Support
 
Support Get Quote
 
 
 
 

Other Resources

    Reports for Networking Devices


    EventLog Analyzer offers the following canned reports under various categories for Network Device events:

     

    Router Logon Report

    • Logons
    • Failed logons
    • Bad authentication
    • SSH logons
    • Failed SSH Logons
    • Closed SSH sessions
    • Failed VPN Logons
    • VPN Authorization errors
    • Top Logons based on hosts
    • Top logons based on users
    • Top logons based on remote hosts
    • Top Failed logons based on hosts
    • Top Failed logons based on users
    • Top Failed logons based on remote hosts
    • Top VPN Authentication errors based on remote hosts
    • Top VPN Authentication errors based on users
    • Top Failed VPN Authentication errors based on remote hosts
    • Top Failed VPN Authentication errors based on users
    • Top SSH logons based on remote hosts
    • Top SSH logons based on users
    • Top Failed SSH Logons based on remote hosts
    • Top Failed SSH Logons based on users
    • Logons Trend
    • Failed logons Trend

    Router Configuration Report

    • Reports on up links
    • Reports on down links
    • Reports on up links and down links
    • Link State Changes
    • Configuration Changes
    • System Restarts
    • Link Errors
    • Top State Changes
    • Top configuration changes
    • Top configuration changes based on users
    • Top configuration changes based on remote hosts
    • Top Link Errors

    Router Accepted Connections

    • Successful connection authorizations
    • Top Connections based on Source
    • Top Connections based on Destination
    • Top Connections based on Protocol
    • Successful connection authorizationss Trend

    Router Denied Connections

    • Denied Connections
    • Top Denied Connections based on Source
    • Top Denied Connections based on Destination
    • Top Denied Connections based on Protocol
    • Denied Connection Trend

    Router Traffic Report by Protocol

    • TCP Traffic Audit
    • UDP Traffic Audit
    • ICMP Traffic Audit
    • Traffic Audit Overview
    • Top TCP Traffic Audit based on Source
    • Top UDP Traffic Audit based on Source
    • Top ICMP Traffic Audit based on Source
    • Top Traffic Audit based on Source

    Router/Switch System Events

    • Commands executed
    • Interface Up
    • Interface down due to link failure
    • Individual port down
    • Fan Failed
    • Fan Status Ok
    • Report on power supply
    • Memory Allocation Failure
    • System clock updates
    • Report on power supply Scheduled
    • System Temperature Exceeded
    • System Shutdown due to Temperature
    • Interface Down Suspended by Speed

    Router Traffic Errors

    • Too Many Fragments
    • Invalid Fragment Length
    • Overlap Fragments
    • Dhcp Snooping Denied
    • Permitted ARP
    • Denied ARPs

    IDS/IPS Activity

    • Attack Reports
    • Top Attacks
    • Top Attacker Host
    • Top Attacked Host
    • Top Signature
    • TrendBased Attacks

    Firewall Threats

    • Syn Flood Attack
    • Routing Table Attack
    • Attack Reports
    • Top Attacks
    • Top Attackers
    • Top Attacked Host
    • Top Interface
    • Attacks Trend

    Firewall Traffic Reports

    • Allowed Firewall Traffic
    • Top Firewall Traffic based on Source
    • Top Firewall Traffic based on Destination
    • Top Firewall Traffic based on Protocol
    • Top Firewall Traffic based on Port

    Firewall Denied Connections

    • Denied Connections
    • Top Firewall Denied Connections based on Source
    • Top Firewall Denied Connections on Host
    • Top Firewall Denied Connections based on Protocol
    • Top Firewall Denied Connections based on Port
    • Denied Connections Trend

    Firewall Logon Reports

    • Logons
    • Failed Logons
    • Top Successful logons based on user
    • Top logons based on remote hosts
    • Top logons based on ports
    • Top failed logons based on users
    • Top failed logons based on remote hosts
    • Top failed logons based on ports
    • Logon Trend
    • Failed logon trend

    Firewall Account Management

    • Added users
    • Deleted users
    • Added Group policies
    • Deleted group policies
    • Changed user privilege levels
    • Executed commands

    Firewall VPN Logon Reports

    • VPN Logons
    • Failed VPN Logons
    • VPN Lockouts
    • VPN Unlocks
    • Top Logon based on users
    • Top logons based on remote hosts
    • Top Failed VPN Logonss based on User
    • Top Failed VPN Logons based on RemoteHost
    • Top VPN Lockouts based on User
    • VPN logon trend reports
    • Failed VPN Logons Trend

    Network Device Severity Reports

    • Emergency Events
    • Alert Events
    • Critical Events
    • Error Events
    • Warning Events
    • Notice Events
    • Information Events
    • Debug Events

    Network Device Critical Reports

    • Criticality level of events
    • Critical events report
    • Critical events based on hosts
    • Critical events based on remote host
    • Critical events Trend
    • Critical events Overview
    Customer Speaks
    • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
       
      Benjamin Shumaker
      Vice President of IT / ISO
      Credit Union of Denver
    • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
       
      Joseph Graziano, MCSE CCA VCP
      Senior Network Engineer
      Citadel
    • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
       
      Joseph E. Veretto
      Operations Review Specialist
      Office of Information System
      Florida Department of Transportation
    • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
       
      Jim Earnshaw
      Senior Computer Specialist
      Department of Chemistry
      University of Washington
    • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
       
      Jim Lloyd
      Information Systems Manager
      First Mountain Bank

    EventLog Analyzer Trusted By

    A Single Pane of Glass for Comprehensive Log Management