- Free Edition
- What's New?
- Quick Links
- Log Management
- Application Log Management
- Application log monitoring
- IIS log analyzer
- IIS web log analyzer
- IIS FTP log analyzer
- IIS log parser
- VMware log analyzer
- Hyper V event log auditing
- SQL database auditing
- SQL server auditing
- MySQL log analyzer
- Apache log analyzer
- DHCP server auditing
- Database activity monitoring
- Database auditing
- Oracle database auditing
- IT Compliance Auditing
- IT Compliance Auditing
- SOX Compliance Audit
- GDPR Compliance Audit
- ISO 27001 Compliance Audit
- HIPAA Compliance Audit
- PCI Compliance Audit
- FISMA Compliance Audit
- GLBA Compliance Audit
- GPG Compliance Audit
- ISLP Compliance Audit
- FERPA Compliance Audit
- CCPA Compliance Reports
- CCPA Compliance Software
- NERC Compliance Audit Reports
- Cyber Essentials Compliance Reports
- Reports for New Regulatory Compliance
- Customizing Compliance Reports
- PDPA compliance audit reports
- CMMC Compliance Audit
- SIEM
- Security Information and Event Management (SIEM)
- Threat Intelligence
- STIX/TAXII feed processor
- Server Log Management
- Event Log Monitoring
- File Integrity Monitoring
- Linux File Integrity Monitoring
- Threat Whitelisting
- Advanced Threat Analytics
- Security Log Management
- Log Forensics
- Incident Management System
- Application log management
- Real-Time Event Correlation
- Detecting Threats in Windows
- External Threat Mitigation
- Malwarebytes Threat Reports
- FireEye Threat Intelligence
- Linux Log Analyzer
- Network Device Monitoring
- Network Device Monitoring
- Router Log Auditing
- Cisco Logs Analyzer
- VPN log analyzer
- IDS/IPS log monitoring
- Solaris Device Auditing
- Monitoring user activity in routers
- Monitoring Router Traffic
- Switch Log Monitoring
- Arista Switch Log Monitoring
- Firewall Log Analyzer
- Firewall Traffic Monitoring
- Windows Firewall Auditing
- SonicWall Log Analyzer
- H3C Firewall Auditing
- Barracuda Device Auditing
- Palo Alto Networks Firewall Auditing
- Juniper Device Auditing
- Fortinet Device Auditing
- pfSense Firewall Log Analyzer
- NetScreen Log Analysis
- WatchGuard Traffic Monitoring
- Check Point Device Auditing
- Sophos Log Monitoring
- Huawei Device Monitoring
- HP Log Analysis
- F5 Logs Monitoring
- Fortinet log analyzer
- Endpoint Log Management
- System and User Monitoring Reports
- More Features
- Resources
- Product Info
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
A single Unix system is capable of producing over a hundred thousand syslogs in a single day. An organization with a network of Unix systems generates millions of syslogs in less than a week. Auditing these logs is quite a daunting task. With millions of logs, what information should you look for?
One of the simplest, but most effective ways to obtain meaningful insights from your syslogs is to sort them based on their severity level. Another simple method is to look for error logs, a useful indicator of how well a device is performing. Using an automated tool like EventLog Analyzer is the best way to quickly sort and review these syslog messages.
Report features in EventLog Analyzer
EventLog Analyzer automatically collects syslogs from your Unix devices and generates predefined reports for varying levels of analysis. A few of EventLog Analyzer's key reporting features include:
- Automatic, real-time log collection; collected logs are sorted into individual reports for each severity level.
- Graph and table formats for each report.
- Report filters to sort information by device and user.
- Calendar widget to adjust the time range for reports.
- Built-in search feature within each report.
- Click-based drill down feature to view raw log information.
Unix severity reports
The severity reports are the most basic but useful set of reports provided. With neatly organized, easy to work with data, you can quickly interpret the severity data and gain insights into your Unix network. For instance, a device that had a spike in warning messages in the previous week may indicate an issue that arose within that same time frame.
Available Reports
Emergency Events | Alert Events | Critical Events | Error Events | Warning Events | Notice Events | Information Events | Debug Events
Unix error reports
EventLog Analyzer generates reports for several common error logs created by Unix devices. These reports are useful in identifying which devices are causing the most errors, and what kind of errors they're generating. Noteworthy error reports include:
- Unix mail server error reports: These reports highlight the errors raised by the Unix mail server application, such as mail rejections.
- Network-related error reports: These reports display errors that occur when connecting Unix devices over a network, such as a bad ISP error or a reverse lookup error.
Available Reports
Top Mail Errors | Top mail rejection errors | Top mail errors based on senders | Bad ISP Errors | Bad Device Config Errors | Reverse Lookup Errors | Device Name Mismatch Error | Device Address Mismatch Error