<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: XpoLog</title>
    <description>The latest articles on DEV Community by XpoLog (@xpolog).</description>
    <link>https://dev.to/xpolog</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F142255%2F02826c69-8165-4737-bd9f-568602df6a13.jpg</url>
      <title>DEV Community: XpoLog</title>
      <link>https://dev.to/xpolog</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/xpolog"/>
    <language>en</language>
    <item>
      <title>A New Open Log Collector, Parser and Forwarder That Cuts 90% of Manual Work. </title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Mon, 20 Jul 2020 08:18:47 +0000</pubDate>
      <link>https://dev.to/xpolog/a-new-open-log-collector-parser-and-forwarder-that-cuts-90-off-manual-work-49j1</link>
      <guid>https://dev.to/xpolog/a-new-open-log-collector-parser-and-forwarder-that-cuts-90-off-manual-work-49j1</guid>
      <description>&lt;p&gt;XPLG releases PortX, a new solution to collect, parse and ship log data, pain-free and solves one of the biggest pain points and time-consuming tasks in log analysis.&lt;/p&gt;

&lt;p&gt;PortX’s engine identifies data patterns from a wide variety of applications/ systems/ cloud/ servers and represents them eﬃciently in any logging system. It collects, parses, indexes, and enriches any data, agent-less, Windows, Linux, Syslog, HTTPS. &lt;/p&gt;

&lt;p&gt;PortX optimizes data management costs by filtering events and data. With its built-in log data filters you can forward (ELK/logging services/SIEM) only data that matters and reduce costs substantially. &lt;/p&gt;

&lt;p&gt;Key features:&lt;br&gt;
• Persistency and data forwarding to log data services.&lt;br&gt;
• Load balancing.&lt;br&gt;
• Visual parsing.&lt;br&gt;
• Cloud connectors.&lt;br&gt;
• Built-in plugins.&lt;br&gt;
• Elastic (ELK) integration.&lt;br&gt;
• Templates. &lt;br&gt;
• Pattern detection and more.&lt;/p&gt;

&lt;p&gt;Simplifying the work with ELK stack&lt;br&gt;
The ELK Stack is one of the world’s most popular log management platform since it is open source. But with any advantages, there are also pitfalls. The implementation and deployment are tedious, requires a high level of proficiency and time-consuming. &lt;/p&gt;

&lt;p&gt;Setting up a processing pipeline in PortX is 90% faster than it is in Logstash because there are no complex pipeline configurations to write. With this approach, customers can keep their existing investment in the ELK stack and add real-time log viewer, monitors, problem detection, predictive insights, security, data management policies, data manipulation and more.&lt;/p&gt;

&lt;p&gt;Try PortX on your data &amp;gt; &lt;a href="https://www.xplg.com/download/"&gt;https://www.xplg.com/download/&lt;/a&gt;&lt;br&gt;
Learn more: &lt;a href="https://www.xplg.com/port-x-log-parser/"&gt;https://www.xplg.com/port-x-log-parser/&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How to identify and prevent most common S3 security problems?</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Tue, 06 Aug 2019 11:40:45 +0000</pubDate>
      <link>https://dev.to/xpolog/how-to-identify-and-prevent-most-common-s3-security-problems-3oh1</link>
      <guid>https://dev.to/xpolog/how-to-identify-and-prevent-most-common-s3-security-problems-3oh1</guid>
      <description>&lt;p&gt;Amazon S3 is an object storage service widely used for storing many different types of data in the cloud.&lt;/p&gt;

&lt;p&gt;While it’s inexpensive and easy to set up and maintain S3 buckets, it’s also very easy to overlook S3 security aspects and expose them to malicious attacks.&lt;/p&gt;

&lt;p&gt;A typical example is accidentally allowing public access to S3 files.&lt;/p&gt;

&lt;p&gt;Several recent high-profile data breaches were caused by lax S3 security.&lt;/p&gt;

&lt;p&gt;Other attacks used AWS credentials from less protected services to download files, whereas those services shouldn’t have access to S3 in the first place.&lt;/p&gt;

&lt;p&gt;In this AWS security guide, we will talk about some best practices to help you identify and prevent most common S3 security problems. &lt;/p&gt;

