Application Log Management

Application logs Monitoring, Analysing and Reporting tool

EventLog Analyzer includes value added application logs analysis reports. The server applications like web server and FTP server and SQL application MSSQL logs are analyzed and reports are generated. As an IIS log analyzer, the server applications logs supported are IIS W3C Web Server logs and IIS W3C FTP Server logs. The SQL application logs supported is MSSQL Server logs. These reports show you details of the top events generated, event trends, and more. Using these reports, administrators can easily determine errant users, and ab-normal behavior of applications, thereby reducing the troubleshooting cycle.

IIS W3C Web Server Logs Analysis Reports

IIS W3C Web Server Logs Analysis

EventLog Analyzer (IIS log analyzer) provides IIS W3C Logs Reports for MS IIS Web Server.

The IIS W3C Web Server Logs Reports provide details of clients, users, file types wise access, page URL wise access, browser wise usage, OS wise usage. It also provides HTTP Error Status Codes report and Malicious URL report.

IIS W3C FTP Server Logs Analysis Reports

EventLog Analyzer (IIS log analyzer) provides IIS W3C Logs Reports for MS IIS for FTP server.

The IIS W3C FTP Server Logs Reports provide details of clients and users. It provides file transfer details, file types wise, server services wise, server IP wise, and source ports wise. Learn More »

IIS W3C FTP Server Logs Analysis Reports

MS SQL Logs Analysis Reports

MS SQL Logs Analysis Reports

MSSQL Server Logs Reports provide the list of users generating maximum number of successful trusted logins, successful non-trusted logins, failed user logins and insufficient resources events. While successful logins is a useful metric to track MSSQL application usage trends, failed user logins is important in analyzing MSSQL application vulnerability to security breaches. The insufficient resource events report helps you to configure the MSSQL application to optimize the usage. Learn More »

Oracle Live Audit Logs Analysis Reports

Oracle Audit Logs Reports provide the list of events generated for Startup, Shutdown and Alter System, Create, Alter and Drop database users, Logon and Logoff in to database, Create, Alter and Drop database tables, and Connect database. The startup, shutdown and alter system reports provide you with the list of system management events of the Oracle database. The create, alter and drop users reports provide you with the details of account management events. The logon, and logoff reports give you the consolidated view of the user session management events. The create, alter and drop tables reports provide you with the list of object management events. Learn More »

Oracle Live Audit Logs Analysis

DHCP Windows Logs Analysis Reports

DHCP Windows Logs Analysis

DHCP Windows Logs Reports provide the list of events generated for Lease, BOOTP Lease, DNS dynamic update, Rogue server detection, IP address wise and MAC address wise. DHCP Administrators will be able to view the report of all the events generated by DHCP server. The reports are useful for diagnosing the network problems. The reports provide you with the details of the following events: lease of IP addresses, lease of BOOTP IP addresses, rogue server activity, IP address wise events and MAC address wise events. Learn More »

DHCP Linux Logs Analysis Reports

DHCP Linux Logs Reports provide the list of events generated for Operations, Client gateway, IP address wise, MAC address wise and single page summary report. DHCP Administrators will be able to view the report of all the events generated by DHCP server. The reports are useful for diagnosing the network problems. The reports provide you with the details of the following events: DHCP operations, client gateway events, IP address wise events and MAC address wise events. Learn More »

DHCP Linux Logs Analysis Reports

Apache Web Server Reports

Apache Web Server Reports

Apache Web Server Log Reports provide exhaustive insights into the handling of requests from the client to the web server. Detailed reports for requests handled successfully, requests with client errors, requests with server errors, and requests leading to redirection. The reports provide client details like IP address, status code of the serviced request, referrer, user agent, and number of events. Learn More »

Print Server Reports

Print Server Log Reports provide security angle to the usage of centralized printers in a network. The reports offer complete details about the users' printing activities such as, name of the user, document ID and name, number of pages, printer used, size of the file, date and time of print, and ports used. Learn More »

Print Server Logs Report
Other features

Syslog management

Collect and analyze Syslog data from routers, switches, firewalls, IDS/IPS, Linux/Unix servers, and more. Get in-depth reports for every security event. Receive real-time alerts for anomalies and breaches.

Windows event log monitoring

Analyze event log data to detect security events such as file/folder changes, registry changes, and more. Study DDoS, Flood, Syn, and Spoof attacks in detail with predefined reports.

IT compliance management

Comply with the stringent requirements of regulatory mandates viz., PCI DSS, FISMA, HIPAA, and more with predefined reports & alerts. Customize existing reports or build new reports to meet internal security needs.

Active Directory Log Monitoring

Monitor all types of log data from Active Directory infrastructure. Track failure incidents in real-time and build custom reports to monitor specific Active Directory events of your interest.

Privileged user monitoring

Monitor and track privileged user activities to meet PUMA requirements. Get out-of-the-box reports on critical activities such as logon failures, reason for logon failure, and more.

Print Server Management

Monitor and audit print server with detailed reports on documents printed, attempts to print documents without proper permission, failed print jobs and their causes, and more.

Need Features? Tell Us
If you want to see additional features implemented in EventLog Analyzer, we would love to hear. Click here to continue

Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
     
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
     
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
     
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
     
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
     
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Threat Management