The future holds major challenges, which are going far beyond standard monitoring. Internet of Things, E2E Monitoring, SIEM, Network Discovery and Anomaly Detection are keywords that are gaining increasing importance in modern enterprises. Under consideration of these actual trends, we now defined the final agenda of this year’s NetEye & EriZone User Group, which will take place on 23rd march in Nuremberg:
Don’t miss the opportunity to hear about application examples in other companies and to exchange ideas with other users. Moreover, after the presentation of the latest features you will have the possibility to actively contribute to our roadmap definition.
Thursday, 23rd March, 10 am – 5.30 pm in the “historisches Straßenbahndepot St. Peter” in Nuremberg.
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More
With the upgrade to NetEye 4.44, we've added a lot of new features (https://www.neteye-blog.com/2025/10/neteye-4-44-release-notes/) and, from my point of view, one of the most relevant is the introduction of Elastic Stack 9. This Elasticsearch major release (https://www.elastic.co/guide/en/elastic-stack/9.0/elastic-stack-release-notes.html) includes some new Read More
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during malicious activities. This article explains how to detect suspicious behaviors related to Domain Account Discovery Read More