&lt;p&gt;Have no time to read? You can easily secure your AWS S3 buckets and get immediate S3 insights, monitors, problem detection &amp;gt; download XpoLog free here - &lt;a href="https://www.xplg.com/download/"&gt;https://www.xplg.com/download/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Article sections: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;How you can audit AWS S3 buckets in minutes?&lt;/li&gt;
&lt;li&gt;Use policies.&lt;/li&gt;
&lt;li&gt;prevent public access.&lt;/li&gt;
&lt;li&gt;Disable file ACLs.&lt;/li&gt;
&lt;li&gt;least privilege principle.&lt;/li&gt;
&lt;li&gt;Encrypt S3 files.&lt;/li&gt;
&lt;li&gt;Use versioning.&lt;/li&gt;
&lt;li&gt;Enable Logging.&lt;/li&gt;
&lt;li&gt;Secure All Your S3 Buckets With Automation.&lt;/li&gt;
&lt;li&gt;Free checklist – 10 essential S3 audit.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Please refer to our blog as the design limitations and lack of image makes the read here very difficult and not so friendly &amp;gt; &lt;a href="https://www.xplg.com/s3-security-buckets/"&gt;https://www.xplg.com/s3-security-buckets/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hope you'll enjoy, keep us posted :)&lt;/p&gt;

</description>
      <category>aws</category>
      <category>s3buckets</category>
      <category>s3security</category>
    </item>
    <item>
      <title>How to Look for Suspicious Activities in Windows Servers</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Sun, 30 Jun 2019 08:53:54 +0000</pubDate>
      <link>https://dev.to/xpolog/how-to-look-for-suspicious-activities-in-windows-servers-52i5</link>
      <guid>https://dev.to/xpolog/how-to-look-for-suspicious-activities-in-windows-servers-52i5</guid>
      <description>&lt;p&gt;You are running a large production environment with many Windows servers.&lt;br&gt;
There are multiple forests in the network and some forests have multiple domain controllers.&lt;/p&gt;

&lt;p&gt;Your Windows server security is paramount – you want to track and audit suspicious activities and view detailed Windows reports extracted from the Windows servers event logs. &lt;/p&gt;

&lt;p&gt;Read the article, with images and design here &amp;gt; &lt;a href="https://www.xplg.com/windows-servers-security-suspicious-activities/"&gt;https://www.xplg.com/windows-servers-security-suspicious-activities/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looking for suspicious activities in Windows is important for many reasons:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There are more virus and malware for Windows than Linux.&lt;/li&gt;
&lt;li&gt;People often leave their remote desktop sessions running when they disconnect, making those sessions prime targets for unauthorized takeover.&lt;/li&gt;
&lt;li&gt;Service accounts are often made domain administrators circumvent access issues.&lt;/li&gt;
&lt;li&gt;Known passwords of service accounts become open backdoors for hackers.&lt;/li&gt;
&lt;li&gt;Antivirus and local firewalls are sometimes disabled to get acceptable application performance.&lt;/li&gt;
&lt;li&gt;Patching cycles are missed or sometimes altogether ignored, making Windows systems vulnerable to potential attacks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Bottom line: Prevention is better than cure, that’s why all possible security measures should be taken.&lt;/p&gt;

&lt;p&gt;Download XpoLog 7 free and discover suspicious events automatically!Boom &amp;gt; &lt;a href="http://bit.ly/2XGJOJV"&gt;http://bit.ly/2XGJOJV&lt;/a&gt;,&lt;/p&gt;

&lt;p&gt;Windows Server Reports&lt;br&gt;
There should be a robust security monitoring process in place.&lt;/p&gt;

&lt;p&gt;This type of monitoring keeps an eye on who or what’s logging into a Windows server and when, and if those log in events look suspicious or out of normal.&lt;/p&gt;

&lt;p&gt;This not only helps catch potential threats early, but it also provides a trail to follow when a breach happens.&lt;/p&gt;

