Cloud Security Plus can now collect Classic Elastic Load Balancer (ELB) access logs to generate reports that help analyse the traffic to your ELB and troubleshoot issues.
Collect Azure activity logs from multiple Azure subscriptions using a single app.
Build 4005 (Aug 2017)
IAM popup: The reports now come with a filter to view actions performed by specific IAM users, roles or groups.
SIEM integration: Logs collected by Cloud Security Plus can now be forwarded to an external syslog server and to Splunk.
Adding CloudTrail as a data source in Cloud Security Plus has been made easier.
Reports on AWS activity has now been consolidated for easier understanding.
HTTP and HTTPS port can now be switched from within the product.
Build 4004 (Aug 2017)
S3 server access logging can now be enabled for S3 buckets created in the North Virginia region.
Issue with log search page has been fixed.
Build 4003 (May 2017)
Integration with ManageEngine Log360
Build 4002 (Apr 2017)
New reports in AWS log management
Addition of "IAM Credential Report" under the IAM Reports category.
Addition of a new report category - Route 53 reports.
These reports keep track of activities happening in the Domain Name System (DNS) web-service of Amazon. The activities covered include, the creation and deletion of hosted zones, failed Route 53 activity, traffic policy configuration changes and more.
Option to enable, disable, and edit technicians.
Alerts and report scheduling can be enabled, disabled, and edited.
Improved the efficiency of "Export Report."
Now get scheduled reports delivered to you via email as attachments.
Configure mail servers to use TLS and SSL for secure connection.
ES index archiving is now supported.
Build 4001 (Feb 2017)
Additional graphs have been added to the reports.
An option to send a test mail while configuring an email account.
Time mismatch in AWS reports.
Issues in searches with ":" and "OR"
The issue in deleting an alert.
Issue while exporting reports with hidden columns.
Build 4000 (Feb 2017)
AWS API activity log management: Collects and analyzes CloudTrail and S3 server access logs to provide detailed information on events that occur in Amazon EC2, Web Application Firewalls (WAF), Relational Database Service (RDS), Lambda, Security Token Service (STS), Elastic Block Store (EBS), Virtual Private Cloud (VPC), Elastic Load Balancer (ELB), and Simple Storage Service (S3).
Azure activity logs management: Processes Azure activity logs to give insights on user activity and any changes made to network security groups, virtual networks, DNS zones, virtual machines, databases, and storage accounts.
Out-of-the-box reports for monitoring: Comes with 100+ pre-defined reports that help in meeting the security and operational needs of cloud security administrators.
Report scheduling: Allows users to automate report generation by scheduling the reports at specific time intervals. The solution also provides option to redistribute the reports to administrators over email.
Alerting: Provides instant email alert notifications for any critical change happening in AWS and Azure environments, such as network configuration changes, security group creations, new user creations and more.