EventSentry

Chicago, IL, USA
2002
  |  By ingmar.koecher
The faulty Rapid Response Content CrowdStrike update that disabled millions of Windows machines across the globe on 7/19/2024 was any IT professional’s nightmare. Having to manually visit and restore each affected machine (further complicated by BitLocker) severely limited the recovery speed, especially for businesses with remote locations, TVs, kiosks, etc.
  |  By ingmar.koecher
Everybody wants to have a more secure network – and everybody has various tools at their disposal to at least improve the security of their network. But which tool is the best for the job, and where do you start? The answer to this question is somewhat easier (and more structured) for organizations that have to adhere to compliance frameworks (ISO, CMMC, PCI, SOC, …), but a little harder for business that have no such requirements.
  |  By ingmar.koecher
It was almost exactly 10 years ago in December 2013 that we wrote our first blog post about detecting CryptoLocker, which was the first sophisticated Ransomware attack of its kind back then. BTW, 2013 was the year of the Boston Marathon bombing, Edward Snowden leaking secret NSA information, Syrians fleeing their home country and Nelson Mandela passing away.
  |  By ingmar.koecher
Anybody who monitors logs of any kinds, knows that the extracting useful information from the gigabytes of data being collected remains one of the biggest challenges. One of the more important metrics to keep an eye on are all sorts of logons that occur in your network – especially if they originate on the Internet – such as VPN logins.
  |  By Mariano Bruno
So, here’s the deal with AntiVirus software these days: It’s mostly playing catch-up with super-fast athletes — the malware guys. Traditional AV software is like old-school detectives who need a picture (or, in this case, a ‘signature’) of the bad guys to know who they’re chasing. The trouble is, these malware creators are quite sneaky — constantly changing their look and creating new disguises faster than AntiVirus can keep up with their photos.
  |  By ingmar.koecher
We’re extremely excited to announce the availability of the EventSentry v5.1, which will detect threats and suspicious behavior more effectively – while also providing users with additional reports and dashboards for CMMC and TISAX compliance. The usability of EventSentry was also improved across the board, making it easier to use, manage and maintain EventSentry on a day-by-day basis. We also released 60+ training videos to help you get started and take EventSentry to the next level.
  |  By Mariano Bruno
The System Administrator! AKA the Sysadmin. The keeper of the network, computers – well basically all things technology. The one who is hated for imposing complex passwords and other restrictions, but taken for granted when everything works well. They are the first to be called when “facebuuk.com” reports: “domain does not exist”.
  |  By ingmar.koecher
File Integrity Monitoring, aka as FIM, is a must-have feature for anyone in charge of security. With FIM, one can detect when a critical file, such as a file that belongs to the Operating System, or a key configuration file, is changed. In most cases, configuring FIM is straightforward: If the file changes then generate an alert.
  |  By ingmar.koecher
I think we’ve all been there before – you log on to a server remotely via RDP, and do the needful – but don’t immediately log off. But then you get distracted by a phone call, an email, a chat, or a good old-fashioned physical interaction with another human being. So when it comes time clock out for the night, you shut down your computer or log off. Or maybe you’ve been working on a laptop and your VPN got interrupted.
  |  By ingmar.koecher
Just when the Microsoft Exchange exploit CVE-2021-26855 thought it would win the “Exploit of the year” award, it got unseated by the – still evolving – Log4J exploit just weeks before the end of the year! Had somebody asked Sysadmins in November what Log4J was then I suspect that the majority would have had no idea. It seems that the biggest challenge the Log4J exploit poses for Sysadmins is simply the fact that nobody knows all the places where Log4J is being used.
  |  By EventSentry
This videos illustrates how to identify which features uses up the majority of space in the EventSentry database and how to adjust the configuration to reduce the amount of data stored in the database. It also touches on setting up web-based purge jobs to delete old data.
  |  By EventSentry
How to reduce the number of email alerts.
  |  By EventSentry
A quick overview on how EventSentry can help organizations become CMMC v2 compliant. EventSentry features actionable dashboards and reports to become and STAY compliant. But EventSentry goes beyond compliance - the monitoring and security features of EventSentry can be leveraged by any compliance framework. The result is a network that's compliance AND secure.
  |  By EventSentry
What do you get once you have EventSentry deployed on your network? This video flies through most EventSentry features for a birds-eye view of EventSentry's reporting capabilities.
  |  By EventSentry
Overview of EventSentry's compliance features, using CMMC compliance as an example.
  |  By EventSentry
This video helps new users get started with EventSentry quickly by walking them through the most important areas of the management console and web reports.
  |  By EventSentry
Explains the new features in v4.2 in the management console.
  |  By EventSentry
Tray app that features a system information dialog that shows uptime, hostname, ip address, CPU/Memory/Disk utilization, logged on users, top 3 processes based on current CPU and memory consumption and more. End users can also submit support tickets directly from their desktop, and EventSentry admins can document system activity with notes.
  |  By EventSentry
How to monitor the logs and performance metrics of a Java-based Minecraft server on Windows with EventSentry.
  |  By EventSentry
Shows the most popular applications from the tool set in action. The split screen video illustrates how much more easier common tasks are with the SysAdmin Tools!
  |  By EventSentry
Justifying the purchase and implementation of a system monitoring solution can be difficult, since IT department software purchases are faced with more scrutiny than ever in today's extremely competitive marketplace.
  |  By EventSentry
This guide gives you a quick, architectural overview of EventSentry to get you started using the product. Browse or search the documentation for detailed product information.
  |  By EventSentry
Once you are familar with the basic concept of EventSentry we recommend that you take a look at the best practices. It contains useful tips & tricks and configuration examples to help you get the most out of EventSentry with the least amount of administration.

NETIKUS.NET develops EventSentry an award-winning Hybrid SIEM which features real-time eventlog, system health and network monitoring to proactively monitor networks and preemptively respond to threats.

PingSentry Availability Monitoring to help you quickly monitor the availabilty of your criticial resources. From the creators of EventSentry we now offer a way to be notified when your site is unreachable or if your SSL/TLS certificate is experiencing unexpected errors.

Many of our award-winning products and online services are offered for free, including the free version of EventSentry, EventSentry Light, the EventSentry SysAdmin Tools as well as the EventSentry Admin Assistant.

Why EventSentry?

  • Single Pane of Glass: EventSentry looks beyond events and log files - by monitoring multiple aspects of Windows-based systems to give you a complete picture - and not just a few pieces of the puzzle. Server monitoring (CPU, Memory, Disk space), performance monitoring, inventory and more monitoring features are all included.
  • Real-Time Event Log Monitoring: Our state-of-art agents monitor all Windows servers, workstations & laptops securely, efficiently and in real-time - with native 64-bit support. Data is encrypted & compressed, and collected metrics are cached and re-transmitted during temporary network outages.
  • Descriptive Email Alerts: EventSentry's email alerts go the extra mile to make troubleshooting faster and more effective by providing additional context. Footers provide a status of the monitored host, security codes are automatically explained and performance alerts include embedded visual charts. IP addresses contained in emails are supplemented with reverse DNS lookup and geolocation data.

At NETIKUS.NET we make customer support our number one priority, and we work very closely with our users who help us shape and improve our products.