&lt;p&gt;Windows Reports – What to look for?&lt;br&gt;
As a security conscious administrator, you want to keep an eye on a number of events such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Successful or failed login attempts to the Windows network, domain controller or member servers.&lt;/li&gt;
&lt;li&gt;Successful or failed attempts of remote desktop sessions.&lt;/li&gt;
&lt;li&gt;Password lockouts after repeated login attempts.&lt;/li&gt;
&lt;li&gt;Successful or failed login attempts outside business hours.&lt;/li&gt;
&lt;li&gt;Adding, deleting or modifying local or domain user accounts or groups.&lt;/li&gt;
&lt;li&gt;Adding users to privileged local or active directory groups.&lt;/li&gt;
&lt;li&gt;Clearing event logs in domain controllers or member servers.&lt;/li&gt;
&lt;li&gt;Changing local audit policies and group policies.&lt;/li&gt;
&lt;li&gt;Changing or disabling Windows firewall or firewall rules.&lt;/li&gt;
&lt;li&gt;Adding new services, stopping or deleting existing services.&lt;/li&gt;
&lt;li&gt;Changing registry settings.&lt;/li&gt;
&lt;li&gt;Changing critical files or directories.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In this tutorial, we will talk about enabling some important security audits in Windows servers to help catch possible threats.&lt;/p&gt;

&lt;p&gt;After reading this tutorial: you will have enough information to boost your Windows servers security level and workstation fleet and protecting them against malicious activities!&lt;/p&gt;

&lt;p&gt;Read the full article here &amp;gt; &lt;a href="https://www.xplg.com/windows-servers-security-suspicious-activities/"&gt;https://www.xplg.com/windows-servers-security-suspicious-activities/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;42 Critical Security Events To Follow&lt;br&gt;
There are some critical security-related events you should include in your audit views and regular searches.&lt;/p&gt;

&lt;p&gt;We have compiled a list of these event IDs and their descriptions in this helpful “cheat sheet". You can access the list from the article on our blog as well.   &lt;/p&gt;

</description>
      <category>windowsserver</category>
      <category>windowssecurity</category>
      <category>windowsserversecurity</category>
    </item>
    <item>
      <title> A Sports Analytics Phenomenon Reveals His Secrets Using The Champions League's 2019 Data &amp; a Log Analysis Tool</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Thu, 30 May 2019 11:33:49 +0000</pubDate>
      <link>https://dev.to/xpolog/a-sports-analytics-phenomenon-reveals-his-secrets-using-the-champions-league-s-2019-data-a-log-analysis-tool-3891</link>
      <guid>https://dev.to/xpolog/a-sports-analytics-phenomenon-reveals-his-secrets-using-the-champions-league-s-2019-data-a-log-analysis-tool-3891</guid>
      <description>&lt;p&gt;One of our developers (Eran) is an analytics phenomenon, with a nearly infallible record predicting the outcome of matches (top 0.05% of sport analytics predictions).&lt;/p&gt;

&lt;p&gt;Working up to this year’s Champions League tournament on Saturday, (in the context of our office pool) we wanted to understand his secret.&lt;/p&gt;

&lt;p&gt;Eran showed us his method. Essentially, he gathered all the data around the matches (players, teams, fouls, etc.) and visualized it into past and predictive stats using our own tool. &lt;/p&gt;

&lt;p&gt;Will this data make you a better predictor? Give it a try!  &lt;/p&gt;

&lt;p&gt;Access platform here &amp;gt; &lt;a href="https://www.xplg.com/champions-league-results-predictions/"&gt;https://www.xplg.com/champions-league-results-predictions/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>analytics</category>
      <category>bigdata</category>
      <category>dataanalysis</category>
      <category>loganalysis</category>
    </item>
    <item>
      <title>Log Management - all in one - no hidden fees!</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Tue, 30 Apr 2019 15:27:13 +0000</pubDate>
      <link>https://dev.to/xpolog/log-management-all-in-one-no-hidden-fees-1921</link>
      <guid>https://dev.to/xpolog/log-management-all-in-one-no-hidden-fees-1921</guid>
      <description>&lt;p&gt;A log management tool that doesn't require hard work &amp;gt; &lt;a href="https://xpolog.com/"&gt;https://xpolog.com/&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Quick setup &lt;/li&gt;
&lt;li&gt;Analysis apps to bring you all the insights you need automatically, &lt;/li&gt;
&lt;li&gt;Customize your own apps, &lt;/li&gt;
&lt;li&gt;Discover hidden problems and possible risks with AI/ML analysis engine, &lt;/li&gt;
&lt;li&gt;Use filters, apptags and much more to make your searches easy and simple. &lt;/li&gt;
&lt;li&gt;Great visualization gadgets&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Troubleshoot fast, make your life super simple!&lt;br&gt;
&lt;a href="https://xpolog.com/"&gt;https://xpolog.com/&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Guide: How to Troubleshoot Windows Task Scheduler in 5 Minutes?</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Mon, 18 Mar 2019 09:14:33 +0000</pubDate>
      <link>https://dev.to/xpolog/guide-how-to-troubleshoot-windows-task-scheduler-in-5-minutes-2fi7</link>
      <guid>https://dev.to/xpolog/guide-how-to-troubleshoot-windows-task-scheduler-in-5-minutes-2fi7</guid>
      <description>&lt;p&gt;Abstract &lt;/p&gt;

