Log Management Software
What is EventLog Analyzer?
With organizations generating terabytes of log, analyzing these logs manually is painful and time consuming. That's where Security Information and Event
Management (SIEM) solutions like EventLog Analyzer come in.
EventLog Analyzer helps organizations to collect, analyze, correlate, report, archive, and search logs without any hassle. Unlike other IT management tools which are
hard to use, difficult to install and expensive, EventLog Analyzer boasts about its ease of use, agent-less installation, instant reports, and cost effective pricing.
EventLog Analyzer offers a centralized repository to collect and archive machine generated logs from heterogeneous systems, network devices, and applications in
your organization. The product supports a wide variety of IT Security and Regulatory IT Compliance reports such as SOX, HIPAA, FISMA, GLBA, ISO 27001, etc. Its
intelligent log search and alerting engine helps network administrators to quickly troubleshoot and identify the root cause of IT problems.
Also, EventLog Analyzer using its powerful Universal Log Parsing and Indexing (ULPI) technology allows you to index new fields and decipher any log data regardless of the source and log
format. Now you can stop sifting through voluminous logs manually and get it all done with EventLog Analyzer.
Why Choose EventLog Analyzer?
Unlock the Real value of your logs
- Supports an extensive array of machine generated logs which includes system logs, device logs, and application logs
- Provides a wide variety of reports for internal threat monitoring and regulatory compliance audits
Productivity improvement for IT teams
- From product deployment to report generation in minutes!
- Real-time alerts to network events enable IT to respond instantaneously to security threats
Get a Quote or Download Free Trial
Meet dynamic business needs quickly
- Rapidly transforms machine generated logs into actionable information
- Receive reports in user friendly formats and meet regulatory business requirements
Attractive TCO & Rapid ROI
- No additional hardware required, minimal IT overhead , ease-of-deploymen t and ease-of-use ensures a low TCO and rapid ROI
Features
Log Collection
- Agentless log collection (optional agents available)
- Collects logs from heterogeneous sources (Windows systems, Unix/Linux systems, Applications, Databases, Routers, Switches and other Syslog devices)
Privileged User Monitoring
- Collects and analyzes all events on user and administrator activity
- Get precise information of user access such as which user performed the action, what was the result of the action, on which server it happened and track down the user workstation from where the action was triggered
Compliance Reports
- Generate pre-defined/canned compliance reports for Event logs & Syslogs, to meet HIPAA, GLBA, PCI DSS, SOX, ISO 27001, and FISMA
- Provides value added new feature to create custom report for new compliance to help comply with growing new regulatory
Real-Time Event Correlation
- With 70+ predefined event correlation rules, detect breach attempts, insider threats, policy violations and more without any manual intervention
- Flexible drag-n-drop correlation rule builder allows users to define attack patterns thus help in proactively reacting to security threats
Log Forensics
- Drill down to the raw log events and do a root cause analysis within minutes, and drastically reduce the time-to-remediate
- Generates network forensic reports like user activity reports, system audit reports, regulatory compliance reports, etc.
Real-time Alerting
- Get alerted in real-time via SMS and email upon the occurrence of network anomaly. You can even run a program or script to remediate the alert condition.
- 500+ predefined alert criteria across Windows, Unix/Linux, Application and Network device infrastructure eliminates the need for setting up alert profile for routine tasks thus increasing the operational efficiency.
Log Archive
- Automatically archives all machine generated logs - system logs, device logs & application logs to a centralized repository
- Archived log files are encrypted to make it secure and are hashed & time-stamped to make it tamper-proof
Log Search
- Conduct a search using Wild-cards, Phrases, Boolean operators, etc.
- Search for anything, not just a handful of pre-indexed fields, and quickly detect network anomalies - misconfigurations, viruses, user activities, system/applications errors, etc.
Universal Log Collection
- Decipher any log data regardless of the source and log format
- Allows you to index any machine-generated logs (provided it is in human readable, non-encrypted format) by defining and extracting log fields of your choice using regular expression (regex) patterns
File Integrity Monitoring
- Centrally track all changes when files and folders are created, accessed, viewed, deleted, modified, renamed, etc.
- Get a complete audit trail of all the changes that happen on files and folders. Audit trail answers the "who what, when, where and how" of all changes in real-time!
