Support
 
Support Get Quote
 
 
 
 

Syslog configuration guide for beginners

Last updated on:

Syslog configuration forms the fundamental groundwork of robust log management and network monitoring. By providing a standardized method to capture, store, and analyze critical system events, it serves as your infrastructure’s central nervous system revealing performance issues, security threats, and operational problems.

This comprehensive beginner's guide breaks syslog configuration into manageable steps with practical examples that work across operating systems and devices. Whether you're setting up local logging, configuring remote log forwarding, or securing syslog with TLS encryption, you'll find complete workflows here.

Understanding syslog configuration files

Syslog’s behavior is controlled entirely by its configuration files. These files act as the rulebook for your logging system, determining how messages are classified, processed, stored, and forwarded.

What configuration files control:

  • Accept and process incoming log messages
  • Categorize messages based on facility (source type) and severity (priority level)
  • Determine which messages to store locally, forward remotely, or discard
  • Format log entries using customizable templates
  • Enable communication protocols (UDP, TCP, or TLS for encryption)
  • Manage system performance through message queuing and buffering

While different implementations exist (rsyslog, syslog-ng, traditional syslogd), they all follow the same conceptual structure. Mastering configuration files lets you customize the entire logging workflow for centralized analysis.

Configuration file structure

A typical syslog configuration file contains these logical sections:

  • Global directives: System-wide settings like queue sizes, timeouts, and file permissions
  • Modules: Loadable components that extend functionality (encryption, database output, etc.)
  • Rules: Filtering and routing instructions (the most important section for beginners)
  • Templates: Format definitions that control how log messages appear

Locating syslog configuration files

Knowing where to find configuration files is crucial for modifying logging behavior, enabling remote forwarding, or troubleshooting issues.

Platform Implementation Configuration file location Log storage (default)
Linux/Unix Rsyslog (modern) /etc/rsyslog.conf, /etc/rsyslog.d/*.conf /var/log/syslog, /var/log/messages
Linux/Unix Syslog-ng /etc/syslog-ng/syslog-ng.conf /var/log/syslog-ng/
Linux/Unix Traditional syslogd /etc/syslog.conf /var/log/messages
Windows NXLog Agent C:\Program Files\NXLog\conf\nxlog.conf* Windows Event Log → Forwarded via agent
Network devices Vendor CLI/Web UI Command-line or web configuration interface Forwarded to syslog server
Note:

NXLog installation paths vary by version and architecture. Common paths include:

  • 64-bit Windows (Enterprise): C:\Program Files\nxlog\conf\nxlog.conf
  • 32-bit Windows: C:\Program Files (x86)\nxlog\conf\nxlog.conf Verify the actual path on your system before configuring.

Basic syslog configuration syntax

Understanding syslog syntax is essential for creating effective logging rules. While advanced features differ between implementations, the core syntax remains universal across systems.

All syslog rules follow this basic pattern:

facility.severity    destination

Facilities

Facilities categorize log messages by their source, helping administrators route specific types of system events to appropriate log files or actions.

Facility Description Syntax example Use case
auth/authpriv Security and authentication auth.* Login attempts, sudo usage
cron Scheduled tasks cron.* Cron job execution, failures
daemon System services and daemons daemon.* Apache/Nginx service starts/stops
kern Kernel-level messages kern.* Hardware errors, kernel panics
mail Email system messages mail.* Postfix/Sendmail delivery status
user User-level messages (default) user.* User application output
local0–local7 Custom application logs local0.* Custom app logging (firewall, VPN)

Explore syslog facilities

Dive deeper into facility types, including the local0–local7 custom facilities, and best practices for organizing your infrastructure's log sources. Learn how to route different facility types to separate log files for better organization and compliance.

Severity levels

Severity levels define the urgency of log messages numerically (0-7), enabling filtering for critical alerts versus routine information during troubleshooting.

Level Description Numeric code Use case
emerg System is unusable 0 Kernel panic, total system failure
alert Immediate action required 1 Disk full, critical service down
crit Critical conditions 2 Hardware failure detected
err Error conditions 3 Failed authentication attempts
warning Warning conditions 4 Resource usage approaching limits
notice Normal but significant 5 Service startup completed
info Informational messages 6 Routine operations, status updates
debug Debug-level messages 7 Application troubleshooting details

Deep dive into severity levels

Understand the complete severity scale, practical filtering strategies, and how to build alert rules based on urgency. Learn real-world examples of which events should trigger immediate alerts versus routine logging, and how severity thresholds impact your security posture.