&lt;p&gt;If you are responsible for managing your organization’s Windows Servers, simply monitoring and managing your machines is a full-time job.&lt;/p&gt;

&lt;p&gt;Tools such as Windows Task scheduler helps you to keep your servers up and running by automating tasks. As much as you rely on the Scheduler, it can sometimes let you down, and often at the worst possible time.&lt;/p&gt;

&lt;p&gt;Follow the next steps or download XpoLog 7 free and troubleshoot your scheduled tasks automatically - &lt;a href="https://www.xplg.com/download"&gt;https://www.xplg.com/download&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;When a single task, running on a local machine, fails, you can fix it without breaking a sweat.In large organizations, tasks are far more complex and run across hundreds or thousands of remote hosts.&lt;/p&gt;

&lt;p&gt;Windows server gives you comprehensive logging tools to locate and fix issues&amp;gt; &lt;a href="https://www.loggly.com/ultimate-guide/troubleshooting-with-windows-logs/"&gt;https://www.loggly.com/ultimate-guide/troubleshooting-with-windows-logs/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Even with these tools – do you know which logs are available, and what are they telling you?&lt;/p&gt;

&lt;p&gt;After reading this article, you will be able to proactively identify Windows Task Scheduler issues, as well as, use Windows events logs, and related data to resolve real-world issues.&lt;/p&gt;

&lt;p&gt;Skip between sections: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Understanding Scheduled Tasks - &lt;a href="https://www.xplg.com/windows-server-windows-task-scheduler/#understanding"&gt;https://www.xplg.com/windows-server-windows-task-scheduler/#understanding&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Troubleshooting Scheduled Events- &lt;a href="https://www.xplg.com/windows-server-windows-task-scheduler/#troubleshooting"&gt;https://www.xplg.com/windows-server-windows-task-scheduler/#troubleshooting&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;How You Can Troubleshoot Tasks in 5 Minutes &lt;a href="https://www.xplg.com/windows-server-windows-task-scheduler/#bonus"&gt;https://www.xplg.com/windows-server-windows-task-scheduler/#bonus&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Windows Tasks scheduler: Understanding Scheduled Tasks&lt;br&gt;
A Windows Task is a group of actions, which automate system management and maintenance procedures; such as installing patches, auditing, backing up storage media, or dealing with security issues.&lt;/p&gt;

&lt;p&gt;You create and schedule tasks using the Task Scheduler user interface or programmatically using PowerShell or the.Net framework.&lt;/p&gt;

&lt;p&gt;Once you have created a task, you use the Task Scheduler Service to schedule the task’s execution.&lt;/p&gt;

&lt;p&gt;The Task Scheduler Service is a Windows service that lets you manage, schedule, and monitor tasks.&lt;/p&gt;

&lt;p&gt;Each task includes the following components:&lt;/p&gt;

&lt;p&gt;General Information: Metadata that describes the task, such as the task’s name, description, and location.&lt;br&gt;
Triggers: Conditions that schedule task execution at a specific time, or in response to specific criteria.&lt;br&gt;
Actions: List of one or more actions to achieve the tasks desired outcome.&lt;br&gt;
Security Principals: Defines security credentials, permitted access levels, and system privileges required for task execution.&lt;br&gt;
Conditions: Determines when a task can run, i.e only running when the targeted host is idle, or connected to power.&lt;br&gt;
Settings: Configures how the tasks run, including when to restart a failed action, and how long the task is permitted to run.&lt;br&gt;
History: Logs task execution data.&lt;br&gt;
Windows Task Scheduler – Troubleshooting Scheduled Events&lt;br&gt;
Let’s look at what happens when a scheduled task fails to run and see how we can use event logs to locate and fix the problem.&lt;/p&gt;

