- Free Edition
- What's New?
- Key Highlights
- Suggested Reading
- All Capabilities
-
Log Management
- Event Log Management
- Syslog Management
- Log Collection
- Agent-less Log Collection
- Agent Based Log collection
- Windows Log Analysis
- Event Log Auditing
- Remote Log Management
- Cloud Log Management
- Security Log Management
- Server Log Management
- Linux Auditing and Reporting
- Auditing Syslog Devices
- Windows Registry Auditing
- Privileged User Activity Auditing
-
Application Log Management
- Application Log Monitoring
- Web Server Auditing
- Database Activity Monitoring
- Database Auditing
- IIS Log Analyzer
- Apache Log Analyzer
- SQL Database Auditing
- VMware Log Analyzer
- Hyper V Event Log Auditing
- MySQL Log Analyzer
- DHCP Server Auditing
- Oracle Database Auditing
- SQL Database Auditing
- IIS FTP Log Analyzer
- IIS Web Log Analyzer
- IIS Viewer
- IIS Log Parser
- Apache Log Viewer
- Apache Log Parser
- Oracle Database Auditing
-
IT Compliance Auditing
- ISO 27001 Compliance
- HIPAA Compliance
- PCI DSS Compliance
- SOX Compliance
- GDPR Compliance
- FISMA Compliance Audit
- GLBA Compliance Audit
- CCPA Compliance Audit
- Cyber Essentials Compliance Audit
- GPG Compliance Audit
- ISLP Compliance Audit
- FERPA Compliance Audit
- NERC Compliance Audit Reports
- PDPA Compliance Audit reports
- CMMC Compliance Audit
- Reports for New Regulatory Compliance
- Customizing Compliance Reports
-
Security Monitoring
- Threat Intelligence
- STIX/TAXII Feed Processor
- Threat Whitelisting
- Real-Time Event Correlation
- Log Forensics
- Incident Management System
- Automated Incident Response
- Linux File Integrity Monitoring
- Detecting Threats in Windows
- External Threat Mitigation
- Malwarebytes Threat Reports
- FireEye Threat Intelligence
- Application Log Management
- Security Information and Event Management (SIEM)
- Real-Time Event Alerts
- Privileged User Activity Auditing
-
Network Device Monitoring
- Network Device Monitoring
- Router Log Auditing
- Switch Log Monitoring
- Firewall Log Analyzer
- Cisco Logs Analyzer
- VPN Log Analyzer
- IDS/IPS Log Monitoring
- Solaris Device Auditing
- Monitoring User Activity in Routers
- Monitoring Router Traffic
- Arista Switch Log Monitoring
- Firewall Traffic Monitoring
- Windows Firewall Auditing
- SonicWall Log Analyzer
- H3C Firewall Auditing
- Barracuda Device Auditing
- Palo Alto Networks Firewall Auditing
- Juniper Device Auditing
- Fortinet Device Auditing
- pfSense Firewall Log Analyzer
- NetScreen Log Analysis
- WatchGuard Traffic Monitoring
- Check Point Device Auditing
- Sophos Log Monitoring
- Huawei Device Monitoring
- HP Log Analysis
- F5 Logs Monitoring
- Fortinet Log Analyzer
- Endpoint Log Management
- System and User Monitoring Reports
-
Log Management
- Product Resources
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
Most SIEM solutions contain a great deal of sensitive information on events happening across a network, which means ensuring secure access to these solutions is crucial for network security.
This is why EventLog Analyzer utilizes two-factor authentication to ensure that only authorized users access the solution. With two-factor authentication enabled, users are verified twice during login—once with a password and again with a one-time password (OTP) sent to a registered mobile number or email address.
Two-factor authentication can secure your sensitive data even if your password is compromised. This double authentication method is essential, because cybercriminals are constantly looking to breach networks using stolen credentials.
Do you still need two-factor authentication if you have a strong password?
A strong password is an essential part of keeping your EventLog Analyzer account safe, since this will be your first line of defense against potential attacks. But using a password alone isn't always the most effective way to secure an account. Passwords are becoming less effective because of increasingly sophisticated password cracking attacks, such as brute force, dictionary, and keylogger attacks.
Two-factor authentication eliminates the risks of password cracking attacks, since the OTP is sent directly to the user and cannot be replicated. Having multiple factors in the authentication process greatly enhances the security of an account, keeping malicious users from accessing sensitive information.
Two-factor authentication methods in EventLog Analyzer
EventLog Analyzer has a list of options to choose from to set your preferred two-factor authentication method.
- Email verification
- SMS verification
- Google Authenticator
- RSA SecurID
- Duo Security
- Backup verification codes
Email verification
When email verification is enabled, a verification code will be sent to your registered email address. This code has to be entered in addition to the password before you can log into your account.
SMS verification
When this feature is enabled, an SMS with the verification code will be sent to the registered mobile number. The code needs to be entered before you can log in.
Google Authenticator
With this verification method, a six-digit verification code will be generated in the Google Authenticator app. This code has to be entered in the required field before you can log in.
RSA SecurID
When the RSA SecurID feature is enabled, the security code generated by the RSA SecurID mobile app or security token sent via SMS or email will have to be entered before you can log in.
Duo Security
If verification via Duo Security is enabled, you can log in by entering a six-digit security code sent via SMS, phone call, or push notification from the app.
Backup verification codes
If the registered device is not available or if you are unable to receive the one-time password (OTP), backup verification codes can be used to log in. These backup codes can be generated while logging into your account for which two-factor authentication has been configured. Keeping a copy of these codes handy is a fail-safe mechanism to ensure that you can log into your account even at the event of your device getting lost.
Configuring two-factor authentication for EventLog Analyzer.