SlideShare a Scribd company logo
1 of 18
Manage Engine’s
Eventlog analyzer
Presented by:-
Mr.Swapnil A.Raut
Softcell Technologies
Ppt reserved
Index
Sr No. Topics Sub-Topics
1. Eventlog Analyzer?
2. Editions
3. System requirement
4. Port Requirement
5. Installation
6. Features
6.1 Dashboard
6.2 Log management & Network Security
6.3 Monitor Application Logs & Generate Reports
6.4 IT Compliance Reports
6.5 System and User Monitoring Log Reports
6.6 Security Information Management
6.7 Alerts and Notifications
7 Configuration
1.Eventlog Analyzer ?
• EventLog Analyzer is a web-based, real-time, log monitoring and compliance management
solution for Security Information and Event Management (SIEM) that improves internal
network security and helps you to comply with the latest IT audit requirement.
• Get log data from machines and applications.
• Real-time event correlation, instant alert notification and quick remediation.
• Security Information and Event Management (SIEM).
• Efficient event log analysis or syslog analysis reduces system downtime, increases network
performance, and helps tighten security policies of the enterprise.
2.Editions
Parameters Free Premium Distributed/enterprise
3.System requirement
To install on 32-bit machine.
The minimum hardware requirements for EventLog Analyzer to start running are listed below.
• 1 GHz, 32-bit (x86) Pentium Dual Core processor or equivalent
• 2 GB RAM
• 5 GB Hard disk space for the product
To install on 64-bit machine.
The minimum hardware requirements for EventLog Analyzer to start running are listed below.
• 2.80 GHz, 64-bit (x64) Xeon® LV processor or equivalent
• 2 GB RAM
• 5 GB Hard disk space for the product
EventLog Analyzer is optimized for 1024x768 monitor resolution and above.
Operating System Requirements
• Windows 2012 Server,Windows 2008 Server,Windows 2003 Server,Windows 2000
Server,Windows 8,Windows 7,Windows 2000,Windows Vista,Windows XP,Windows NT
• Linux - RedHat RHEL, Mandrake,Mandriva,SuSE,Fedora,CentOS, Ubuntu,Debian.
4.Ports requirement
Port No Post usage
8400 Web server port
513, 514 Syslog port
33335 PostgreSQL/MySQL database port
135, 445, 139 WMI, DCOM, RPC - Incoming traffic ports
1024-65534 WMI, DCOM, RPC - Outgoing traffic ports
5000, 5001 UDP ports for EventLog Analyzer agent-server communication
8400 TCP ports for EventLog Analyzer remote agent to server
communication
5.Installation
• One click install
• Advanced Install
Click on install
Download
ManageEngine_EventLogAn
alyzer.exe
License agreement Finish
# by default port 8400
Download
ManageEngine_EventLog
Analyzer.exe
Click to install License agreement Edition Wizard
Select path
Ex:-ManageEngineEventLog
Port No:8400
(modify)
Support
(Details)
Click Install
(shortcut)
Finish
6.Features
6.1 Dashboard
6.2 Log management & Network Security
1.Event Log Management 2.Syslog Management
3.Application Logs Management 4.Windows Terminal Server Log Monitoring
5.Syslog Server 6.Universal Log Parsing & Indexing (ULPI)
7.Event Log Monitoring 8.Cloud Infrastructure Log Monitoring
9.Database Auditing
6.3 Monitor Application Logs & Generate Reports
1. Microsoft IIS Web server application 2. Microsoft IIS FTP server application
3. DHCP Windows application 4. DHCP Linux application
5. MS SQL database application 6. Oracle database application (Audit)
7. Apache web server application 7. Print server application
6.4 IT Compliance Reports
1.Compliance Audits 2.PCI Compliance Reports
3.ISO 27001 Compliance Reports 4.FISMA Compliance Report
5.HIPAA Compliance Reports 6.SOX Compliance Reports
7. GLBA Compliance Reports 8. Reports for New Regulatory Compliance
9.Customizing Compliance Reports
6.5 System and User Monitoring Log Reports
1.Active Directory Log Reports 2. Privilege User Monitoring (PUMA) Reports
3.User Session Monitoring 4.Event Log Reports - Ask ME
5.Historical Event Trends 6.Advanced Search Result as Report Profile
7.Ready-built EventLog Reports 8.Custom EventLog Reports
6.6 Security Information Management
1.Agent-less Log Collection 2. Agent based Log Collection
3.Log Search 4.Log Analysis
5.Log Archiving 5.Log Forensics
7.Importing Event Logs 8User Authentication
6.7 Alerts and Notifications
• Real Time Alerts
• Alert Notifications - email, SMS and Run Program
7.Configuration
• Manage Hosts- Manage Host Groups
• Manage Applications
• Import
• Archive- Archive Settings
• Report Profile- Schedule Reports
• Alert
• Database Filter- IBM iSeries (AS/400) Database Filter
• Export/Import Profile
• Custom Pattern
• Dashboard Profiles - Add| Edit / Del | All Profiles
Scenario
Event log analyzer by me

