Configure Filebeat-Elasticsearch Authentication

0
This tutorial will take you through how you can configure filebeat-elasticsearch authentication. You realize that when you enable Elastic basic authentication, you need to valid user credentials to authenticate and validate access to restricted Elastic resources. Our previous guide showed how to enable Elastic stack basic authenticaion. How to Enable Basic Authentication on ELK Stack Configure Filebeat-Elasticsearch Authentication Create Required Publishing Roles In order...

How to Enable Basic Authentication on ELK Stack

0
In this tutorial, you will learn how to enable basic authentication on ELK stack. Elastic/ELK stack supports user authentication. This enables it to restrict access to various resources within the cluster. To access these resources when authentication is enabled, a user has to prove their identity using username/passwords or other forms of identity depending on the authentication realm enabled. How...

Analyze Network Traffic Using Brim Security

0
In this tutorial, you will learn how you can analyze network traffic using Brim security tool. Brim is an open source desktop application that can be used to analyze structured network traffic data like; packet captures, e.g created by Wiresharkstructured logs, especially from the Zeek network analysis framework. According to their page, Brim is built from open source components, including: Zed, a structured log query...

Analyze Network Traffic using Zeek

0
In this tutorial, you will learn how to analyze network traffic using Zeek. Zeek is a world's leading passive network security monitoring tool that sits on the network and read all the traffic passing through the network, parses them into a high-level events that can then be passed through Zeek policy script intepreter which then generates comprehensive record/logs of...

Qualities To Look For When Choosing The Right VPN Service

0
Qualities To Look For When Choosing The Right VPN Service
Do you need a VPN service? If you do, you must select the right one. Choosing a VPN service can be tricky. There are many different services on the market, and each one has its own advantages and disadvantages- not to mention prices. It is important to do your research before making any decisions about which company you will...

Install and Enroll Elastic Agents to Fleet Manager in Linux

0
This tutorial will take you through how you can install and enroll Elastic agents to Fleet manager in Linux. According to Elastic Fleet and Elastic Agent overview page; Elastic Agent is a single, unified way to add monitoring for logs, metrics, and other types of data to each host. A single agent makes it easier and faster to deploy monitoring...

Ship System Logs to ELK Stack using Elastic Agents

2
Ship System Logs to ELK Stack using Elastic Agents
This tutorial will take you through how to ship system logs to ELK stack using Elastic Agents. You might be so used to using Elastic beats such as Filebeat, metricsbeat, Winlogbeat etc. to ship log from your end points to ELK for visualization. However, Elastic has announced the general availability Elastic Agents. Elastic Agent is a single, unified agent...

Detect Changes to Critical Files in Linux using Auditbeat and ELK

2
In this tutorial, you will learn how to detect changes to critical files in Linux using Auditbeat and ELK. Auditbeat is one of the elastic beats that according to Elastic page, collects Linux audit framework data and monitor the integrity of the files. It ships these events in real time to the rest of the Elastic Stack for further...

6 Tools That Can Help Protect Your Sensitive Business Information

0
6 Tools That Can Help Protect Your Sensitive Business Information
How do you protect your business information? The answer to that question can be a difficult one, but it’s important because the amount of sensitive data businesses store is significant. In fact, according to Verizon’s Data Breach Investigations Report 2016 there were over 1 billion records compromised in 2015 alone! In this blog post I will discuss six tools that...

Configure OpenVPN Clients to use specific DNS Server

0
This is a quick tutorial on how to configure OpenVPN clients to use specific DNS server. OpenVPN server can be configured to enable the clients to use specific DNS server for hostname resolution. In our previous tutorials, we have covered how to install and configure OpenVPN server; Install OpenVPN Server on Debian 11/Debian 10 Configure OpenVPN Clients to use specific DNS Server To...