This affects all of us who still use plain LDAP to perform queries in Active Directory. Starting in March we will be forced to use secure LDAP binding, because AD will deny plain LDAP connections. This may have a significant impact on those NetEye and EriZone Systems that use LDAP as an authentication or sync source.
As a definitive solution, you need to switch to LDAPS, which is supported by all versions of NetEye and by EriZone.
Please consult your product’s user guide, or contact our support service to obtain more specific help about this matter.
I graduated in Applied Computer Science at the University of Bolzano in 2006. After 3 years of experience as consultant in a small IT business IT I decided to move on, and found Würth Phoenix as a good starting point for a career.
After serving several years as a developer, consultant and support engineer, I now lead the Service & Support Team and aim to deliver best quality services to our customers, by helping them using our products together with the strength of Open Source, in which I strongly believe.
Author
Oreste Attanasio
I graduated in Applied Computer Science at the University of Bolzano in 2006. After 3 years of experience as consultant in a small IT business IT I decided to move on, and found Würth Phoenix as a good starting point for a career.
After serving several years as a developer, consultant and support engineer, I now lead the Service & Support Team and aim to deliver best quality services to our customers, by helping them using our products together with the strength of Open Source, in which I strongly believe.
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More
In this article I'll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal or self-signed Certificate Authorities. This is especially useful in enterprise Read More
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during malicious activities. This article explains how to detect suspicious behaviors related to Domain Account Discovery Read More
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More