FireEye log correlation analysis
EventLog Analyzer does an effective job of collecting logs from every nook and cranny of your network, including FireEye endpoint security solutions. But its job doesn't end there. You can get the most out of your FireEye logs by consolidating them in one central place and comparing them against the logs collected from various other devices. The information from FireEye endpoint security software is vital, as a majority of threats originate from endpoint devices. With log correlation, it's much easier to see patterns, thereby helping you trace the route of perpetrators.
This is where EventLog Analyzer's correlation engine steps in, correlating your FireEye logs with all other logs that have been collected. This log management tool has over thirty predefined correlation rules for detecting the most common attacks. You can also build rules of your own using the correlation rule builder, which is so user-friendly that it only takes a few seconds to build a rule and set it in motion. The alerting module ensures that no time is wasted by notifying administrators via email and SMS the moment abnormal activity is detected.