Blog Entries

19. 11. 2024 Franco Federico NetEye

Now It’s Really Easy to Activate OTP for Your Personal NetEye Account

It’s really easy now to activate OTP on your personal account with NetEye with our new authentication method. In the latest 4.38 version of NetEye we’ve introduced a new product to manage authentication (documentation here). In the future thanks to this new product we’ll be able to define the various actions that each user can…

Read More
18. 11. 2024 Lorenzo Bevilacqua Development, Threat Intelligence

Scaling SATAYO: OSINT Research with Apache Airflow

Originally developed as a proof of concept, SATAYO was designed to gather and analyze OSINT (Open Source Intelligence) data on a single machine. Initially, the platform functioned as a single-threaded script, and scaling was only considered later. As SATAYO’s capabilities evolved to meet the needs of more clients and monitor a greater number of domains,…

Read More
14. 11. 2024 Mattia Codato Bug Fixes

NetEye 4 – Security Advisory

Synopsis Important: Icinga2 security update Type/Severity Security Advisory: Critical Topic An update for the package icinga2 is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System (CVSS) base scores provide additional guidance about a vulnerability and give a detailed severity rating….

Read More
14. 11. 2024 Valentina Da Rold Atlassian, Service Management

Take Control of Your Assets from Anywhere with Just a Wave of Your Hand!

Today I want to elaborate on how Jira CMDB (Configuration Management Database) works, and how we successfully integrated it with Stratacom’s Barcode Scanning Solution for Jira Service Management and Assets. The integration of the two should significantly enhance user experience and provide a swift and seamless solution for managing company assets. What Is the Jira CMDB? At its core, the Jira CMDB allows organizations to…

Read More
12. 11. 2024 Alessandro Paoli NetEye

SAP HANA Monitoring

Monitoring the SAP HANA DB consists of executing the check_hana.sh script that uses SAP’s hdbclient SQL client to connect to the HANA DB. Included in the script are queries to HANA to find out its status. Requirements But let’s look at the Configuration steps first. Create a user with the role MONITORING You then need…

Read More
12. 11. 2024 Gianluca Piccolo Bug Fixes

NetEye 4 – Security Advisory

Synopsis Important: GLPI security update Type/Severity Security Advisory: Critical Topic An update for the package glpi is now available for NetEye 4. NetEye Product Security has rated this update as having a security impact of Critical. Common Vulnerability Scoring System (CVSS) base scores provide additional guidance about a vulnerability and give a detailed severity rating….

Read More
08. 11. 2024 Luca Zeni Blue Team, SEC4U, Threat Intelligence

SATAYO And SOC: Exchanging Data For Better Insight

In this post, we’ll explore the synergy between a Cyber Threat Intelligence (CTI) platform and a traditional Security Operations Center (SOC) service. For those interested in the topic, I recommend reading my previous article, where I demonstrated a concrete example of integration between our SIEM and SATAYO, the CTI platform we use in our SOC….

Read More
08. 11. 2024 Reinhold Trocker Log Management, Log-SIEM

Configuring EnvironmentFile for Elastic Agents on NetEye Nodes

When deploying Elastic Agents, the method of installation can affect the configuration of the systemd service file. Specifically, .tgz deployments of Elastic Agents include the line EnvironmentFile=-/etc/sysconfig/elastic-agent in their systemd configuration (elastic-agent.service). However, Elastic Agents installed on NetEye nodes via RPM packages do not include this line in the EnvironmentFile by default. Adding the EnvironmentFile on NetEye Nodes To…

Read More
06. 11. 2024 Davide Sbetti AI, Log-SIEM, Machine Learning, NetEye

The New NetEye User Guide Search: From POC to Production

Hello everyone! As you may remember, a topic I like to discuss a lot on this blog is the Proof of Concept (POC) about how we could enhance search within our online NetEye User Guide. Well, we’re happy to share with you how we’ve further developed the POC, specifically the process outlined in the first…

Read More
05. 11. 2024 Emil Fazzi Bug Fixes, NetEye

Bug Fixes for NetEye 4.38

We’ve fixed an issue where the neteye satellite config send command would stop if no SSH connection was available or enabled for a satellite. Now, the command will skip those satellites, allowing configurations to continue for reachable ones, while manual configuration transfer can be addressed later. This enhances efficiency and streamlines your deployment process. We…

Read More
01. 11. 2024 Massimo Giaimo Threat Intelligence

Our Contribution to Mitre Att@ck

Many of you have probably already heard about the MITRE ATT&CK framework. This framework is an important point of reference at the international level and is used within thousands of projects, detection rules, platforms. The Adversarial Tactics, Techniques, and Common Knowledge is a guideline for classifying and describing cyberattacks and intrusions. It was created by…

Read More
31. 10. 2024 Charles Callaway Documentation

Explaining Your Content with Complex Animations, Part 1

Hello budget videographers and user guide writers! Have you ever looked on with envy at some of those fancy animations in online videos and wondered “How can I do that?” Well, I can’t solve all your problems, but I can give you some examples, pointers and resources to get you started. For your videos you…

Read More
30. 10. 2024 Oscar Zambotti Automation, Development, Documentation

The OpenAPI Tales: A New Dawn

When we talk about APIs, we developers are generally biased, and focus on how they’re implemented technically – how they work, how they integrate into larger systems – and we settle for that. But there’s a valuable part of API development that often gets overlooked: creating their descriptions. This practice tends to be undervalued, so…

Read More
30. 10. 2024 Rocco Pezzani Log-SIEM, NetEye

Elasticsearch Restart and Network Tuning

We all know that NetEye Upgrades are boring activities. Upgrading is important and useful because it brings you bug fixes and new features, but nonetheless it’s extremely expensive in terms of time. The most boring, tiring and lengthy part is when you restart NetEye Services; if you have the SIEM Module installed, the time spent…

Read More
29. 10. 2024 Marco Berlanda Front-end, Real User Experience, UI, UX

The Power of Micro-Interactions: Enhancing UX in Front-end Development

In front-end development, the small details can have a big impact. Micro-interactions (those subtle animations and feedback elements that respond to user actions) are powerful tools for creating solid, smooth and engaging experiences. In this article, we will explore why they’re so effective, how to design them purposefully, and how to implement them efficiently with…

Read More

Archive