More Related Content

What's hot

07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
carlitocabana
 

What's hot (20)

Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Packets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 framesPackets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 frames
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Big ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methodsBig ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methods
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Siem solutions R&E
Siem solutions R&ESiem solutions R&E
Siem solutions R&E
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 

Viewers also liked

Aesthetic upbringing
Aesthetic upbringingAesthetic upbringing
Aesthetic upbringing
IreneBarley1
 
IRT Pictorial 10-13-16
IRT Pictorial 10-13-16IRT Pictorial 10-13-16
IRT Pictorial 10-13-16
Eric Tarbox
 

Viewers also liked (11)

Sergio alejandro ramírez franco
Sergio alejandro ramírez francoSergio alejandro ramírez franco
Sergio alejandro ramírez franco
 
Ahmed Abdel Karim - CV (EN)
Ahmed Abdel Karim - CV (EN)Ahmed Abdel Karim - CV (EN)
Ahmed Abdel Karim - CV (EN)
 
Solicitud informativa angel_wha
Solicitud informativa angel_whaSolicitud informativa angel_wha
Solicitud informativa angel_wha
 
Classification of hotels by G.Arvind
Classification of hotels by G.ArvindClassification of hotels by G.Arvind
Classification of hotels by G.Arvind
 
hassan
hassanhassan
hassan
 
Comprobante aceptacion miguel_angel_garcia_wha
Comprobante aceptacion miguel_angel_garcia_whaComprobante aceptacion miguel_angel_garcia_wha
Comprobante aceptacion miguel_angel_garcia_wha
 
Aesthetic upbringing
Aesthetic upbringingAesthetic upbringing
Aesthetic upbringing
 
IRT Pictorial 10-13-16
IRT Pictorial 10-13-16IRT Pictorial 10-13-16
IRT Pictorial 10-13-16
 
P.s biomas
P.s biomasP.s biomas
P.s biomas
 
Elastic search & patent information @ mtc
Elastic search & patent information @ mtcElastic search & patent information @ mtc
Elastic search & patent information @ mtc
 
Finals zugzwang(2016)
Finals zugzwang(2016)Finals zugzwang(2016)
Finals zugzwang(2016)
 

Similar to Event log analyzer by me

Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
RajDodiya4
 
Cisco Application eXtension Platform (AXP) - James Weathersby, Cisco
Cisco Application eXtension Platform (AXP) - James Weathersby, CiscoCisco Application eXtension Platform (AXP) - James Weathersby, Cisco
Cisco Application eXtension Platform (AXP) - James Weathersby, Cisco
mfrancis
 

Similar to Event log analyzer by me (20)

Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
SCOM Tips and Tricks
SCOM Tips and TricksSCOM Tips and Tricks
SCOM Tips and Tricks
 
Observability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise IntegratorObservability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise Integrator
 
Network fault management and IT automation training
Network fault management and IT automation trainingNetwork fault management and IT automation training
Network fault management and IT automation training
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
Monitoring in Big Data Platform - Albert Lewandowski, GetInData
Monitoring in Big Data Platform - Albert Lewandowski, GetInDataMonitoring in Big Data Platform - Albert Lewandowski, GetInData
Monitoring in Big Data Platform - Albert Lewandowski, GetInData
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
ObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate PresentationObserveIT Remote Access Monitoring Software - Corporate Presentation
ObserveIT Remote Access Monitoring Software - Corporate Presentation
 
WSO2 IoT Server - Product Overview
WSO2 IoT Server - Product OverviewWSO2 IoT Server - Product Overview
WSO2 IoT Server - Product Overview
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
 
gesa_sol.ppt
gesa_sol.pptgesa_sol.ppt
gesa_sol.ppt
 
PRTG
PRTGPRTG
PRTG
 
eMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management SuiteeMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management Suite
 
Cisco Application eXtension Platform (AXP) - James Weathersby, Cisco
Cisco Application eXtension Platform (AXP) - James Weathersby, CiscoCisco Application eXtension Platform (AXP) - James Weathersby, Cisco
Cisco Application eXtension Platform (AXP) - James Weathersby, Cisco
 
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICESCENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
 
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.comWindows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
 
Nava SIEM Agent Datasheet
Nava SIEM Agent DatasheetNava SIEM Agent Datasheet
Nava SIEM Agent Datasheet
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Event log analyzer by me