Selectors

Selectors combine facilities and severity levels using operators to create precise filtering rules for targeted log collection, noise reduction, and advanced matching.

Selector Description Syntax example Use case
* Wildcard for all facilities/priorities *.* Capture everything for analysis
. Facility.priority separator auth.* Monitor all authentication events
= Exact priority match mail.=error Track specific mail delivery failures
! Exclude specific priority auth.!info Reduce noise, skip routine auth info
none No priority for facility mail.none Disable logging for mail facility
; Combine multiple selectors *.err;auth.none Errors only, exclude auth facility

Actions

Actions specify destinations for filtered log messages, supporting local storage, remote forwarding, user notifications, and program processing for comprehensive logging strategies.

Action Description Syntax example Use case
File paths Write to local log file /var/log/auth.log Centralized logging storage
Remote UDP Forward via UDP protocol @192.168.1.10:514 Central log server (SIEM integration)
Remote TCP Forward via TCP protocol @@192.168.1.10:514 Reliable remote logging
User lists Display to logged-in users root,admin Real-time alerts to operators
Program pipes Process through external program | /usr/bin/processor Custom log processing
Console Output to system console /dev/console Emergency messages to physical screen

Syntax examples

Command Description Syntax Output
Log all kernel messages Writes kernel logs to dedicated files kern.* /var/log/kern.log Kernel events stored in /var/log/kern.log
Remote mail warnings Forwards mail warnings via UDP mail.warn @192.168.1.100 Mail warnings sent to remote server
Dual logging for auth Logs auth messages locally and remotely via TCP auth.* /var/log/auth.logauth.* @@192.168.1.100:514 Auth logs stored locally and forwarded securely
Filtered logging Logs info and above, excludes mail/auth *.info;mail.none;auth.none /var/log/messages General messages stored without mail/auth noise
Emergency alerts Sends emergency messages to all logged-in users *.emerg :omusrmsg:* Emergency alerts displayed to users
Exact severity matching Logs only cron errors cron.=err /var/log/cron-errors.log Only error-level cron events captured
Custom app debugging Logs debug messages from custom app local7.debug /var/log/custom-app/debug.log Debug logs from app using local7 facility

Platform-specific syslog setup

Syslog behaves differently across Linux, Windows, and network devices. Understanding these platform-specific variations is essential for consistent log collection.

Linux (rsyslog): step-by-step configuration

Step 1: Open configuration

sudo nano /etc/rsyslog.conf

Step 2: Enable network modules

module(load="imudp")
input(type="imudp" port="514")
module(load="imtcp")
input(type="imtcp" port="514")

Step 3: Add rules, filters, or templates as needed

Example: Forward all logs to a remote syslog server

*.* @@192.168.1.100:514

Step 4: Validate configuration (before restart)

Check for configuration syntax errors

sudo rsyslogd -N1

If no errors appear, proceed to restart. If errors are found, fix them and revalidate.

Step 5: Restart service

sudo systemctl restart rsyslog

Step 6: Verify the service is running

sudo systemctl status rsyslog

Master Linux syslog configuration

Understand the complete syslog architecture, practical setup strategies, and how to configure centralized logging. Learn real-world examples of configuring rsyslog, syslog-ng, and systemd-journald for reliable log collection and forwarding.

Windows: agent setup

Windows lacks native syslog support, requiring third-party agents:

  • NXLog community/enterprise:
    Configure C:\Program Files\NXLog\conf\nxlog.conf
  • Snare agent:
    Edit C:\Program Files\Snare\snare.conf
  • Syslog-NG Agent: Configure via agent interface

Typical settings include syslog server IP, facility mapping, log format (RFC 3164/5424), and transport protocol (UDP/TCP/TLS).

