Beginner’s Guide: Grafana

By John Cirelly on May 16, 2024

According to GrafanaLabs, Grafana is an open-source visualization and analytics program. Your data can be queried, viewed, and explored irrespective of the location in which it is stored. Simply said, it gives you the tools you need to transform the data in your time-series database (TSDB) into attractive graphs and visualizations. Why do Companies Utilize […]

Beginner’s Guide: Kibana

By John Cirelly on May 16, 2024

Kibana is a tool that is used for log and time-series analytics, application monitoring, and operational intelligence use cases. It also allows for the visualization and study of data. Histograms, line graphs, pie charts, heat maps, and built-in support for geographic analysis are just some of the sophisticated and user-friendly features offered by this software. […]

Beginner’s Guide: Graphite

By John Cirelly on May 15, 2024

Graphite is a comprehensive monitoring tool that may be used in either straightforward or intricate settings. It is possible to utilize it for the monitoring of a wide variety of networked systems, such as websites, applications, services, and servers in both on-premises and cloud-based settings. This variety of options is useful for businesses that fall […]

Beginner’s Guide: collectd

By John Cirelly on August 16, 2022

Metrics are a technique to acquire insight into the trends and problems inside your IT system. This necessity for effective infrastructure monitoring has led to the emergence of metrics as a solution to this problem. collectd is a daemon that is available as open source and collects performance measurements for both the system and applications. […]

Beginner’s Guide: Riemann

By John Cirelly on August 16, 2022

The monitoring tool known as Riemann collects events from hosts and applications and can then input those events into a stream processing language so that they can be altered, summarized, or acted upon. The goal of the Riemann platform is to automate the process of monitoring and measuring events as much as possible. What actually […]

Beginner’s Guide: Host sFlow

By John Cirelly on August 16, 2022

The sFlow protocol is utilized for the Host sFlow agent to export both physical and virtual server performance metrics. The agent offers scalable, multi-vendor, multi-operating system performance monitoring while having a minimal impact on the systems that are being monitored. The Host sFlow project provides an open-source implementation of the sFlow standard, reporting on server […]

Beginner’s Guide: Sensu

By John Cirelly on August 16, 2022

Sensu is an open-source solution for monitoring infrastructure and applications. It monitors the health of servers, services, and applications and can integrate with third-party tools to deliver alerts and notifications. Sensu is a messaging system that is written in Ruby and can process messages using either RabbitMQ or Redis. Data is stored in Redis using […]

Beginner’s Guide: Nagios Core

By John Cirelly on August 16, 2022

Nagios Core is the primary event scheduler, event processor, and alert manager for monitored elements. It is a daemon developed in C for performance and designed to run natively on systems, with several APIs that allow it to execute extra functions. What Exactly is Nagios? Nagios is available free of charge and can be used […]

How to Query Cisco ISE Using TACACS

By John Cirelly on August 9, 2022

The Cisco Identity Services Engine, or Cisco ISO, is a powerful platform for network access control policy and enforcement. It supports the TACACS+ protocol, which makes it possible to perform detailed controls and audits on network configurations and devices. You have the option of configuring your network devices to submit authentication and authorization requests to […]

How to add a static route using a PowerShell cmdlet

By John Cirelly on August 9, 2022

Since static routes do not take part in any kind of automatic discovery process, it is very easy to manage and configure them. A list of potential destinations can be generated using a static route by combining the network address of the destination with the subnet mask. Static routes are very straightforward. The Windows operating […]

Installing a secure FTP server on Windows using IIS

By John Cirelly on August 9, 2022

You might want to install a secure File Transfer Protocol (FTP) server on Windows so that you can either store files independently or have a way to edit your website that is hosted on an Internet Information Services (IIS) web server. In either scenario, you have the option of utilizing an integral part of the […]

GPU Update – How to Force Group Policy Update Remotely

By John Cirelly on July 30, 2022

Imagine that the security expert who manages your firewalls and proxy servers contacts you by phone. You answer the call and find out that they have an urgent matter. He informs you that he has created a supplementary proxy server for people who are going to be accessing the internet. You create a new GPO […]

How to Disable Network Access to Windows Registry

By John Cirelly on July 28, 2022

Windows relies on the registry to administer and operate your computer. It does this by facilitating access to essential resources and assisting essential apps in configuring their settings. The registry is composed of a hierarchical database structure that is made up of keys and values. Your computer has the capability of enabling network access to […]

How To Lockdown USB Ports

By John Cirelly on July 28, 2022

We are frequently required to let another person use either our laptop or our personal computer. A person who is malicious and possesses a pen drive that is infected with viruses and other malicious files can inject these malicious files into the system, which can cause damage to the device. Additionally, someone who is malicious […]

How to Protect Your Data at Rest

By John Cirelly on July 28, 2022

The term “data at rest” refers to any data that your workload requires you to keep in a non-volatile storage medium for any length of time. This includes file systems, databases, archives, Internet of Things devices, and any other storage medium on which data can be persisted. When encryption and other appropriate access controls are […]