Support
 
Support Get Quote
 
 
 
 
  • Network devices
  • Basics of log management
  • Database platforms
  • Web servers
  • General
  • All
  • Log Parsing
  • Log Archival
  • Log Collection
  • Log Correlation
  • Log Normalization
  • Log Data
  • Network device logging
  • Structured logging
  • Log search
  • All
  • Switches
  • Windows
  • Firewall
  • Syslog
  • All
  • Microsoft SQL
  • All
  • Microsoft IIS
  • All
  •  
    Log searches Feb 10, 2022

    A simple guide to log searches

    Read more 5 Minutes
     
  •  
    Structured logging Aug 07, 2023

    The complete guide to structured logging: Enhancing security visibility

    Read more 8 Minutes
     
  •  
    Network device logging Feb 10, 2022

    What is network device logging and why is it necessary?

    Read more 6 Minutes
     
  •  
    Log Parsing Feb 10, 2022

    Everything you need to know about log parsing

    Read more 6 Minutes
     
  •  
    Log Archival Feb 10, 2022

    What is log archival and why is it important to your business?

    Read more 6 Minutes
     
  •  
    Log Collection Aug 08, 2022

    What is log collection?

    Read more 3 Minutes
     
  •  
    Log Correlation Aug 08, 2022

    What is log correlation? Why do organizations need it?

    Read more 3 Minutes
     
  •  
    Log Normalization Aug 08, 2022

    Discover the importance of log normalization

    Read more 5 Minutes
     
  •  
    Log Data Aug 08, 2022

    Everything you need to know about log data

    Read more 5 Minutes
     
  •  
    Log Data Feb 10, 2022

    A simple guide to log searches

    Read more 5 Minutes
     
  •  
    Switches Feb 10, 2022

    How to check your Cisco switch logs?

    Read more 6 Minutes
     
  •  
    Windows Feb 10, 2022

    Critical Windows events: Event ID 6008

    Read more 6 Minutes
     
  •  
    Windows Feb 10, 2022

    Critical Windows events: Event ID 7031 - Service crash

    Read more 6 Minutes
     
  •  
    Windows July 20, 2023

    A comprehensive guide to navigate Sysmon logs

    Read more 6 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Understanding SQL Server Audit better

    Read more 6 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Change Tracking in SQL Server

    Read more 6 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Configuring the SQL Server auditing feature

    Read more 6 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Basics of SQL Server auditing

    Read more 2 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Setting up SQL Server Audit feature

    Read more 4 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Auditing using SQL Server Triggers

    Read more 3 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    How to use SQL Server tracing and profiler for auditing

    Read more 3 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Auditing using DB audit specification and server audit

    Read more 5 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Viewing SQL Server audit logs

    Read more 1 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    Enabling C2 auditing and common criteria compliance

    Read more 5 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    How to read transaction logs

    Read more 3 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    How to write SQL server audit events in Windows security logs

    Read more 2 Minutes
     
  •  
    Microsoft SQL Feb 10, 2022

    How to individually audit SQL statements?

    Read more 4 Minutes
     
  •  
    SQL May 05, 2023

    5 best practices to optimize SQL logging

    Read more
     
  •  
    Firewall Feb 10, 2022

    Comparing inbound and outbound firewall rules

    Read more
     
  •  
    Firewall Feb 10, 2022

    How to block suspicious IP in the firewall

    Read more
     
  •  
    Firewall Feb 10, 2022

    How to prevent port scan attacks

    Read more
     
  •  
    Firewall Feb 10, 2022

    How to detect and prevent TCP 445 exploit and attack

    Read more
     
  •  
    Firewall Feb 10, 2022

    The importance of firewall logs in network security

    Read more
     
  •  
    Firewall Feb 10, 2022

    How to enable logging in Linux Firewalls

    Read more
     
  •  
    Firewall Feb 10, 2022

    How to enable logging in Windows firewalls

    Read more
     
  •  
    Firewall Feb 10, 2022

    How and what to analyze in a firewall log?

    Read more
     
  •  
    Firewall Feb 10, 2022

    Analyzing firewall logs: Traffic allowed/denied events

    Read more
     
  •  
    Firewall Feb 10, 2022

    Analyzing firewall logs: Firewall start/stop/restart events

    Read more
     
  •  
    Firewall Feb 10, 2022

    Analyzing firewall logs: Firewall authentication events

    Read more
     
  •  
    Firewall Feb 10, 2022

    Analyzing firewall logs: Monitoring firewall rule changes

    Read more
     
  •  
    Firewall Feb 10, 2022

    How is an NGFW better than a traditional firewall?

    Read more
     
  •  
    Firewall Feb 10, 2022

    IDS and IPS log monitoring

    Read more
     
  •  
    Firewall March 22, 2024

    Firewalls and their types

    Read more
     
  •  
    Syslog Feb 10, 2022

    Syslog basics: Formats and fields of Syslog

    Read more
     
  •  
    Syslog Feb 10, 2022

    How to configure centralized syslog server

    Read more
     
  •  
    Syslog Feb 10, 2022

    How to configure a Ubuntu 18.04 LTS server as a rsyslog server?

    Read more
     
  •  
    Syslog Feb 10, 2022

    Analyzing Syslogs using various tools and techniques

    Read more
     
  •  
    Syslog Feb 10, 2022

    Popular tool for centralizing syslogs

    Read more
     
  •  
    Syslog Feb 10, 2022

    Protocols used for syslog collection - TCP, UDP, RELP

    Read more
     
  •  
    Syslog Feb 10, 2022

    Encrypting syslog with TLS

    Read more
     
  •  
    Syslog Feb 10, 2022

    How to analyze Linux login failures

    Read more
     
  •  
    Syslog Feb 10, 2022

    Investigating the cause of system reboot in Linux systems

    Read more
     
  •  
    Syslog Feb 10, 2022

    Syslog analysis: Memory problems

    Read more
     
  •  
    Syslog Feb 10, 2022

    Logging and analyzing cron job errors

    Read more
     
  •  
    Microsoft IIS Feb 10, 2022

    How to locate IIS server log files: A definitive guide

    Read more
     
  •  
    Microsoft IIS Jan 04, 2023

    5 best practices for IIS logging that you should know

    Read more
     
  •  
    Microsoft IIS Jan 04, 2023

    5 best practices to optimize Apache logging

    Read more
     
  •  
    Microsoft IIS Dec 28, 2023

    A Deep Dive into Apache Logs

    Read more
     
  •  
    Firewall May 24, 2023

    Best practices for firewall logging

    Read more
     
  •  
    General Jun 28, 2023

    Complying with data privacy regulations

    Read more
     
 

Manage logs, comply with IT regulations, and mitigate security threats.

Seamlessly collect, monitor, and analyze
logs with EventLog Analyzer

Your request for a demo has been submitted successfully

Our support technicians will get back to you at the earliest.

  •  
  •  
By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.

  Zoho Corporation Pvt. Ltd. All rights reserved.

Link copied, now you can start sharing
Copy