Support
 
Support Get Quote
 
 
 
 

Other Resources

    User Interface Tabs


    EventLog Analyzer user interface provides tabs for accessing the various sections of the product. The tabs provided are:

    Home tab

    The Home tab contains Dashboard, Hosts, Applications , and File Monitoring sub-tabs.

    Dashboard

    EventLog Analyzer dashboard consists of many useful graphical widgets (representing All Events, Alerts, Important Events, Event Category, Security Events, and Log Trend), which provides better visibility in various network events.  The dashboard can be customized (‘Customize’ link) by adding/removing widgets, by changing the position of the widgets using drag-and-drop . Host Group-specific dashboard ‘profiles’ can be created, where each dashboard profile displays only that information corresponding to the host group assigned to the profile. The default dashboard profile is ‘All Groups’ and this profile is not editable (add. modify, delete is not possible), unlike other dashboard profiles.

    Hosts   

    The Hosts (sub-tab) section displays the entire list of systems (Windows, Linux, IBM AS/400, HP-UX, etc…) and devices (routers, switches, tec.), from which EventLog Analyzer is collecting logs. The host list displayed is categorized based on Host-group selected from the drop-down list (default: All Groups). You can add new host (+ Host), add and schedule new reports (+ Schedule) from this section. You can search for a particular Host based on its IP Address or Host Name, delete a host or set of hosts, and disable/enable log collection from a particular host or set of hosts. The host list table displays details like host type, event summary (error, warning, failure, others), connection status of the host, time when the last log message was fetched, and host group to which the host belongs. Mouse-hover on any particular host and to view the last 10 events collected from a particular host click Last ten events icon, to edit the host details click Edit Host icon, to ping a particular host click Ping Host , to enable/disable log collection from a host click Disable Host/Enable Host . You can even customize the columns you would like to display in the host table by clicking the ‘column selector’ Table Column Selector and you can even increase the number of hosts that are displayed per page (from a minimum of 5 hosts per page it can go up to 200 hosts per page)

    Applications

    The Applications (sub-tab) section provides drill-down pie-chart and lists the host from which application logs for IIS W3C Web Server, IIS W3C FTP Server, MS SQL Server, Oracle Live Audit, DHCP Windows/Linux, Apache Web Server or Print Server have been received or imported into EventLog Analyzer. The host list displayed is categorized based on Application Type selected from the drop-down list (default: All Applications). Applications logs (other than Oracle & Print Server) can be imported into EventLog Analyzer by selecting + Import from the Actions drop-down list. For Oracle and Print Server logs, once you have added Oracle and Print Server to EventLog Analyzer, select + Oracle or + Print Server from the Actions drop-down list and provide the ‘host name’ where these applications are running.
    The application host list table displays details like host name, application type, total events, recent records, imported time, start time and end time. Click on the host name or the corresponding section in the pie chart to get the complete overview of the application event data, and generate corresponding reports. You can even customize the columns you would like to display in the application host table by clicking the ‘column selector’ Table Column Selector

    File Monitoring

    The FIle Monitoring (sub-tab) section provides the status of file monitoring and file activities in the selected hosts.
    The Monitoring List table displays details like host name/ IP, monitoring status, activities like created, modified, deleted, and renamed on the monitored files, total number of activities on the monitored files. The Templates list displays details like template name, location and files to be monitored, files excluded from monitoring, and hosts assigned to the template. You can add new host (Add) for file monitoring add and delete a host or set of hosts. Click on the host name to get the complete overview of the files/ folders getting monitored in the host and report on the changes. Mouse-hover on any particular host, to edit the host details click Edit Host icon. You can even customize the columns you would like to display in the Monitoring List table by clicking the ‘column selector’ Table Column Selector

    Reports tab

    The custom reports and canned (pre-built) reports are displayed in the Reports tab. Custom report can be created, modified, deleted, scheduled, rescheduled and the report profiles can be imported, exported in XML format.

    The canned reports available are top N reports, user activity reports, trend reports, detailed application reports, and detailed host reports. The top N reports lists in descending order, the hosts with most number of user accessed, users with most number of logins, users with most number of interactive logins, hosts based on event severity, and processes based on event severity.

    Compliance tab

    The Compliance tab displays canned compliance reports for various regulatory compliance acts like PCI-DSS, FISMA, HIPAA, SOX, and GLBA. The relevant IT audit sections of the acts are covered by each report in detail. You can modify the existing canned compliance reports to suit specific requirements or create (+ Add) a new compliance report, to meet other IT compliance mandates like ISO 27001/2, etc.  

    Search tab

    The Search tab provides two options to search the raw logs: Basic Search or Advanced Search. The search result is displayed in the lower half of the page and the final search result can be saved as a report (in PDF or CSV format) and can also be scheduled to generate at pre-defined intervals and automatically mailed to a set of configured users. Use ‘Basic’ search if you are interested in manually constructing the search query. Here you can use phrase search, Boolean search, grouped search, wild-card search, etc. to build your search query. Use ‘Advanced’ search to interactively build complex search queries easily with field value pairs and relational operators. The fields can be grouped with boolean operators.

    New fields can be extracted from the search result and regular expression (regex) patterns can be constructed to easily identify, parse and index these fields in new logs received by EventLog Analyzer.

    Alerts tab

    This section allows users to create alert profiles to notify you or your team about threshold violations or network anomalies or user activities or compliance violations. The Alerts tab displays all the alert profiles, alerts generated and provides options to disable, modify or delete any existing alert profile. The alert profiles can also be exported or imported in XML format.

    Settings tab

    This section allows you to configure EventLog Analyzer according to your IT infrastructure. It has three sub-sections, Configurations, Admin Settings, and System Settings.

    Configuration

    The various configurations you can carry out are: Manage Hosts, Manage Apps, Import, Archive, Report Profile, Alerts, Database Filters, Export/Import Profiles, Custom Pattern, Dashboard Profiles and Ask ME.

    Admin Settings

    This section allows various administrative activities like: Install Agent, Manage User, DB Storage Settings, and External Authentication.

    System Settings

    This section consists of various system configuration settings like: Working Hour Setting, Configure Email/ SMS, ELA Configuration, Manage Compliance, Log Collector Alert, Server Diagnostics, Access Database, and Rebranding.

    + Add tab

    From this tab,

    you can add a

    • Host

    • Alert

    • Report

    • Filter

    • AS/400 Alert

    • AS/400 Report

    • AS/400 Filter &

    • Import Logs

    Search Box

    Use the 'search box' for a quick log search. This will carryout basic search of raw logs available in EventLog Analyzer.

     

     

     

    EventLog Analyzer Trusted By

    Los Alamos National Bank Michigan State University
    Panasonic Comcast
    Oklahoma State University IBM
    Accenture Bank of America
    Infosys
    Ernst Young

    Customer Speaks

    • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
      Benjamin Shumaker
      Vice President of IT / ISO
      Credit Union of Denver
    • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
      Joseph Graziano, MCSE CCA VCP
      Senior Network Engineer
      Citadel
    • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
      Joseph E. Veretto
      Operations Review Specialist
      Office of Information System
      Florida Department of Transportation
    • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
      Jim Lloyd
      Information Systems Manager
      First Mountain Bank

    Awards and Recognitions

    •  
    •  
    •  
    •  
    •  
    •  
    •  
    •  
    •  
    A Single Pane of Glass for Comprehensive Log Management