Network devices: Vendor examples

Device Configuration commands
Cisco IOS logging host 192.168.1.100
logging trap informational
logging facility local7
Juniper Junos set system syslog host 192.168.1.100 any any
set system syslog host 192.168.1.100 port 514
Palo Alto PAN-OS Configure via GUI: Device → Server Profiles → Syslog, then create a syslog server profile and assign it to log settings.
Or use CLI (with example values):
set shared log-settings syslog central-syslog server logserver-1 server 192.168.1.100
set shared log-settings syslog central-syslog server logserver-1 facility LOCAL4
set shared log-settings syslog central-syslog server log
server-1 port 514
Note:

Replace central-syslog (profile name), logserver-1 (server name), and 192.168.1.100 with your actual environment values. For accurate syntax, consult your Palo Alto PAN-OS documentation.

Once syslog is configured on all platforms, your environment becomes ready for centralized logging and SIEM integration.

Remote logging setup

Remote logging is essential for centralized log management, compliance, auditing, and SIEM operations. This section covers the complete workflow: client configuration, server configuration, opening firewall ports, and TLS encryption.

Client-side example (rsyslog)

Send all logs to a central syslog server:

UDP (fast, no delivery guarantee):

*.* @192.168.1.10:514

TCP (reliable delivery):

*.* @@192.168.1.10:514

Server-side example (rsyslog)

Enable listening on the syslog server:

module(load="imudp")
input(type="imudp" port="514")

module(load="imtcp")
input(type="imtcp" port="514")

Best practices for remote logging

  • Use TCP for reliability
  • Use TLS (port 6514) for security
  • Segment traffic using facility codes
  • Enable queues to handle network interruptions

Opening firewall ports for syslog

Network traffic to your syslog server must be explicitly allowed by the firewall. Choose the appropriate method for your Linux distribution:

firewalld (RHEL/CentOS/Fedora)

Step 1: Allow standard syslog ports (UDP and TCP)

sudo firewall-cmd --permanent --add-port=514/udp
sudo firewall-cmd --permanent --add-port=514/tcp

Step 2: Allow TLS syslog port

sudo firewall-cmd --permanent --add-port=6514/tcp

Step 3: Reload firewall rules

sudo firewall-cmd --reload

Step 4: Verify ports are open

sudo firewall-cmd --list-ports

Expected output: 514/udp 514/tcp 6514/tcp

UFW (Ubuntu/Debian)

Step 1: Allow standard syslog ports (UDP and TCP)

sudo ufw allow 514/udp
sudo ufw allow 514/tcp

Step 2: Allow TLS syslog port

sudo ufw allow 6514/tcp

Step 3: Verify rules are active

sudo ufw status

iptables (legacy systems)

Step 1: Allow syslog UDP traffic

sudo iptables -A INPUT -p udp --dport 514 -j ACCEPT

Step 2: Allow syslog TCP traffic

sudo iptables -A INPUT -p tcp --dport 514 -j ACCEPT

Step 3: Allow TLS syslog traffic

sudo iptables -A INPUT -p tcp --dport 6514 -j ACCEPT

Step 4: Save rules (CentOS/RHEL)

sudo service iptables save

Step 5: Verify rules are active

sudo iptables -L -n | grep 514

Testing firewall access:

After opening the ports, verify syslog can reach your server:

# Test from client machine
nc -vzu <syslog-server-ip> 514     # UDP test
nc -vz <syslog-server-ip> 514      # TCP test
nc -vz <syslog-server-ip> 6514     # TLS test

Interpreting the results:

A successful test will return a connection message. The exact phrasing depends on your netcat version:

  • nmap-ncat or newer gnu-netcat: You will see Connection to <ip> port <514|6514> [tcp|udp/*] succeeded!
  • Older gnu-netcat (common on Linux): You will see Connection to <ip> <port> port [tcp|udp/*] succeeded!
  • BSD netcat (common on macOS): For TCP, the command will simply exit silently (with a 0 exit code). For UDP (-u), it may not provide clear feedback.

A failed test will typically return an error like Connection refused, No route to host, or Timed out, and the command will hang until you interrupt it (Ctrl+C).

Configuring TLS-encrypted syslog (rsyslog)

For production environments, TLS encryption protects sensitive log data in transit. Here's how to configure secure syslog on both server and client.

