{"id":2164,"date":"2021-04-19T21:30:28","date_gmt":"2021-04-19T21:30:28","guid":{"rendered":"https:\/\/hkm-consulting.de\/next-generation-soc\/"},"modified":"2021-04-20T23:51:21","modified_gmt":"2021-04-20T23:51:21","slug":"next-generation-soc","status":"publish","type":"page","link":"https:\/\/hkm-consulting.de\/en\/next-generation-soc\/","title":{"rendered":"Next Generation SOC"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column width=&#8221;5\/12&#8243;][vc_column_text]<\/p>\n<h3>Next-Generation SOC<\/h3>\n<p>Meaningful overviews can be customised as needed with minimal effort. Comprehensive reports can be tailored to company-specific requirements.<\/p>\n<p>Corporate designs can be realised to meet visual reporting requirements. White labelling can be used to present a customised look for a client when services are provided.<\/p>\n<p>Management overviews are defined for all solution components and provide a clear overview of the system status.<\/p>\n<p><strong>Further reporting elements for Compliance to Code are:<\/strong><\/p>\n<ul>\n<li>Network Map<\/li>\n<li>Group Summary<\/li>\n<li>All Services<\/li>\n<li>Execetuve Summary<\/li>\n<li>Current Errors<\/li>\n<li>Status Overview<\/li>\n<li>Monitoring Coverage<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Further details can always be accessed via links to the lower level.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;2130&#8243; img_size=&#8221;1283&#215;1462&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/12&#8243;][vc_column_text]The structure of the system monitors is divided into three main sections from high-level to details. Compliance to Code shows the following components in this example:<\/p>\n<p><strong>System Information<\/strong><\/p>\n<ul>\n<li>Hourly Alert Rate<\/li>\n<li>Overall CPU Usage<\/li>\n<li>Paging File Usage<\/li>\n<li>Overall Memory Usage<\/li>\n<li>Task Manager Memory Usage<\/li>\n<li>Monitoring Process Memory<\/li>\n<li>Disk Usage (for all partitions)<\/li>\n<li>Ping<\/li>\n<\/ul>\n<p><strong>Monitor Status<\/strong><\/p>\n<ul>\n<li>Core &#8211; Anti-Virus Up to Date<\/li>\n<li>Core &#8211; Disk Space Monitor<\/li>\n<li>Core &#8211; Inventory Collector<\/li>\n<li>Core &#8211; Ping Monitor<\/li>\n<li>Core &#8211; Windows Event Log Errors<\/li>\n<li>Core &#8211; Windows Files Changes<\/li>\n<li>Core &#8211; Windows Service Monitor<\/li>\n<li>Core &#8211; Windows System Performance<\/li>\n<\/ul>\n<p><strong>Recent Alerts<\/strong><br \/>\nEach reported with time, monitor title and details of the alert<\/p>\n<p>&nbsp;<\/p>\n<p>For more details on &#8216;Monitors&#8217; and &#8216;Actions&#8217; consult the &#8216;Compliance to Code &#8211; Product Capabilities&#8217; at product data sheets.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;2132&#8243; img_size=&#8221;1284&#215;2679&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/12&#8243;][vc_column_text]The three main sections for Enterprise Integrity Management shows the following components in this example:<\/p>\n<p><strong>System Information<\/strong><\/p>\n<ul>\n<li>Files Accessed\/min<\/li>\n<li>Bytes Read (MB)\/min<\/li>\n<li>Bytes Written (MB)\/min<\/li>\n<li>Hourly Alarm Rate<\/li>\n<li>15 Minute Total I\/O Operations (System, Account, Process, Application)<\/li>\n<\/ul>\n<p><strong>Monitor Status<\/strong><br \/>\nEIM-Policy status<\/p>\n<p><strong>Recent Alerts<\/strong><br \/>\nEach EIM-Policy Detection, Notification and\/or Alert<\/p>\n<p>&nbsp;<\/p>\n<p>For more details on \u2018Monitors\u2019 and \u2018Actions\u2019 consult the \u2018Enterprise Integrity Management \u2013 Product Capabilities\u2019 at product data sheets.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/12&#8243;][\/vc_column][vc_column width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;2134&#8243; img_size=&#8221;1284&#215;2687&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;5\/12&#8243;][vc_column_text] Next-Generation SOC Meaningful overviews can be customised as needed with minimal effort. Comprehensive reports can be tailored to company-specific requirements. Corporate designs can be realised to meet visual reporting requirements. White labelling can be used to present a customised look for a client when services are provided. Management overviews are defined for all&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2164","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/2164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=2164"}],"version-history":[{"count":22,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/2164\/revisions"}],"predecessor-version":[{"id":2266,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/2164\/revisions\/2266"}],"wp:attachment":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=2164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}