News
News about the open source IT system management solution NetEye and the open source IT service management solution EriZone provided by Würth Phoenix.
Welcome to version 4.38 of our NetEye v4 Unified Monitoring Platform. The Church of St. John in Ranui, set against the breathtaking Dolomites in the Funes Valley, welcomes you to this release. This ...
There’s no way around it: Artificial Intelligence is reshaping our world in profound ways, and it’s here to stay. In recent years we’ve entered a golden age for specialized hardware and algorithms ...
Important: IcingWeb2 Module Analytics security update Type/Severity NetEye Product Security has rated this update as having a Medium security impact. Topic An update ...
On February 8, 2024, Fortinet disclosed 2 critical vulnerabilities which could allow remote code or command execution. The vulnerabilities are as follows: FortiOS – Format String Bug in fgfmd, with ...
Important: Icinga Director Security Update Type/Severity Security Advisory: High Topic An update for the package icingaweb2-module-director is now available for NetEye 4. NetEye Product Security has ...
On February 8, 2024, Fortinet disclosed 2 critical vulnerabilities which could allow remote code or command execution. The vulnerabilities are as follows: FortiOS – Format String Bug in fgfmd, with ...
In the last few weeks the NetEye development team and the Alyvix development team have been collaborating to achieve support for Time Periods in Alyvix. In this blog post, we’d like to share some ...
Microsoft ADFS service is widely used for integrating Web Applications with Microsoft Active Directory. Since Windows Server 2012 R2, it can also integrate Non-Claims-Aware applications. This ...
Ever since they began using Grafana Dashboards in the NetEye monitoring system, my customers have asked again and again whether they can create PDF files of what they see on their Grafana Dashboards.
The purpose of this article is to show a real-life case study of the integration of the new Elastic ES|QL language within the detection rules used by the SOC to detect cyber threats.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results