Entrez la valeur d'au moins un composant principal.

Merci de l'intérêt que vous portez à Log360 MSSP.

Remplissez le formulaire pour recevoir un devis personnalisé, qui réponde bien à vos besoins. Notre représentant commercial vous contactera rapidement.

  • Nombre de contrôleurs de domaine
  • Nombre d’appareils Syslog

    (pare-feux, routeurs, commutateurs, systèmes IDS/IPS, AS400, etc.)

     

    Spécifiez collectivement le nombre de périphériques Linux/Unix, de systèmes IBM AS400, de routeurs, de commutateurs, de pare-feu, d'IDS/IPS et d'autres périphériques syslog que vous souhaitez auditer.

  • Nombre de serveurs Windows
  • Nombre de postes de travail Windows
 

Extensions

  •  

    Audit du serveur de fichiers - Surveillez les modifications des fichiers et des dossiers grâce à des techniques efficaces de surveillance de l'intégrité des fichiers.

    1. Serveurs de fichiers Windows
    2. Serveurs de fichiers Linux
    3. NAS NetApp/EMC/Synologie
  •  

    Spécifiez le nombre d'applications à partir desquelles vous souhaitez collecter et analyser les journaux. Il peut s'agir de votre base de données Oracle, MySQL, Apache, DHCP, serveurs de terminaux, etc.

    1. Sites IIS
    2. Serveurs MSSQL
    3. Autres applications
  •  

    The Active Directory Reporting add-on provides key insights into AD and helps spot network security loopholes by delivering security reports on AD objects such as users, computers, security groups, OUs, GPOs, and more.

    Note: The add-on is licensed per client. Please specify the number of clients you need to receive an accurate quote.

    1. No. of Clients
  •  

    AWS, Azure AD/0365 Auditing - Monitor every event happening in your AWS, Azure AD/0365 environment. Find out who performed any operation and when it was performed.

    1. Office 365 Tenants
    2. AWS Accounts
  •  

    UEBA helps identify, qualify, and investigate internal threats. Its core capabilities include anomaly detection, score-based risk assessment, and threat corroboration.

    Note: The add-on is licensed per client. Please specify the number of clients you need to receive an accurate quote.

    1. No. of Clients
  •  

    This add-on helps you accurately identify and estimate the severity of threats posed by malicious URLs, domains, and IP addresses by corroborating data from third-party threat intelligence services.

    Note: The add-on is licensed per client. Please specify the number of clients you need to receive an accurate quote.

    1. No. of Clients
  •  

    With this add-on, you can audit every admin and user activity in Exchange. Keep track of mailbox, database, DAG, and distribution list-related changes.

    1. Servers
En cliquant sur Envoyer, vous acceptez le traitement de vos données à caractère personnel selon la Politique de confidentialité.
 
Compare Models Here's a more detailed breakdown of all the services included in both plans to help you decide:
×
Log360 Service OfferingStandard OnboardingAdvanced Onboarding
InstallationTickTick
Device managementWindows Server - 25, WKS - 100, Supported Syslog Devices - 10Tick
Application management - IIS, MSSQL, Other ApplicationsUp to 1 eachUp to 3 each
Technician management (role configuration)*TickTick
Log collection filter configurationUp to 2 filtersTick
Log retention policy settingsTickTick
Configuring Windows/Linux-based file monitoring (basic configuration)1 in eachTick
Tuning product administrative settings
1. Email and SMS server configuration
2. Configuring log collection failure alerts
3. Log forwarding
TickTick
Historic EVT/EVTX file importTickTick
Custom reports and alerts configuration (provided logs are available)Up to 1 eachUp to 10 in total
Reports, alerts, and compliance schedule creationUp to 1 eachUp to 10
Rule-based correlation setup (based on the feasibility/available logs)Up to 1Up to 5
Compliance-specific reports configurationCrossUp to 1
UEBA: Custom alerts and reports set up*Up to 2Up to 10
Configuring managed servers**CrossTick
Log import schedulingCrossUp to 5
Dashboard customizationCrossUp to 5
Security hardening & privacy
1. SSL configuration
2. Configuring TFA
3. GDPR Privacy Configuration
4. CAPTCHA
CrossTick
Importing historical logs (supported format)CrossTick
Database migration (PGSQL to MSSQL)CrossTick
Advanced Threat Analytics configuration*CrossTick
SOAR workflow configurationCrossTick
Log360 search engine managementCrossTick
Risk score modifications for anomalies based on environment.CrossTick
High availability configurationCrossTick
Restoration of an available backupCrossTick
Incident management configurationCrossTick
Data migration (ES/archive)CrossTick
Custom log parser rule configuration (subject to scope)CrossTick
External threat feed configurationCrossTick
Agent deployment (agent-level registry changes will be performed)CrossTick
NAT configurationCrossTick
Setting up Windows loggingCrossTick
Server migrationCrossTick
Expert consultationCrossTick
Comprehensive documentationCrossTick
User acceptance testingCrossTick
Integrated walkthroughCrossTick
SigningCrossTick
Post-implementation health checkCrossTick
Supporting new log formats (subject to feasibility)CrossTick
Additional custom correlation rules configuration (based on the feasibility/available logs)CrossTick
Training (up to 4 participants)Available as an add-onTick

* - if license is purchased

** - only for distributed editions and MSSPs

Note:
  • Only purchased sub-components of Log360 will be installed and configured.
  • The implementation of the above services are subject to fulfilment of client deliverables outlined in the scope of work (SOW).