Get a Quote or Download Free Trial
EventLog Analyzer Documentation
Here you can find EventLog Analyzer product documentation, brochures and guides. If you have any questions please feel free to contact us and one of our specialists will address your inquiry as soon as possible.
Get a Quote or Download Free Trial
System Requirements
For 32 Bit Installation
The minimum hardware requirements for installing and working with EventLog Analyzer are given below.
- 1 GHz, 32-bit (x86) Pentium Dual Core processor or equivalent
- 4 GB RAM*
- 50 GB Hard disk space for the product
For 64 Bit Installation
The minimum hardware requirements for EventLog Analyzer to start running are listed below.
- 2.80 GHz, 64-bit (x64) Xeon LV processor or equivalent
- 4 GB RAM*
- 50 GB Hard disk space for the product
EventLog Analyzer is optimized for 1024x768 monitor resolution and above.
* The following table recommends the disk space and RAM size requirements of the system where EventLog Analyzer is installed. The disk space and RAM size requirements
depends on the number of host sending log information to EventLog Analyzer, the number of host log records received
per second or the host log data received per day by EventLog Analyzer. The calculation is worked out for 100 hosts and an average log record size of 350 bytes.
Log Records Rate or Volume |
RAM Size |
Hard Disk Space Requirement Per Month to Archive Logs |
500/sec or 20 GB/day |
4 GB |
400 GB |
1000/sec or 40 GB/day |
8 GB |
800 GB |
Operating System Requirements
EventLog Analyzer can be installed and run on the following operating systems and versions:
- Windows™ 8, Windows™ 7, Vista, 2000, XP, & NT and Windows™ Server 2000/2003/2008/2008 R2/2012
- Linux - RedHat 8.0/9.0, Mandrake/Mandriva, SuSE, Fedora, CentOS
- Ability to run in VMware environment
Supported Web Browsers
EventLog Analyzer has been tested to support the following browsers and versions:
- Internet Explorer 8 and later
- Firefox 4 and later
- Chrome 8 and later
Supported Databases
Bundled with the product
External Databases
- MS SQL 2005
- MS SQL 2008
- MS SQL 2012
- MS SQL 2014
PostgreSQL Performance Improvement Parameters
For better performance, we recommend replacing the existing PostgreSQL parameters mentioned in postgres_ext.txt available under\pgsql\data\directory with the values mentioned below:
Parameters |
This change requires EventLog Analyzer Application/Service restart. |
shared_buffers=128 MB |
Minimum requirement is 128 KB. This change requires EventLog Analyzer Application/Service restart. |
work_mem=12 MB |
Minimum requirement is 64 KB. |
maintenance_work_mem=100 MB |
Minimum requirement is 1 MB. |
checkpoint_segments=15 |
Logfile segments minimum 1 and 16 MB each. |
checkpoint_timeout=11 minutes |
Range: 30 seconds to 1 hour. |
checkpoint_completion_target=0.9 |
checkpoint target duration is 0.0 - 1.0. |
seq_page_cost=1.0 |
This parameter is measured in an arbitrary scale. |
random_page_cost=2.0 |
This parameter is measured in same scale as above. |
effective_cache_size=512MB |
|
synchronous_commit=off |
|
Videos
See how our Security Information and Event Management (SIEM) software automates log management and helps you to mitigate internal threats, conduct log forensics analysis, meet regulatory compliance requirements and more.
Get a Quote or Download Free Trial
|
Event correlation automatically detects and provides alerts on network anomalies and vulnerabilities.
IT security professionals get complete visibility into network user activities, policy violations, network anomalies, system downtime, and network security threats in real time. EventLog Analyzer includes more than 50 powerful, out-of-the-box correlation rules that can be customized to meet internal security policies.
Get a Quote or Download Free Trial
|
With EventLog Analyzer administrators can gain better insight into security threats and meet regulatory compliance requirements by monitoring and analyzing log data from all the network devices and applications.
This Compliance reporting software allows you to generate pre-defined/canned compliance reports such as PCI DSS , FISMA, GLBA, SOX, HIPAA, etc. by collecting, analyzing and archiving windows event logs and syslogs received from your network infrastructure
Get a Quote or Download Free Trial
|
Sean Freeman explains SIEM and Reporting with Manage Engine EventLog Analyzer. He explains how he prevented outage with the alerts, and also talks about recovering inadvertently deleted files.
Get a Quote or Download Free Trial
|
Get a Quote or Download Free Trial