&lt;p&gt;Step 1: Understanding the Big Picture&lt;br&gt;
To find the immediate reason why a task failed open the Event Viewer and locate the event.&lt;/p&gt;

&lt;p&gt;Double-clicking the event opens a dialog box that tells us the immediate cause of the problem. It provides the event’s source, ID, level, and category.&lt;br&gt;
The dialog also tells us when the event was recorded and on which machine it occurred.&lt;br&gt;
Task Scheduler did not launch task -“\Microsoft\Windows\MemoryDiagnostic\ProcessMemoryDiagnosticEvents” because instance “{92e4bd81-96af-4a12-987f-3e83d80dd116}” of the same task is already running.&lt;br&gt;
Log Name:      Microsoft-Windows-TaskScheduler/Operational&lt;br&gt;
Source:        Microsoft-Windows-TaskScheduler&lt;br&gt;
Date:          10/28/2018 1:21:28 PM&lt;br&gt;
Event ID:      322&lt;br&gt;
Task Category: Launch request ignored, instance already running&lt;br&gt;
Level:         Warning&lt;br&gt;
Keywords:&lt;br&gt;&lt;br&gt;
User:          SYSTEM&lt;br&gt;
Computer:      BILBO.mordor.local&lt;/p&gt;

&lt;p&gt;Step 2: Diving Deeper&lt;br&gt;
For detailed contextual information to help understand why an event occurred, you can use the related events logged by Windows, across multiple Windows Event Log (evtx) files.&lt;/p&gt;

&lt;p&gt;The log’s System section presents a summary of this additional environmental data that helps you resolve the problem, such as the task’s Process ID, the thread on which it ran, and its Security ID.  &lt;/p&gt;

&lt;p&gt;Guid=”{DE7B24EA-73C8-4A09-985D-5BDADCFA9017}” /&amp;gt;&lt;br&gt;
322&lt;br&gt;
0&lt;br&gt;
3&lt;br&gt;
322&lt;br&gt;
0&lt;br&gt;
0x8000000000000000&lt;/p&gt;

&lt;p&gt;200241&lt;/p&gt;

&lt;p&gt;Microsoft-Windows-TaskScheduler/Operational&lt;br&gt;
BILBO.mordor.local&lt;/p&gt;

&lt;p&gt;Step 3: Comprehending Event Context&lt;br&gt;
To understand the actual nature of the event and to get contextual clues, you need to look at the log file’s EventData section.&lt;/p&gt;

&lt;p&gt;Here, we can see that part of the reason that the task failed to run is related to a memory issue. &lt;/p&gt;

&lt;p&gt;\Microsoft\Windows\MemoryDiagnostic\ProcessMemoryDiagnosticEvents&lt;br&gt;
{92E4BD81-96AF-4A12-987F-3E83D80DD116}&lt;/p&gt;

&lt;p&gt;Step 4: Get the Full Picture by Investigating Related Logs&lt;br&gt;
In most cases, investigating a single log file by itself, is not enough to find and fix a specific problem.&lt;/p&gt;

&lt;p&gt;Since many scheduling issues are security related, a good place to start is to examine security-related audit logs, such as the Windows Security Event log.&lt;/p&gt;

&lt;p&gt;Privileges: SeTcbPrivilege&lt;br&gt;
Audit Failure 10/28/2018 13:21:28 BILBO MORDOR Microsoft-Windows-Security-Auditing 13056 4673 A privileged service was called Privilege&lt;br&gt;
Use Sensitive Privilege Use / Non-Sensitive Privilege Use 0x00000000000D10EB &lt;br&gt;
BILBO.mordor.local A privileged service was called.&lt;/p&gt;

&lt;p&gt;In this case, the Windows Security Event shows us that the reason the task failed was related to a broader security issue, the log tells us that the event tried to perform an action which required  SeTcbPrivilege level privileges.&lt;/p&gt;

&lt;p&gt;The action performed by the task was assigned a lower privilege level, therefore, the host on which the task was scheduled to run, prevented it from running.&lt;/p&gt;

&lt;p&gt;In addition to showing that the task failed due to the tasks assigned privileges, it also shows information that indicates the root cause of the problem.&lt;/p&gt;

&lt;p&gt;Process:&lt;br&gt;
Process ID: 0x0000000000000EBC&lt;br&gt;
Process Name: C:\Windows\System32\taskhostw.exe&lt;/p&gt;

