Support
 
Support Get Quote
 
 
 
 

Other Resources

    Top and Trend Reports


     

    To view the Top 'N' hosts reports use the following menu option:

    • Reports tab > Top and Trend Reports

     

    The Top and Trend Reports section in the Reports tab, lists the top hosts, users, and processes generating important events. You can click the View All link to view all the reports in this section in a single page.

     

    Top N Reports
     
    Trend Reports

    Trend reports let you analyze the performance of hosts based on specific metrics, over a period of time. Trend monitoring helps in historical analysis of the performance of the Windows and UNIX hosts on your network. 

    You can monitor trends of events generated across hosts, based on event severity, event type or alerts triggered. All the trend reports in EventLog Analyzer show the current trend, and compare this with the historical trend. The trend reports available are, hourly (with the time period split into one hour) and weekly (with the time period split into one day) . The trend reports are available for working hours, non-working hours, and complete time period.

     

    Note: Look up 'Configure Working Hours' to know more about configuring working hours

     

    Beneath each graph, click the Show Details link to display the tabular data corresponding to the graph.

     

    Top N Reports

     

    Top Hosts by User Access

    This report shows the top 'N' number of hosts with maximum number of successful logins and the top 'N' number of hosts with maximum number of failed login attempts.

     

    While the former is useful in tracking usage trends of hosts, the latter is important in analyzing which hosts are subject to the most number of security breaches. 

    You can use this report to decide if security policies need to be changed with respect to certain hosts, or tighten security measures across the network.

     

    Top Users by Login

    This report shows the top 'N' number of users with maximum number of successful logins, and the top 'N' number of users with maximum number of failed login attempts.

     

    This report tells you which user logged into which host, using the password, and whether the user was successful or not. If a user has been accessing several hosts with the user name and password, this report will show you which hosts were used, and when. If the user has tried to log on, but was unsuccessful, this report will show you how many times the user was unsuccessful, on which hosts did the user try, and when.

    You can use this report to identify errant users on the network, and set up security policies to track such users.

     

    Top Interactive Login

     

    In this report, only the logins done interactively through the UI. This report shows the users with maximum number of successful logins, and the users with maximum number of failed login attempts. This report tells you which user logged into which host, using the password, and whether the user was successful or not.

     

    If a user has been accessing several hosts with the user name and password, this report will show you which hosts were used, and when. If the user has tried to log in, but was unsuccessful, this report will show you how many times the user was unsuccessful, on which hosts did the user try, and when.

    You can use this report to identify errant users on the network, and set up security policies to track such users.

     

    Top Hosts by Event Severity

     

    This report sorts event logs received from all hosts by severity, and shows the top values for each event severity. At one glance, you can see which hosts have been generating more number of critical events, warning events, and so on. By default, the overall top hosts generating events of any severity, is shown, with the View Severity value set to All. You can view top 'N' number of hosts severity wise more number of events generated.

     

    You can use this report to quickly identify the hosts that may be experiencing problems, thereby accelerating the troubleshooting process.

     

    Note: Some event severity are applicable only to Unix hosts


    Top Processes by Event Severity

     

    This report sorts event logs generated by processes running across all hosts, and shows the top values for each event severity. At one glance, you can see which processes have been generating more number of critical events, warning events, and so on. By default, the overall top processes generating events of any severity, is shown, with the View Severity value set to All. You can view top 'N' number of hosts severity wise more number of events generated.

     

    You can use this report to identify the processes with problems, investigate suspicious behavior of critical hosts, determine if there has been a worm or virus attack in the network, and also see which hosts have been affected, thereby reducing network downtime.

     

    Trend Reports

     

    Event Severity Trend Reports

    This trend report lets you see how events of all severity have been generated across host groups. Current and Historical Trends are shown on an hourly and daily basis. You can choose from the ten severity levels in the View Severity box, or see trends of all severities.

     

    Event Type/Category Trend Reports

    This trend report lets you see trends of events generated, based on event type - Application, System, or Security. You can choose this from the View Typebox, or see trends of all event types. Current and Historical Trends are shown on an hourly and daily basis.

     

    Alerts Trend Reports

     

    This type of trend report shows you current and historical trends of alerts triggered on an hourly, as well as daily basis.

    EventLog Analyzer Trusted By

    Los Alamos National Bank Michigan State University
    Panasonic Comcast
    Oklahoma State University IBM
    Accenture Bank of America
    Infosys
    Ernst Young

    Customer Speaks

    • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
      Benjamin Shumaker
      Vice President of IT / ISO
      Credit Union of Denver
    • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
      Joseph Graziano, MCSE CCA VCP
      Senior Network Engineer
      Citadel
    • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
      Joseph E. Veretto
      Operations Review Specialist
      Office of Information System
      Florida Department of Transportation
    • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
      Jim Lloyd
      Information Systems Manager
      First Mountain Bank

    Awards and Recognitions

    •  
    •  
    •  
    •  
    •  
    •  
    •  
    •  
    •  
    A Single Pane of Glass for Comprehensive Log Management