Server-side (receiving secure logs):

Step 1: Open configuration

sudo nano /etc/rsyslog.conf

Step 2: Load secure input module:

module(load="imtcp" StreamDriver.Name="gtls" 
       StreamDriver.Mode="1" 
       StreamDriver.AuthMode="anon")

Step 3: Listen on port 6514 (standard TLS syslog port)

input(type="imtcp" port="6514")

Step 4: Configure global TLS settings

global(
  DefaultNetstreamDriver="gtls"
  DefaultNetstreamDriverCAFile="/etc/ssl/certs/ca.pem"
  DefaultNetstreamDriverCertFile="/etc/ssl/certs/server-cert.pem"
  DefaultNetstreamDriverKeyFile="/etc/ssl/private/server-key.pem"
)

Replace the certificate file paths with your actual certificate locations.

Step 5: Validate configuration

sudo rsyslogd -N1

Step 6: Restart service

sudo systemctl restart rsyslog

Client-side (sending secure logs):

Step 1: Open configuration

sudo nano /etc/rsyslog.conf

Step 2: Forward all logs to syslog server via TLS

*.* @@(o)logserver.example.com:6514

Parameter explanation:

  • @@ - Forward via TCP (more reliable than UDP)
  • (o) - Enables OpenTLS mode for encryption
  • logserver.example.com - Replace with your syslog server hostname or IP
  • 6514 - TLS syslog port (standard)

Example with IP address:

*.* @@(o)192.168.1.100:6514

Step 3: Validate configuration

sudo rsyslogd -N1

Step 4: Restart service

sudo systemctl restart rsyslog

Step 5: Verify the service is running

sudo systemctl status rsyslog
Note:
  • Ensure SSL/TLS certificates are properly installed on both server and client
  • The server certificate path must match the client's trusted CA certificate
  • Test connectivity before deploying to production:
logger -n logserver.example.com -p user.info "TLS syslog test message"

systemd-journald forwarding (modern Linux systems)

On modern distributions (Ubuntu 16.04+, RHEL 7+, CentOS 7+), logs are captured by systemd- journald first before being forwarded to rsyslog. To ensure logs reach your syslog configuration, follow these steps:

Step 1: Open journald configuration

sudo nano /etc/systemd/journald.conf

Step 2: Locate and enable syslog forwarding

Find the line:

ForwardToSyslog=no

Change it to:

ForwardToSyslog=yes

Step 3: Save and exit the editor (Ctrl+O, Enter, Ctrl+X)

Step 4: Restart journald to apply changes

sudo systemctl restart systemd-journald

Step 5: Verify the setting is active

grep ForwardToSyslog /etc/systemd/journald.conf

You should see:

ForwardToSyslog=yes

If ForwardToSyslog is disabled, logs might not appear in traditional syslog files (/var/log/messages, /var/log/syslog). This is especially critical if you're configuring rsyslog rules that depend on these log files.

Setting up log rotation

Log rotation ensures that log files don’t grow indefinitely. Without proper rotation, systems risk disk exhaustion, performance degradation, and service interruptions. Log rotation also keeps logs organized, compressed, and manageable for long-term storage, audits, and compliance.

Linux log rotation (logrotate)

Command Description Syntax Output
weekly Rotate logs once per week weekly Logs rotated weekly
rotate 4 Keep four archived versions rotate 4 Four archived log files kept
compress Compress older logs with gzip compress Older logs compressed
delaycompress Start compression after second rotation delaycompress Compression delayed to avoid issues
missingok Ignore missing log files without error missingok No error if log file is missing
notifempty Skip rotation if log files are empty notifempty No rotation of empty logs
include Load additional config files include /etc/logrotate.d Application-specific configs loaded

Sample logrotate configuration

/var/log/syslog {
    daily
    rotate 14
    compress
    missingok
    notifempty
}

What it does: Rotates syslog daily, keeps 14 days of compressed archives, ignores missing files, and skips empty logs, which is common in Ubuntu/Debian for system event management.

Best practices for log rotation

  • Keep 7–30 days of history for audits
  • Compress old logs to save space
  • Use separate directories for high-volume logs
  • Monitor disk usage regularly

Advanced filtering, routing and templates

Advanced controls enable you to process specific log types, reduce noise, and route important events to appropriate locations.

Filtering examples:

Command Description Syntax
Route kernel logs Directs kernel messages to dedicated file kern.* /var/log/kernel.log
Drop noisy messages Stops processing of messages containing "error ignored" :msg, contains, "error ignored" stop
Forward critical messages Sends only critical events to remote server *.crit @192.168.1.10

Custom templates

Templates give you fine-grained control over log formatting for consistency and easier parsing.