&lt;p&gt;Here we can see that the Security log indicates the problem was caused by an executable process called taskhostw.exe.&lt;/p&gt;

&lt;p&gt;The log shows us the executable’s Process ID and the process’s full path.&lt;/p&gt;

&lt;p&gt;In the final step, we will understand why this information is important, and how we can use it.&lt;/p&gt;

&lt;p&gt;Step 5: Research the Problem&lt;br&gt;
Now we know the origin of the problem, let’s use our available resources to find out more about it.&lt;/p&gt;

&lt;p&gt;By searching the internet, we can see that logs that identify a problem with taskhostw.exe. Problems with this process are usually related to malware exploits, or a defective Windows component which controls folder access.&lt;/p&gt;

&lt;p&gt;For more information on taskhostw.exe and related issues, see this article from Microsoft.&lt;/p&gt;

&lt;p&gt;Conclusions: How to Get the Most from Windows Server Logging?&lt;br&gt;
Windows Scheduler Tasks are a great way to get things done.&lt;/p&gt;

&lt;p&gt;In this article, we showed you what tasks are, and how they work. We also took you through a five-step process according to the following steps:&lt;/p&gt;

&lt;p&gt;Understanding the big picture: How to use the Event Viewer to discover problems.&lt;br&gt;
Diving deeper: How to read an event log file to learn more.&lt;br&gt;
Comprehending event context: Using Event Data to understand the problem’s context.&lt;br&gt;
Getting the full picture: Using other log files to locate the root cause.&lt;br&gt;
Researching the problem: How to use the data you gathered to find a viable solution.&lt;br&gt;
Now you can deal with complex situations involving multiple servers, large amounts of logged data to ensure that:&lt;/p&gt;

&lt;p&gt;Your system continues to fulfill your organization’s mission&lt;br&gt;
The user’s you support can do their work.&lt;/p&gt;

&lt;p&gt;You can download XpoLog and get these insights in a few clicks - &lt;a href="https://www.xplg.com/download/"&gt;https://www.xplg.com/download/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How You Can Troubleshoot Tasks in 5 Minutes&lt;/p&gt;

&lt;p&gt;Another way you can monitor and troubleshoot your Windows Task Scheduler operations (and find errors in Windows logs) is to use an out of the box solution, such as XpoLog.&lt;/p&gt;

&lt;p&gt;Using XpoLog’s built-in Windows logs connector, you can stream Windows event logs in minutes.  &lt;/p&gt;

&lt;p&gt;Once you stream the Windows event logs into XpoLog (all it takes is a few clicks), you start getting insights about what’s happening in your system, without lifting a finger.&lt;/p&gt;

&lt;p&gt;Learn more about our Windows app &lt;/p&gt;

&lt;p&gt;What Do You Get with XpoLog Fully-Automated Tool?&lt;/p&gt;

&lt;p&gt;XpoLog provides a dashboard that displays a general overview of Windows Task Scheduler related data it collected.&lt;/p&gt;

&lt;p&gt;Here you can quickly find how many tasks failed to run and why, how many succeeded and details about the important events.&lt;/p&gt;

&lt;p&gt;Drill down to each section to get more information.&lt;/p&gt;

&lt;p&gt;The dashboard displays graphs of the collected Windows logs data.&lt;/p&gt;

&lt;p&gt;To help you find exactly the log you need, it provides powerful search functionality.&lt;/p&gt;

&lt;p&gt;Once you have found the relevant event or events, you can review the log data –&lt;/p&gt;

&lt;p&gt;Not only does XpoLog show you what happened in the past, it also monitors system log files for common and obscure errors.&lt;/p&gt;

&lt;p&gt;XpoLog’s proactive analytics engine is constantly analyzing log files. When it detects a problem, it sends notifications to alert system administrators immediately.&lt;/p&gt;

&lt;p&gt;Bottom line: XpoLog also helps you deal with problems that you hadn’t thought of looking for, or never knew exists.&lt;/p&gt;

&lt;p&gt;This means that you, your team and your organization, can fix a problem long before users notice, and start sending helpdesk requests.&lt;/p&gt;

&lt;p&gt;You heard it here first! Less dealing with support, more focusing on your tasks. &lt;/p&gt;

&lt;p&gt;XpoLog also provides long-term retention by collecting all system logs from multiple servers across your organization.&lt;/p&gt;

