Wilderies Rodriguez Wilderies Rodriguez

Enhancing Cyber Incident Reporting with CISA's New Services Portal 

The new CISA Services Portal offers a secure platform packed with enhanced functionalities tailored for effective cyber incident reporting. One of the standout features of this portal is its integration with login.gov credentials, ensuring a seamless and secure login experience for users. 

The portal is designed to cater to the diverse needs of its users. It allows for the saving and updating of reports, facilitating ongoing incident tracking and management. Moreover, users can share submitted reports with colleagues or clients, making third-party reporting more efficient.  

Read More
Guest User Guest User

Automating Export for Windows Events Logs with PowerShell

In Windows, the Event Viewer is the most common starting point for any activity analysis. The three core logs (Application, System and Security) provide details on information, warnings, errors and critical events. You can also configure Windows to log relevant cybersecurity activities like permission elevations and file deletions. The common issue we see is that the logs do not hold enough history for most auditing requirements. While you can increase the log sizes in Windows, this is not recommended. It will increase disk and performance demands on your servers. Also, Event Viewer is not a robust search and analysis tool. The best approach is to export your events. In this article, I take a straightforward approach to get the event logs exported to CSV files. The CSV format is much easier to work with than the proprietary EVTX Windows format. This approach does not require purchasing any software and relies solely on PowerShell. Once you have your logs exported, you can keep them as long as required and use the logs with other tools for analysis and reporting.

Read More
Infotect Web Admin Infotect Web Admin

Put Your Defenses Up! It’s Cybersecurity Awareness Month!

19 years ago, the month of October was named Cybersecurity Awareness Month. This month is devoted to “helping individuals protect themselves online as threats to technology and confidential data become more commonplace” (cisa.gov).

Read More