While working with Kibana, we recently encountered a puzzling situation: queries involving the field event.original returned ...
Watch the interview with Michael Schwartzkopff, who was among the speakers at the Open Source System Management Conference hosted by Würth Phoenix on May 10th in Bolzano. Michael gives his impressions ...
In this post I’ll describe how to update the certificate used by the Dynamics 365 Finance & Operations on-premises system (which I’ll call D365). This activity is called “certificate rotation” and it ...
With the upgrade to NetEye 4.44, we’ve added a lot of new features (https://www.neteye-blog.com/2025/10/neteye-4-44-release-notes/) and, from my point of view, one ...
The NetEye Conference 2025 in Verona offered a full day of deep-dive sessions, live use cases, and peer-to-peer learning – all centered around one guiding theme: Intelligent Operations in Action. Our ...
The atlassian-python-api library is one of the most effective tools available for Python-based Atlassian integrations. It ...
As Atlassian experts, our work doesn’t stop at configuring environments or tailoring Jira, Confluence, and Bitbucket to match a customer’s processes. In many projects, we go a step further: we develop ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...
CVE-2025-54988 (Apache Tika): CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/MPR:L For a detailed overview of the security issue(s), including the impact, CVSS score ...
If you’ve ever worked with Windows authentication logs, you know they can be a chaotic mess. Even when you’re looking for something apparently simple and useful – like tracking admin logins – you ...
Starting in January I was offered the following challenge: Help customers use their NetEye system differently, that is, help customers exploit the potential of our system to move from a use that’s ...