&lt;p&gt;XpoLog keeps all Windows related logs available, from one or more locations, for any period of time.&lt;/p&gt;

&lt;p&gt;Moreover, XpoLog is not constrained by your organization’s storage policies and restrictions.&lt;/p&gt;

&lt;p&gt;The added value: This means that XpoLog stores collected logging data indefinitely, and uses it to help you find and fix problems occurring over a longer time frame.&lt;/p&gt;

&lt;p&gt;This approach allows you to initiate preventive action to avert potential problems, instead of constantly putting out fires.&lt;/p&gt;

&lt;p&gt;XpoLog stores collected logging data indefinitely&lt;/p&gt;

&lt;p&gt;Conclusions&lt;/p&gt;

&lt;p&gt;XpoLog provides you an end to end solution for log data automation.&lt;/p&gt;

&lt;p&gt;Once deployed, XpoLog enables you to monitor your system and gives you a complete solution which includes a comprehensive analytics application.&lt;/p&gt;

&lt;p&gt;This Windows application contains dashboards and reports which include insights about:&lt;/p&gt;

&lt;p&gt;user access (login/logouts).&lt;br&gt;
the health of your Windows server.&lt;br&gt;
trends.&lt;br&gt;
anomalies.&lt;br&gt;
errors.&lt;br&gt;
problems and more.&lt;br&gt;
Your gain: Windows log visibility and insights in minutes without having to write queries or build reports manually.&lt;/p&gt;

&lt;p&gt;In addition, you will be able to easily control and monitor your Windows environment, view and compare hosts activity – without manual work at all!&lt;/p&gt;

&lt;p&gt;How cool is that?&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>windows</category>
      <category>devops</category>
      <category>productivity</category>
    </item>
    <item>
      <title>A Quick Way to Aggregate Log Data/Drill Down to Investigate a Single Raw Log</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Sun, 10 Mar 2019 10:14:51 +0000</pubDate>
      <link>https://dev.to/xpolog/aggregate-log-data-or-drill-down-to-investigate-a-single-raw-log-in-no-time-3g1b</link>
      <guid>https://dev.to/xpolog/aggregate-log-data-or-drill-down-to-investigate-a-single-raw-log-in-no-time-3g1b</guid>
      <description>

&lt;p&gt;The simplest fastest way to view &amp;amp; search logs for insights is using a fully automated tool - one that collects and parses your logs in just a few clicks and suggest you out of the box reports and dashboards, to get insights in 3 more clicks. &lt;/p&gt;

&lt;p&gt;XpoLog 7 log viewer and log search also contain - &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Augmented log search to discover Unknown errors.&lt;/li&gt;
&lt;li&gt;Predefined log filters and app-tags to get insights faster.&lt;/li&gt;
&lt;li&gt;Centralized console to correlate transactions between different logs/events.&lt;/li&gt;
&lt;li&gt;Enhanced view of several logs - from multiple remote data sources.&lt;/li&gt;
&lt;li&gt;Multiple tools to access data - navigation, search, filters, live tail.&lt;/li&gt;
&lt;li&gt;Complex search to build dynamic search queries - focus on time frames, servers, apps, and other log sources.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;You can download free here: &lt;a href="https://www.xplg.com/log-event-viewer-log-search"&gt;https://www.xplg.com/log-event-viewer-log-search&lt;/a&gt;&lt;/p&gt;


</description>
      <category>logmanagement</category>
      <category>logviewer</category>
      <category>loganalysis</category>
    </item>
    <item>
      <title>New Free App for Active Directory</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Thu, 07 Mar 2019 13:07:29 +0000</pubDate>
      <link>https://dev.to/xpolog/new-free-app-for-active-directory-3efp</link>
      <guid>https://dev.to/xpolog/new-free-app-for-active-directory-3efp</guid>
      <description>

&lt;p&gt;Active Directory logs contain valuable information which must be closely monitored and analyzed.&lt;/p&gt;

&lt;p&gt;Some examples are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Configuration and policy events: These event logs are used to maintain the integrity of access policies, i.e. in ensuring that no one has mistakenly or maliciously changed the access policies and configuration.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Group and user audit: These audit logs provide comprehensive information regarding the creation/deletion of groups, logins/ logouts etc. This information is used to investigate security breaches and unauthorized access.  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Active directory performance: These logs provide indications regarding the health and performance of the Active Directory services as well as user replication and errors throughout the system.  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security Breaches: These logs track and monitor changes to the AD schema and configuration and provide enhanced visibility for security forensics and attack detection.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The new Active Directory app allows you to stream AD events using out of the box connectors and set up the app in just a few clicks. &lt;/p&gt;

