5 min
Log Search
Log Search Simplified
Hi, I'm Laura, UX Designer at Logentries and today I'm going to discuss how just
about anyone can use Logentries to search and analyze their log data no matter
what their job title or technical skill level.
What is Logentries?
At Logentries, the team works tirelessly to provide an easy to use log
management service [https://logentries.com/?CS=R7blog] that allows users to
stream their logs from just about anything. Logentries can accept data from
almost any device that generates log data, inclu
3 min
Log Management
Using Log Data as Forensic Evidence
This is a guest post by Ed Tittel. Ed, a regular contributor to
blog.logentries.com [https://blog.logentries.com/], has been writing about
information security topics since the mid-1990s. He contributed to the first
five editions of the CISSP Study Guide (Sybex, 6e, 2012, ISBN:
978-1-119-31427-3) and to two editions of Computer Forensics JumpStart (Sybex,
2e, 2011, ISBN: 978-0-470-93166-0), and still writes and blogs regularly on
security topics for websites including Tom's IT Pro, GoCertify.co
3 min
Log Management
Nexpose Logging Analytics using LogEntries
This blog shows how to use the power of LogEntries [https://logentries.com/]
Search and Analytics to monitor your Nexpose installation. LogEntries has joined
[/2015/10/13/why-we-re-welcoming-logentries-to-the-rapid7-family-a-story-of-data-and-analytics]
the Rapid7 family and offers several powerful capabilities to search, analyze,
monitor and alert on your Nexpose installation. LogEntries is also super easy to
set up and maintain. I spent about five minutes getting it running. The Nexpose
engi
5 min
PCI
Seven Ways InsightIDR Helps Maintain PCI Compliance
If your company processes credit card transactions, you must be compliant with
the Payment Card Industry Data Security Standard, or PCI DSS
[https://www.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf]. Any
entity that stores, processes, or transmits cardholder data must abide by these
requirements, which provide best practices for securing your cardholder data
environment (CDE) [https://www.rapid7.com/solutions/compliance/pci-dss/].
Rapid7 InsightVM [https://www.rapid7.com/products/i
3 min
Metasploit
Securing Your Metasploit Logs
Metasploit, backed by a community of 200,000 users and contributors is the most
impactful penetration testing solution on the planet. With it, uncover
weaknesses in your defenses, focus on the highest risks, and improve your
security outcomes. Your Metasploit Pro console produces a lot of important logs.
It is essential to be able to review these logs, alert on them, and keep them
secure.
Why should I monitor these logs?
The logs produced by your Metasploit Pro console are helpful when
troubl
5 min
Log Management
If You Work In Operations, Your Security Team Needs The Logs, Too
This post is the final in a series examining the roles of search and analytics
in the incident-detection-to-response lifecycle. To read the previous six, click
one [/2015/10/21/search-will-always-be-a-part-of-incident-investigations], two
[/2015/10/29/whether-or-not-siem-died-the-problems-remain], three
[/2015/11/05/investigating-an-incident-doesnt-end-at-the-perimeter], four
[/2015/11/11/making-sure-search-is-not-your-incident-response-bottleneck], five
[/2015/11/19/siems-dont-detect-attacks-a
6 min
Log Management
10 Best Practices for Log Management and Analytics
Introduction
Today’s Log Management and Analytics Challenges
Within the last decade, the advancement of distributed systems has introduced
new complexities in managing log data. Today’s systems can include thousands of
server instances or micro- service containers, each generating its own log data.
With the rapid emergence and dominance of cloud-based systems, we have witnessed
explosive growth in machine-generated log data. As a result, log management has
become a staple in modern IT operatio
1 min
Logentries
Logentries Joins the Rapid7 Family
I'm very excited today to join the Rapid7 family. The acquisition is good news
for Logentries customers, Rapid7 customers and all of our employees. It means
that great minds and innovative technology have come together to solve some of
our thorniest IT and security challenges.
The Logentries team has been on a mission over the last few years -- Revealing
the Power of Log Data to the World. While pursuing our mission, I am often asked
why log data has become so valuable. The answer is simple: l
2 min
Logentries
Why we're welcoming Logentries to the Rapid7 family - a story of data and analytics
Those that follow Rapid7 will know that we talk a great deal about our vision of
delivering security data and analytics to our customers to enable an active,
analytics-driven approach to cyber security. I'm excited to let you know that
today we're making an important addition to the Rapid7 family that will help us
advance this vision even further… we are acquiring the world-class, cloud-based
log management and search technology company, Logentries.
Organizations need real mastery of the inform
9 min
Log Management
Q & A from the Incident Response & Investigation Webcast: "Storming the Breach, Part 1: Initial Infection Vector"
The recent webcast “Storming the Breach, Part 1: Initial Infection Vector
[https://information.rapid7.com/storming-the-breach-part-1-initial-infection-vector.html?CS=blog]
”, with Incident Response experts Wade Woolwine [/author/wade-woolwine] and Mike
Scutt sparked so many great questions from our live attendees that we didn't
have time to get through all of them! Our presenters took the time to answer
additional questions after the fact... so read on for the overflow Q&A on tips
and tricks for
3 min
IT Ops
Log Analysis for Orchestration Change Management
Are you suffering from server sprawl? You might be and don’t even know it.
Server sprawl occurs when there are an unknown number of rogue VMs; VMs with
unknown workload, owners, or purpose. And no one is fearless enough to delete
or suspend them. Orchestration tools make creating new nodes so easy that almost
every organization who uses them is suffering from server sprawl…at a high price
and lots of confusion.
[/content/images/le-img/2015/04/log-analysis-for-orchestration-change-management-
5 min
IT Ops
In the Log Management World: Are you a Fox or Hedgehog?
I’ve recently been reading Nate Silver’s book, “The Signal and the Noise.” In
the book, Silver looks at a number of areas where predictions have been made and
considers how successful they have been, as well as the reasons why they have
been accurate (or not).
I couldn’t help but draw the similarities how most companies use log management
tools [https://logentries.com/doc/log-management/] today.
Silver’s particular interests are political forecasting (see
www.fivethirtyeight.com [http://www.
4 min
IT Ops
The Pros and Cons of Open Source Logging
I recently attended DevOpsDays Boston
[http://devopsdays.org/events/2014-boston/], which is a great way to get a pulse
on the latest issues and technologies in the DevOps community. DevOpsDays
is split between organized talks, open sessions and hanging around chatting with
the other attendees. For me, the latter is always the most valuable. Over the 2
days, I probably spoke to more than 100 different people. I’m always interested
in investigating how people are logging, what they are logging,
3 min
IT Ops
Happy Bits Shortens Time-to-Resolution From 4 Days to 5 Minutes!
Happy Bits [http://www.happybits.co/] develops fun mobile apps so you can share
videos instantly with your friends through messenger. You can either watch the
videos live while you’re recording, or later whenever you have time. Here’s how
it works: you upload a video to their app, then receive a private link to paste
into your favorite messaging app to share the video. Happy Bits integrates with
all the popular messenger apps, like Facebook, WhatsApp, Skype, Twitter, and
Google+, just to name a
3 min
IT Ops
Traditional Log Management Is Dead. Long Live Autonomic Analytics!
In this new era of cloud computing, faster and cheaper are not enough. The
modern Ops “toolkit” needs a log analytics service built for cloud-based
environments that offers easy log data centralization, autonomic analysis, and a
real-time monitoring service for connecting distributed systems and teams.
The rapid emergence and dominance of cloud-based systems have contributed to an
explosive growth of machine generated log data. We have heard from our
community
of more than 25,000 IT and Dev O