Support
 
Support Get Quote
 
 
 
 

FERPA compliance

  • Key features
  • Why choose us
  • FAQs

The Family Educational Rights and Privacy Act (FERPA) of 1974 aims to preserve the privacy of student education records. According to the U.S. Department of Education, this federal law applies to all schools receiving funds under their applicable program. With ManageEngine EventLog Analyzer, you can ensure the security of students' educational records and meet FERPA's compliance requirements.

How does EventLog Analyzer fulfill FERPA requirements?

EventLog Analyzer, a log management and auditing solution, can help you comply with FERPA section 99.31 (a)(1)(ii). Take a look at the predefined reports provided by EventLog Analyzer to help your enterprise meet FERPA requirements:

FERPA sections

Section 99.31
(a)(1)(ii)

Description of requirement

Monitor and restrict access to sensitive information stored in the network

Some of EventLog Analyzer's reports
that can help fulfill FERPA's
requirements
  • USB Plugged In
  • USB Plugged Out
  • Removable Disk Modifications
  • File Created
  • File Modified
  • File Deleted
  • File Renamed
  • File Permission Changes
  • SQL Server Privilege Abuse
  • SQL Server Unauthorized Copies of Sensitive Data
  • SQL Server Account Locked Out
  • SQL Server Storage Media Exposure
  • SQL Server SQL Injection
  • SQL Server Denial of Service
  • SQL Server Database Created
  • SQL Server Database Dropped
  • SQL Server Database Altered
  • SQL Server Password Changes
  • SQL Server Password Changes Failed
  • MySQL Logon Success
  • MySQL Logon Failures
  • Apache Client Errors
  • Apache Server Errors
  • Apache HTTP Internal Server Error
  • Apache HTTP Forbidden
  • Apache HTTP Bad Request
  • Apache HTTP Unauthorized
  • Apache SQL Injection
  • Apache Cross Site Scripting
  • Apache Directory Traversal
  • Apache Malicious URL Request

and more

FERPA compliance management made easy
with EventLog Analyzer

To ensure that a student's confidential information is not leaked, it is important to monitor the data being transferred to and from an institution's network. EventLog Analyzer can help you monitor removable disk usage, database activities, web server activities, and more to detect any malicious activity.

Removable disk auditing

Removable disk auditing

One way through which sensitive data can be stolen is USB disks. With EventLog Analyzer, you can track the usage of removable devices by collecting, monitoring, and analyzing server and workstation logs from a single console.

Based on the collected logs, EventLog Analyzer generates graphical reports that give you detailed information regarding the instances when a USB device is used in the network along with the operations performed using the removable disk.

Apart from generating reports, EventLog Analyzer will also notify you in real time when a removable disk is being used to transfer data.

Monitoring database activities

Monitoring database activities

Monitor access to confidential student records stored in database servers using EventLog Analyzer. By collecting and analyzing database server logs, EventLog Analyzer generates reports that help you monitor database logons, queries executed on the database, changes made on the database, permission changes, SQL injection attacks, DOS attacks, and more. Get real-time alerts via email and SMS when any suspicious activity occurs in your database server.

Web server and FTP server auditing

Monitoring database activities

Detect web server attacks and get notified in real time by auditing Microsoft IIS web server logs, FTP server logs, and Apache web server logs using EventLog Analyzer. Get detailed reports on error events such as client and server errors, password changes, HTTP bad requests, and security attacks such as SQL injection attacks, cross-site scripting attacks, DOS attacks, and more. You can also monitor files uploaded, downloaded, and deleted in the IIS and Unix FTP servers using FTP server reports.

Other features offered by EventLog Analyzer

IT compliance management

Comply with various regulatory mandates such as HIPAA, PCI DSS, FISMA, GLBA, ISO 27001, and more with audit-ready compliance reports.

 

Real-time alerting

Configure alert profiles and get real-time notifications via email or SMS when a threat is detected in the network. Automate response actions by associating alert profiles with incident response workflows.

 

Log analysis

Collect, parse, analyze, and archive logs from any device on your network. Monitor network activities with built-in graphical reports and get real-time alerts when any security threat is detected.

 

File integrity monitoring

Monitor logs for unauthorized changes made to critical files and folders with real-time alerts and comprehensive reports that specify crucial details about the modified files.

 

5 reasons to choose EventLog Analyzer as your
FERPA compliance solution

1
Comprehensive log management

NERC emphasizes the importance of monitoring firewall and activities. EventLog Analyzer provides out- of- the- box support for prominent firewall vendors like Barracuda, Sonicwall, pfSense, Palo Alto Networks, and Fortinet. Additionally, the solution supports over 750 other log sources for complete network log management.

Learn more
 
2
In-depth auditing and reporting

Audit all the BES cyber assets in your network and obtain a detailed overview on what's happening in the network in the form of intuitive dashboards. The solution also comes with compliance-ready reports for prominent regulatory mandates, including NERC.

Learn more
 
3
A powerful correlation engine

NERC mandates that organizations detect network anomalies and trace security threats. EventLog Analyzer's powerful correlation engine holds over 30 predefined correlation rules, and detects known malicious patterns by analyzing activities across the network.

Learn more
 
4
Automated incident management

Implement a reliable system to detect and prevent malicious activity in your network. The solution has an integrated incident response and management console that assigns tickets when critical security events are detected to speed up incident resolution.

Learn more
 
5
Augmented threat intelligence

Ensure that no malicious source enters your network with the advanced threat intelligence feed. Detect malicious IP addresses, URLs, and domain interactions with the built-in global IP threat intelligence database and STIX/TAXII feed processor.

Learn more
 

Frequently asked questions

What is FERPA compliance?

The Family Educational Rights and Privacy Act (FERPA) of 1974 aims to protect the privacy of student education records. This federal law gives students' parents the right to access, inspect, and review their child's education records, the right to have them amended, and the right to have some control over their disclosure. These rights are transferred to the student when they reach 18 years of age or enter an institution beyond high school. Educational institutions store sensitive information belonging to a student such as their Social Security numbers, health records, bank details, and educational records. Failure to comply to FERPA can result in serious penalties.

Who is responsible for FERPA compliance?

This federal law applies to all educational institutions that store sensitive student information and are receiving funds for certain programs of the U.S. Department of Education.

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management