&lt;p&gt;The result is quick visualization and insights out of your log data!&lt;/p&gt;

&lt;p&gt;You can download free here - &lt;a href="https://www.xplg.com/download/"&gt;https://www.xplg.com/download/&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Which insights you will be able to get automatically? &lt;/p&gt;

&lt;p&gt;The App features a variety of ready-to-use reports and dashboards, specifically designed for Active Directory log data:&lt;/p&gt;

&lt;p&gt;Security Detection – organizes the most important reports and graphs for security purposes. Using this gadget, you compare the number of failed to successful logins, view the failed login trend over time, the distribution of failed login users, and more.&lt;/p&gt;

&lt;p&gt;User’s Management – monitors new, deleted, and changed users, user-related actions by administrators, changed account names and more.&lt;/p&gt;

&lt;p&gt;Computer’s Management – monitors new, deleted, and changed computers, computer-related actions by administrators and more.&lt;/p&gt;

&lt;p&gt;Group Management – monitors new deleted and changed groups, monitors changes in groups, changes in group types, new groups members, top active groups, and more.&lt;/p&gt;

&lt;p&gt;User’s Access – monitors user access attempts, such as locked users (automatically tripped by a lockout policy or by administrators), top locked users, and more.&lt;/p&gt;

&lt;p&gt;Logins and Logouts – monitors user log-ins / log-outs, including successful logins and logouts (+ per user), failed logins (+per user), and more.&lt;/p&gt;

&lt;p&gt;Policies – monitors changes to the policies, including policy changes reports, top changed policies, top policy changes by admins, etc.&lt;/p&gt;

&lt;p&gt;Passwords – monitors password resets, including password resets reports, password changes reports, password resets per admin, top reset users and more.&lt;/p&gt;

&lt;p&gt;Directory services – monitors directory services and their operations, including created/modified objects reports, created/modified objects per admin, and more.&lt;/p&gt;

&lt;p&gt;Trends – a centralized view of important Active Directory trends over time, such as created and deleted users/groups, locked and disabled users, failed logins, and more.&lt;/p&gt;


</description>
      <category>activedirectory</category>
      <category>loganalysis</category>
    </item>
    <item>
      <title>New Analytics App for Linux Logs</title>
      <dc:creator>XpoLog</dc:creator>
      <pubDate>Tue, 05 Mar 2019 09:55:02 +0000</pubDate>
      <link>https://dev.to/xpolog/new-analytics-app-for-linux-logs-25of</link>
      <guid>https://dev.to/xpolog/new-analytics-app-for-linux-logs-25of</guid>
      <description>&lt;p&gt;Take your Linux log data into a new age of log analysis.&lt;/p&gt;

&lt;p&gt;While the log management industry is focused on developing advanced search abilities and simplifying log analysis, nobody has been able to resolve the persistent issues of the long, complex and tedious deployments.&lt;/p&gt;

&lt;p&gt;Up until today! &lt;br&gt;
A new Linux app is here to automate the entire log management lifecycle.&lt;/p&gt;

&lt;p&gt;"Brought to us by" XpoLog, the app provides an easier and more efficient solution for IT, Security and Operations Administrators.&lt;/p&gt;

&lt;p&gt;You can download it free here: &lt;a href="https://www.xplg.com/download"&gt;https://www.xplg.com/download&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What Does Full Automation Mean For Your Linux Logs Analysis?&lt;/p&gt;

&lt;p&gt;XpoLog 7 offers an analytics app for Linux logs which uses machine-learning and NLP analysis to automatically highlight critical insights from the collected Linux logs.&lt;/p&gt;

&lt;p&gt;Using this app for Linux, logs are collected from all Linux machines and critical insights are highlighted for your attention and are visualized by dashboards and real-time reports. &lt;br&gt;
-And it takes less than 10 minutes from installation!&lt;/p&gt;

&lt;p&gt;Bottom line: &lt;br&gt;
Discover problems and errors, understand trends, cron activity/ audit/ security insights, login status visualization and more, automatically!&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
