SysLog & Windows Event Log Archiving

UNIX/Router/Switches SysLog and Windows Event Log Archiving

EventLog Analyzer automatically archives all event logs and syslogs collected from Windows and UNIX hosts, Routers & Switches, and other syslog devices on the EventLog Analyzer server itself. The event log archive is invaluable in forensic analysis and determining performance and usage statistics for a host.

Encrypting Archived Log files

Now, EventLog Analyzer encrypts the event log archive files to ensure the log data is secured for future forensic analysis, compliance and internal audits.


The hashing of the archive log data files further secures the event log data.

Time stamping

The time stamping technique ensures that the archive data files are tamper proof. If there is a modification of file, this technique will reveal that the file has been tampered.

The three point security keeps the archive log data safe.

Configurable Log Archiving Intervals

The default log archiving interval creates a log archive file of the all the received raw logs every 24 hours. And these log archive files are then compressed (zipped) after every 7 days, to conserve hard disk space. You can configure the archive file creation and compressed file creation any time depending on how often you need to archive event logs. You can even disable log archiving entirely if needed.

Reports on Archived Event Logs

At any time, you can load event log archive file into the EventLog Analyzer database and generate reports from the archived event data.

Detailed Event Log Archiving

Every log archive file that is created, is stored along with the time of archive creation, size of the archive, and the host whose event logs have been archived. This makes it easy to load and generate reports from archived event logs.

Instant Event Log Archiving

EventLog Analyzer includes options to instantly generate log archives for all event logs collected so far. All event logs collected will be archived, irrespective of the log archiving interval defined. In this way, you can create and load archived files into the database at any time.

Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Threat Management