Overview
2025-01-28
Complete guide to CoreDNS - a flexible, extensible DNS server with plugin-based architecture, covering installation, configuration, and custom plugin development.
377 words
|
2 minutes
Setting up HTTPS for Local VMs with Custom Domains
2025-01-28
Complete guide to serving local VMs over HTTPS using custom domain names with CoreDNS, NGINX, and Smallstep certificates.
413 words
|
2 minutes
Wazuh Agent Logging Capabilities: Comprehensive Technical Analysis
2025-01-28
Wazuh agents provide enterprise-grade, multi-platform security monitoring with sophisticated log collection, parsing, and forwarding capabilities designed for XDR/OXDR platforms.
1459 words
|
7 minutes
Cross-Platform Rust-Based SIEM Platform Implementation Plan
2025-01-28
A comprehensive security monitoring solution leveraging Rust's memory safety and performance for enterprise-grade threat detection across Windows, macOS, and Linux environments.
2423 words
|
12 minutes
eBPF + Rust: Building Kernel-Level Security Monitoring Without Kernel Modules
2025-01-28
Build a complete kernel-level security monitoring system using eBPF and Rust, implementing system call monitoring, privilege escalation detection, container security, and intrusion detection while maintaining system safety through eBPF's verification process
4380 words
|
22 minutes