Osquery: What it is, how it works, and how to use it
Maintaining visibility into infrastructure and operating systems is critical for all organizations today—compliance, security, and your bottom line depend on it.
Using osquery to monitor third-party system extensions for IT compliance
Monitoring system-level kernel extensions, modules, and drivers across all three major desktop platforms is a great way to ensure IT compliance, with a sprinkling of security investigation if you uncover something interesting.
Tagged as: osquery tutorial, osquery, compliance
Using Augeas with osquery: How to access configuration files from hundreds of applications
Osquery is a powerful tool that allows you to investigate and monitor a myriad of endpoint activity, status, and configuration information through a unified SQL interface. Inside osquery, there's typically a 1:1 correspondence between a source of information and the SQL table you can use to browse or search this information. Some sources of information include parts of the /proc
file system, API calls to container daemons, reading logs or status files on disk, and event streams coming from the Linux audit frame.
Tagged as: osquery tutorial, osquery, containers, configuration, augeas
Osquery tutorial: How to check disk encryption on Mac, Linux, and Windows
As user-driven security expands, the need for securing user-managed systems grows. Disk encryption is an essential and straightforward way to shore up user security.
Tagged as: osquery tutorial, osquery, user security
Osquery tutorial: Assessing Chrome extension permissions
In a previous tutorial, we discussed gathering software inventory, including Chrome extensions.
Knowing what you have is half the battle. But once you know what you have, how do you decide what you should keep?
Tagged as: osquery tutorial, osquery
Osquery tutorial: Gathering software inventory
Gathering software inventory is an important part of security and systems management. There’s a good reason software inventory is No. 2 in the list of CIS Critical Controls!
Tagged as: osquery tutorial, osquery, compliance
Subscribe for new posts
Popular Posts
- Building Your Cyber Security Strategy: A Step-By-Step Guide
- 8 Docker Security Best Practices To Optimize Your Container System
- Intro to Osquery: Frequently Asked Questions for Beginners
- SOC 2 Compliance Requirements: Essential Knowledge For Security Audits
- Warzone RAT comes with UAC bypass technique