Support
 
Support Get Quote
 
 
 
 

Removable device auditing

Removable Device Auditing

Organizations usually devote most of their resources to preventing external security threats. However, insider threats are equally dangerous and must be kept at bay. Sensitive data theft can severely damage organizations. USB drives are often used for this purpose because they are small and can contain large amounts of data. It is therefore essential to audit their use to:

  • Prevent sensitive data from leaving your organization.
  • Prevent the introduction of malicious content, such as viruses or spyware, to your organization's network.

Auditing removable devices with EventLog Analyzer

  • EventLog Analyzer audits USB device usage through Windows event logs.
  • Predefined reports display USB port activity.
  • The reports are available in table, list, and graphical formats, with support for several graph types.
  • Real-time alerts can be set up to instantly notify the administrator when a removable drive enters the network.
  • Correlation rules help identify any suspicious activity.
  • Plain text log information can be viewed by clicking on the respective points of the report.

Removable device reports

  • Reports are provided to show all instances of a USB device being plugged into or taken out of the network.
  • Identify who is making use of these devices, as well as when and where they are used.
  • Keep track of all actions taken with removable devices, such as successful and failed creations, reads, modifications, and deletions.
  • View trend and top N reports to understand overall usage patterns for removable devices.

Available Reports

USB Plugged In | USB Plugged Out | Removable Disk Reads | Removable Disk Failed Reads | Removable Disk Creates | Removable Disk Failed Creates | Removable Disk Modifications | Removable Disk Failed Modifications | Removable Disk Deletes | Removable Disk Failed Deletes | Host Based Removable Disk Changes | Top Successful Users on Removable Disk Auditing | Top Failed Users on Removable Disk Auditing | Removable Disk Changes Trend

Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
     
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
     
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
     
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
     
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
     
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Threat Management