||How EventLog Analyzer helps with compliance
||EventLog Analyzer reports
Accurate time stamp
|Prevents anyone from tampering with log timestamps.
||ELA ensures secure log storage to prevent any tampering.
Recording of business traffic crossing a boundary
|Records traffic that passes through IIS and Apache web servers in the PMC 2 reports.
- Apache client errors
- Apache server errors
- Apache HTTP internal server error
- Apache HTTP forbidden
- Apache HTTP server not found
- IIS client errors
- IIS server errors
- IIS password change
- IIS failed user authentication
- IIS HTTP bad request
- IIS site access denied
Recording of suspicious activity at the boundary
|Displays all connections that have been denied and possible attacks on network perimeter devices in the PMC 3 reports.
- Website traffic
- Denied connections
- AWS failed access requests
- All AWS access requests
Recording of internal workstation, server, or device status
|Detects and records any suspicious activity, including configuration changes, privileged access, unexpected system and application restarts, software installation, removable media insertion and removal, and sensitive file access.
- AWS accessed files
- AWS deleted files
- AWS created or modified files
- Command executed
- Command failed
- Modified buckets
- Deleted buckets
- AWS failed events
Recording of suspicious internal network activity
|Records policy changes and helps identify if an inside user is carrying out malicious activity.
- Successful logons
- Failed logons
- Logoff events
- Successful VPN logons
- Failed VPN logons
- Audit policy changes
- User rights assigned
- User rights removed
- Trusted domain created
- Trusted domain modified
Recording of network connections
|Records all Windows, Unix, and network perimeter device logons.
- Windows successful user logons
- Network logon
- Windows successful user logoffs
- Network logoff
- Windows unsuccessful User logons
- User logons
- User logoffs
- Unix unsuccessful user logons
Recording of session activity of users and workstations
|Tracks entire user sessions from logon to logoff, including details of their activity during the session.
- Failed events by user
- Update events by user
- Delete events by user
- Create events by user
Recording of data backup status
|Records failed backups and restoration events.
- Successful Windows backup
- Failed Windows backup
- Successful Windows restore
- Failed Windows restores
Alerting when critical events occur
|Sends real-time alerts via email and SMS when any anomalous activity happens in the network. A program can be assigned to run when an alert is generated.
||ELA's incident response and management console alerts the users when critical events occur.
Reporting on the status of the audit system
|Tracks the clearing of all security logs and event logs.
- Event logs cleared
- Security logs cleared
Production of sanitized and statistical management reports
|Offers a highly customizable reporting function. Admins can configure existing reports to suit their specific requirements, or they can create new ones.
||ELA allows you to customize and schedule the existing predefined report in order to meet the unique security policy requirements that are concerned with your enterprise/industry.
Providing a legal framework for protective monitoring activities
|Ensures that all data is collected and analyzed for forensic validity.
||ELA allows you to centrally collect, archive, search, analyze and correlate machine generated logs obtained from heterogeneous systems, network devices and applications, and generates forensic reports.