Questions tagged [monitoring]
Monitoring is the act of looking on the processes or systems for performance, supervision and surveillance.
200
questions
0
votes
0
answers
31
views
Conventions regarding Sysmon rules
Recently, I started researching the Blind Eagle attack and was also able to emulate it properly with the appended documentation.
I would like to view data about it in my Splunk and Wazuh dashboards. ...
17
votes
4
answers
7k
views
How to deal with monitoring software on a personal PC used for work?
My husband currently uses his personal computer for virtual work. The agency he works for insists that all employees install monitoring software that can see everything on the computer. I have heard ...
0
votes
0
answers
110
views
How does admin identify routers connected to a network?
In my campus, we are provided with a LAN port to each room to access the internet. Also, they didn't allow students to use routers in their respective room. The only way one can access the internet is ...
0
votes
0
answers
21
views
What is an HTTPS Interception Certificate and can schools monitor devices through it? [duplicate]
My school (UK) recently sent out a message to all of us.
"In order to provide the best standard of online safety we are
improving the quality of internet filtering and monitoring on our
school ...
0
votes
0
answers
138
views
How can I forward and capture all traffic from a device (mobile, or PC) from another network?
Let's say Mobile device A sits on Network A, and I want to monitor their HTTPS traffic remotely, how might I go about doing this? I know that locally, on the same network, a proxy debugging tool can ...
0
votes
3
answers
557
views
How to actively monitor open ports on servers
I have several servers that must be exclusively accessible only on the internal network, for example database, which can never be accessible via internet.
And also cases that they can only be accessed ...
1
vote
0
answers
108
views
How to find out what Microsoft 365 Defender is monitoring?
I am currently analyzing our security landscape with the help of the MITRE ATT&CK Framework. Most techniques have ways to "Mitigate" and to "Detect" it, and one of the most ...
2
votes
0
answers
45
views
Is it possible to see someone using vpn who is connected to my AP and turned on hotspot for his mobile in which he uses vpn [duplicate]
I want to monitor traffic in my Access point of the users who turned on hotspots in their PC after connecting to the wi-fi.
I want to monitor users who use vpn to access blocked sites in my ...
1
vote
2
answers
151
views
How to monitor for vulnerabilities across your company stack?
Let's say a software company XYZ is using a variety of 3rd party vendors - as an example, it could use:
Lastpass as a company password manager;
Azure B2C as the authentication framework for the ...
3
votes
1
answer
974
views
Restrict VPN access to only authorised machines
Let's say the situation is this: I'm a big corporation with a whole bunch of GDPR compliance and other regulatory stuff which means I need to ensure that certain data doesn't leak (so basically most ...
1
vote
0
answers
84
views
Monitoring QKD system with EDR Wazuh
I’m trying to do my thesis project about the possibility to prevent attacks against QKD devices, using an EDR like Wazuh. The problem is that most attacks are prevented through physical methods ...
0
votes
1
answer
2k
views
Can a company using OneDrive for work detect the usage of a personal OneDrive account by an employee on a company machine?
My company is using OneDrive to store all our work files. I occasionally use my personal OneDrive account for personal matters on my work computer with security agents installed. Can a sysadmin detect ...
1
vote
1
answer
190
views
Is it illegal for my school to locally install monitoring software on my Chromebook (bought from outside of school)? [closed]
My school has installed monitoring software on my Chromebook that we didn't get from the school, unlike most other students. Software, such as Impero, that can see my screen and remove access to ...
0
votes
0
answers
335
views
How can I monitor which page in the web browser is making a DNS request?
I manage a Microsoft environment and I use FortiClient EMS for our endpoint security. That system is logging blocked requests to https://h.parrable.com. As best I can tell, this is not a malicious ...
0
votes
1
answer
281
views
Remote work and employer monitoring [duplicate]
My work laptop is connected to my router via ethernet and personal laptop is connected via wifi to same router. Whenever I switch my vpn on on my personal computer, the connection icon becomes that of ...