For example:

$template Detailed,"%timestamp:::date-rfc3339% %hostname% %syslogtag% %msg%\n"*.*
                        /var/log/custom.log; Detailed

Configuration examples and templates

Configurations vary across environments. These examples help beginners create consistent and functional syslog setups. Some of the common templates include:

Template type Syntax Use case
Basic logging to a file *.* /var/log/all_messages.log Captures all messages in one file
Logging by severity authpriv.* /var/log/secure.log*.warning /var/log/warnings.log Separates secure logs from warnings
Network device forwarding *.* @10.10.10.20 Centralizes logs from network devices
Custom formatting $template Short,"%HOSTNAME% %syslogtag% %msg%\n"*.* /var/log/short_format.log;Short Applies consistent, simplified format
Network device template logging host 10.10.10.20
logging facility local6
logging trap notifications
Cisco device configuration

These templates reduce setup time and ensure predictable behavior across devices.

Testing your syslog configuration

Testing validates whether logs are being generated, routed, and received correctly.

Test type Command/Method Description Use case/effect
Local testing logger -p local0.warning "Syslog test message" Sends a test log message locally Validate local syslog generation
Remote testing nc -vzu 192.168.1.10 514 Checks UDP connectivity to syslog server Verify remote syslog port reachability
Remote testing logger -n 192.168.1.10 -p user.info "Remote test message" Sends a test message to remote syslog Test remote syslog reception
Packet capture sudo tcpdump -i any port 514 Captures syslog packets on network Monitor actual syslog traffic flow

Regular testing using these commands helps ensure syslog is configured properly and operational across local and remote setups.

Troubleshooting common syslog configuration errors

Syslog issues typically stem from configuration errors, permission problems, or network blocks. Here's a diagnostic checklist to help through your troubleshooting process.

Symptom Possible cause Solution
No logs appearing Service not running sudo systemctl restart rsyslog
Permission denied Incorrect file permissions sudo chmod 640 /var/log/*.log
Remote logs missing Firewall blocking port sudo ufw allow 514/udp (or use firewalld/iptables)
High CPU usage Too many rules Simplify filters, increase queue size
Duplicate messages Multiple rules matching Review overlapping rules

Troubleshooting flow

  1. Check service status: sudo systemctl status rsyslog
  2. Validate configuration: sudo rsyslogd -N1
  3. Test network connectivity: logger -n <server-ip> "test"
  4. Check permissions and disk space: Verify /var/log/ ownership and free space
  5. Enable debug logging: Add $DebugLevel 2 to rsyslog.conf

SELinux considerations (RHEL/CentOS systems)

On RHEL, CentOS, and Fedora systems, SELinux can block legitimate syslog network operations even when configuration and firewall are correct. If remote logging fails despite correct configuration, follow these troubleshooting steps.

Diagnosing SELinux blocks

Step 1: Check if syslog is blocked by SELinux

sudo tail -f /var/log/audit/audit.log | grep syslog

Look for entries with denied status. If you see denial messages, SELinux is blocking syslog traffic. Press Ctrl+C to exit the tail command.

Step 2: Identify the specific port or operation being blocked

Review the audit log output. Common blocks include:

  • Connections to port 514 (standard syslog)
  • Connections to port 6514 (TLS syslog)
  • Network operations for remote logging

Applying SELinux policies for syslog

Step 1: Disable SELinux transition restrictions (if needed)

sudo setsebool -P syslogd_disable_trans 0

The -P flag makes the change persistent across reboots.

Step 2: Allow syslog on standard port (TCP)

sudo semanage port -a -t syslogd_port_t -p tcp 514

Step 3: Allow syslog on standard port (UDP)

sudo semanage port -a -t syslogd_port_t -p udp 514

Step 4: Allow syslog on TLS port

sudo semanage port -a -t syslogd_port_t -p tcp 6514

Step 5: Restart syslog service

sudo systemctl restart rsyslog

Verifying SELinux changes

Step 1: Verify the port policies were applied

sudo semanage port -l | grep syslogd

Expected output:

syslogd_port_t                 tcp      514, 6514
syslogd_port_t                 udp      514

Step 2: Check SELinux boolean status

sudo getsebool syslogd_disable_trans

Should return: syslogd_disable_trans --> on

Step 3: Test remote logging

logger -n <syslog-server-ip> -p user.info "SELinux test message"

Replace <syslog-server-ip> with your actual syslog server IP address.

