Elasticsearch Alert Configuration
kendra mazara kendra mazara

Elasticsearch Alert Configuration

After delving into everything related to Elastic Agent policies and integrations, which you can read about here, and in the previous article where we explored the integration of a remote team (Fortigate) through a collector, let's see what comes next.

Read More
Integration of FortiGate Firewall with Elasticsearch
kendra mazara kendra mazara

Integration of FortiGate Firewall with Elasticsearch

In our continuous pursuit of optimizing data and event management, we continue our integrations using Elastic Agent. In our previous article, we demonstrated how to collect events from various logging channels in Windows systems, with a focus on “Windows Firewall” and the identification of “Windows events”.

Read More
Elastic Agent - Policies and Integrations
kendra mazara kendra mazara

Elastic Agent - Policies and Integrations

Elastic Agent policies are a set of predefined configurations that determine what types of data should be collected and how they should be collected. This encompasses aspects like metrics, logs, and other relevant data for system monitoring and management.

Read More
What is Elastic Agent, and how does it work?
kendra mazara kendra mazara

What is Elastic Agent, and how does it work?

Have you heard of Elastic Agent? If you're interested in efficient monitoring and management of your systems and devices, you're in the right place. In this article, I provide a comprehensive overview of what it is and how it works.

Read More
Monitoring Systems
kendra mazara kendra mazara

Monitoring Systems

To conclude this series of publications on the 6 elements to consider when implementing a SOC, we proceed to present the one regarding to "Monitoring Systems".

Read More
Necessary security control tools
kendra mazara kendra mazara

Necessary security control tools

As usual, this week we continue with the 6 elements to consider when implementing a SOC. Today it is the turn for the second-last item on our list, and it is the "necessary security control tools".

Read More
Infrastructure Environment
kendra mazara kendra mazara

Infrastructure Environment

Continuing with "6 elements to consider when implementing a SOC", this week we are going to introduce element #4: "Infrastructure Environment".

Read More
Adequate staffing
kendra mazara kendra mazara

Adequate staffing

On this occasion, it is time to talk about the third element that we have considered important to take into account when implementing a SOC: "Adequate staffing".

Read More
6 elements to consider when implementing a SOC
kendra mazara kendra mazara

6 elements to consider when implementing a SOC

As everyone knows, cyber threats are constantly evolving, which has forced companies to implement an expert team capable of detecting, analyzing, responding, reporting, and preventing cybersecurity incidents. The cybersecurity operations center (SOC) is that body called upon to fulfill this important task.

Read More
Policies and procedures of a SOC
kendra mazara kendra mazara

Policies and procedures of a SOC

Following up on the topic we started last week: "6 elements to consider when implementing a SOC", today we are going to take a closer look at the second element, which refers to the policies and procedures of a SOC.

Read More