  • 1. Manage Engine’s Eventlog analyzer Presented by:- Mr.Swapnil A.Raut Softcell Technologies Ppt reserved
  • 2. Index Sr No. Topics Sub-Topics 1. Eventlog Analyzer? 2. Editions 3. System requirement 4. Port Requirement 5. Installation 6. Features 6.1 Dashboard 6.2 Log management & Network Security 6.3 Monitor Application Logs & Generate Reports 6.4 IT Compliance Reports 6.5 System and User Monitoring Log Reports 6.6 Security Information Management 6.7 Alerts and Notifications 7 Configuration
  • 3. 1.Eventlog Analyzer ? • EventLog Analyzer is a web-based, real-time, log monitoring and compliance management solution for Security Information and Event Management (SIEM) that improves internal network security and helps you to comply with the latest IT audit requirement. • Get log data from machines and applications. • Real-time event correlation, instant alert notification and quick remediation. • Security Information and Event Management (SIEM). • Efficient event log analysis or syslog analysis reduces system downtime, increases network performance, and helps tighten security policies of the enterprise.
  • 4. 2.Editions Parameters Free Premium Distributed/enterprise
  • 5. 3.System requirement To install on 32-bit machine. The minimum hardware requirements for EventLog Analyzer to start running are listed below. • 1 GHz, 32-bit (x86) Pentium Dual Core processor or equivalent • 2 GB RAM • 5 GB Hard disk space for the product To install on 64-bit machine. The minimum hardware requirements for EventLog Analyzer to start running are listed below. • 2.80 GHz, 64-bit (x64) Xeon® LV processor or equivalent • 2 GB RAM • 5 GB Hard disk space for the product EventLog Analyzer is optimized for 1024x768 monitor resolution and above. Operating System Requirements • Windows 2012 Server,Windows 2008 Server,Windows 2003 Server,Windows 2000 Server,Windows 8,Windows 7,Windows 2000,Windows Vista,Windows XP,Windows NT • Linux - RedHat RHEL, Mandrake,Mandriva,SuSE,Fedora,CentOS, Ubuntu,Debian.
  • 6. 4.Ports requirement Port No Post usage 8400 Web server port 513, 514 Syslog port 33335 PostgreSQL/MySQL database port 135, 445, 139 WMI, DCOM, RPC - Incoming traffic ports 1024-65534 WMI, DCOM, RPC - Outgoing traffic ports 5000, 5001 UDP ports for EventLog Analyzer agent-server communication 8400 TCP ports for EventLog Analyzer remote agent to server communication
  • 7. 5.Installation • One click install • Advanced Install Click on install Download ManageEngine_EventLogAn alyzer.exe License agreement Finish # by default port 8400 Download ManageEngine_EventLog Analyzer.exe Click to install License agreement Edition Wizard Select path Ex:-ManageEngineEventLog Port No:8400 (modify) Support (Details) Click Install (shortcut) Finish
  • 8.
  • 10. 6.2 Log management & Network Security 1.Event Log Management 2.Syslog Management 3.Application Logs Management 4.Windows Terminal Server Log Monitoring 5.Syslog Server 6.Universal Log Parsing & Indexing (ULPI) 7.Event Log Monitoring 8.Cloud Infrastructure Log Monitoring 9.Database Auditing
  • 11. 6.3 Monitor Application Logs & Generate Reports 1. Microsoft IIS Web server application 2. Microsoft IIS FTP server application 3. DHCP Windows application 4. DHCP Linux application 5. MS SQL database application 6. Oracle database application (Audit) 7. Apache web server application 7. Print server application
  • 12. 6.4 IT Compliance Reports 1.Compliance Audits 2.PCI Compliance Reports 3.ISO 27001 Compliance Reports 4.FISMA Compliance Report 5.HIPAA Compliance Reports 6.SOX Compliance Reports 7. GLBA Compliance Reports 8. Reports for New Regulatory Compliance 9.Customizing Compliance Reports
  • 13. 6.5 System and User Monitoring Log Reports 1.Active Directory Log Reports 2. Privilege User Monitoring (PUMA) Reports 3.User Session Monitoring 4.Event Log Reports - Ask ME 5.Historical Event Trends 6.Advanced Search Result as Report Profile 7.Ready-built EventLog Reports 8.Custom EventLog Reports
  • 14. 6.6 Security Information Management 1.Agent-less Log Collection 2. Agent based Log Collection 3.Log Search 4.Log Analysis 5.Log Archiving 5.Log Forensics 7.Importing Event Logs 8User Authentication
  • 15. 6.7 Alerts and Notifications • Real Time Alerts • Alert Notifications - email, SMS and Run Program
  • 16. 7.Configuration • Manage Hosts- Manage Host Groups • Manage Applications • Import • Archive- Archive Settings • Report Profile- Schedule Reports • Alert • Database Filter- IBM iSeries (AS/400) Database Filter • Export/Import Profile • Custom Pattern • Dashboard Profiles - Add| Edit / Del | All Profiles