Skip to main content

Questions tagged [monitoring]

Monitoring is the act of looking on the processes or systems for performance, supervision and surveillance.

0 votes
0 answers
31 views

Conventions regarding Sysmon rules

Recently, I started researching the Blind Eagle attack and was also able to emulate it properly with the appended documentation. I would like to view data about it in my Splunk and Wazuh dashboards. ...
Aka's user avatar
  • 1
17 votes
4 answers
7k views

How to deal with monitoring software on a personal PC used for work?

My husband currently uses his personal computer for virtual work. The agency he works for insists that all employees install monitoring software that can see everything on the computer. I have heard ...
Stephanie M's user avatar
0 votes
0 answers
110 views

How does admin identify routers connected to a network?

In my campus, we are provided with a LAN port to each room to access the internet. Also, they didn't allow students to use routers in their respective room. The only way one can access the internet is ...
Corrupter's user avatar
0 votes
0 answers
21 views

What is an HTTPS Interception Certificate and can schools monitor devices through it? [duplicate]

My school (UK) recently sent out a message to all of us. "In order to provide the best standard of online safety we are improving the quality of internet filtering and monitoring on our school ...
user299938's user avatar
0 votes
0 answers
138 views

How can I forward and capture all traffic from a device (mobile, or PC) from another network?

Let's say Mobile device A sits on Network A, and I want to monitor their HTTPS traffic remotely, how might I go about doing this? I know that locally, on the same network, a proxy debugging tool can ...
ThanoojJ's user avatar
0 votes
3 answers
557 views

How to actively monitor open ports on servers

I have several servers that must be exclusively accessible only on the internal network, for example database, which can never be accessible via internet. And also cases that they can only be accessed ...
Tom's user avatar
  • 174
1 vote
0 answers
108 views

How to find out what Microsoft 365 Defender is monitoring?

I am currently analyzing our security landscape with the help of the MITRE ATT&CK Framework. Most techniques have ways to "Mitigate" and to "Detect" it, and one of the most ...
Unbuckle's user avatar
2 votes
0 answers
45 views

Is it possible to see someone using vpn who is connected to my AP and turned on hotspot for his mobile in which he uses vpn [duplicate]

I want to monitor traffic in my Access point of the users who turned on hotspots in their PC after connecting to the wi-fi. I want to monitor users who use vpn to access blocked sites in my ...
XAVERY KAZIMOTO's user avatar
1 vote
2 answers
151 views

How to monitor for vulnerabilities across your company stack?

Let's say a software company XYZ is using a variety of 3rd party vendors - as an example, it could use: Lastpass as a company password manager; Azure B2C as the authentication framework for the ...
littlebobbytables's user avatar
3 votes
1 answer
974 views

Restrict VPN access to only authorised machines

Let's say the situation is this: I'm a big corporation with a whole bunch of GDPR compliance and other regulatory stuff which means I need to ensure that certain data doesn't leak (so basically most ...
Peter David Carter's user avatar
1 vote
0 answers
84 views

Monitoring QKD system with EDR Wazuh

I’m trying to do my thesis project about the possibility to prevent attacks against QKD devices, using an EDR like Wazuh. The problem is that most attacks are prevented through physical methods ...
user13105993's user avatar
0 votes
1 answer
2k views

Can a company using OneDrive for work detect the usage of a personal OneDrive account by an employee on a company machine?

My company is using OneDrive to store all our work files. I occasionally use my personal OneDrive account for personal matters on my work computer with security agents installed. Can a sysadmin detect ...
Vuiol999's user avatar
1 vote
1 answer
190 views

Is it illegal for my school to locally install monitoring software on my Chromebook (bought from outside of school)? [closed]

My school has installed monitoring software on my Chromebook that we didn't get from the school, unlike most other students. Software, such as Impero, that can see my screen and remove access to ...
Tomas Hutchinson's user avatar
0 votes
0 answers
335 views

How can I monitor which page in the web browser is making a DNS request?

I manage a Microsoft environment and I use FortiClient EMS for our endpoint security. That system is logging blocked requests to https://h.parrable.com. As best I can tell, this is not a malicious ...
Chris76786777's user avatar
0 votes
1 answer
281 views

Remote work and employer monitoring [duplicate]

My work laptop is connected to my router via ethernet and personal laptop is connected via wifi to same router. Whenever I switch my vpn on on my personal computer, the connection icon becomes that of ...
OCB's user avatar
  • 1

15 30 50 per page
1
2 3 4 5
14