If SELinux denials persist:

Option 1: Generate a policy module from denials

sudo audit2allow -a -M syslog_custom
    sudo semodule -i syslog_custom.pp

Option 2: Temporarily disable SELinux (not recommended for production)

sudo setenforce 0

To re-enable: sudo setenforce 1

Option 3: Set SELinux to permissive mode for syslog domain

sudo semanage permissive -a syslogd_t

SELinux best practices

  • Always use sudo semanage port -a to add ports, not modify existing SELinux policy modules
  • Keep SELinux enforcing mode enabled for security
  • Test policies thoroughly before deploying to production
  • Document any custom SELinux policies applied to your systems
  • Regularly review /var/log/audit/audit.log for new denial patterns

How EventLog Analyzer simplifies syslog configuration

Managing syslog configurations across Linux servers, Windows systems, firewalls, routers, and applications can quickly become complex and inconsistent. Manual configuration file edits, regex creation for custom formats, certificate management for TLS, and firewall rule coordination across multiple devices introduce opportunities for error and inconsistency. ManageEngine EventLog Analyzer removes this complexity by centralizing, automating, and securing the entire syslog setup process.

Manual configuration vs. EventLog Analyzer

Task Manual approach With EventLog Analyzer
Multi-platform setup Edit rsyslog.conf, syslog-ng.conf, NXLog XML separately Single dashboard for all platforms
Log parsing Write custom regex for each format More than 1,000 prebuilt parsers, automatic format detection
Filtering rules Manually define selectors in rsyslog.conf or syslog-ng.conf Visual rule builder, no configuration files needed
TLS encryption Generate, distribute, and rotate certificates manually Automatic TLS configuration and certificate management
Log rotation Configure logrotate per system Intelligent rotation and compression policies
Firewall setup Manually open ports on each firewall/system Automatically manages port requirements
Compliance alignment Manual policy mapping and verification One-click compliance templates (PCI DSS, HIPAA, SOX, GDPR)

With EventLog Analyzer delivers

  • Unified management console: Configure syslog collection for Windows, Linux, network devices, and applications from one dashboard.
  • Zero regex required: Automatically detects and parses common syslog formats, eliminating the need for regex creation or custom parsing rules.
  • Security hardening: TLS-based log transport (port 6514) is automatically configured, removing the complexity of certificate generation, distribution, and rotation.
  • Compliance-ready: Prebuilt templates for the PCI DSS, HIPAA, SOX, the GDPR, and other regulatory frameworks without manual tuning.

Pre-deployment checklist:

Before going live, verify:

  1. All critical systems are forwarding logs.
  2. Facility and severity codes are properly categorized.
  3. TLS is enabled for sensitive log streams.
  4. Disk usage controlled via rotation policies.
  5. Log collection failures trigger alerts.
  6. End-to-end pipeline tested and verified.

EventLog Analyzer transforms syslog into a complete security and analytics ecosystem, simplifying configuration while enhancing threat detection, compliance, and operational visibility.

Ready to simplify your syslog management?

EventLog Analyzer provides a comprehensive, enterprise-grade log management without the complexity.

Frequently asked questions

syslog.conf is the configuration file for the traditional syslog daemon, while rsyslog.conf is used by rsyslog (rocket-fast system for log processing), which is more feature-rich and commonly used in modern Linux distributions.

Use a syslog agent or forwarder. For Windows, tools like NXLog or Snare can convert Windows Event Logs to syslog format. For applications, most programming languages have syslog libraries available.

Retention depends on compliance requirements and available storage. A common approach is: seven days online for troubleshooting, 30 days for analysis, and more than one year archived for compliance. Always encrypt archived logs containing sensitive data.

Yes, and this is recommended for redundancy. Configure your devices to log locally (for quick access and backup) and forward to a central server (for correlation and long-term storage).

  • Increase severity thresholds (for example, from info to notice)
  • Filter out noisy but unimportant messages
  • Aggregate similar messages
  • Use sampling for high-volume, low-value logs
  • Implement smart filtering that adapts to patterns

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management