| Features | Free Edition * | Premium | Distributed |
|---|---|---|---|
| Multiple OS Support | ![]() |
![]() |
![]() |
| Monitored Device Support (Windows, Linux, Unix, AIX, Routers, Switches, VMWare, Any Syslog device) |
![]() |
![]() |
![]() |
| Customizable dashboard widgets | ![]() |
![]() |
![]() |
| Log search using boolean operator, phrase, value ranges, wildcards & grouped search | ![]() |
![]() |
![]() |
| FTP Active Mode support for log file import | ![]() |
![]() |
![]() |
| Import and Analyze Event files | ![]() |
![]() |
![]() |
| Auto Discovery of Hosts | ![]() |
![]() |
![]() |
| Filter Events before Storing in Database | ![]() |
![]() |
![]() |
| Compressed Archives | ![]() |
![]() |
![]() |
| Archive log files encryption | ![]() |
![]() |
![]() |
| Hashing and Time stamping of Archive log files | ![]() |
![]() |
![]() |
| Real-time Display of Events | ![]() |
![]() |
![]() |
| Automated Alerts | ![]() |
![]() |
![]() |
| Authorized Access | ![]() |
![]() |
![]() |
| Host Grouping for Policy Implementation | ![]() |
![]() |
![]() |
| Schedule Data Collection | ![]() |
![]() |
![]() |
| Custom Reports | ![]() |
![]() |
![]() |
| Scheduling Reports | ![]() |
![]() |
![]() |
| PUMA Reports | ![]() |
![]() |
![]() |
| Multiple Report Formats | ![]() |
![]() |
![]() |
| Multi-level Drilldown | ![]() |
![]() |
![]() |
| Trend Analysis | ![]() |
![]() |
![]() |
| Security Analysis | ![]() |
![]() |
![]() |
| Compliance Reports (EventLog & Syslog) (Predefined and Customization) | ![]() |
![]() |
![]() |
| Command Execution on Alerts | ![]() |
![]() |
![]() |
| SMS and SNMP Trap Notification for Alerts | ![]() |
![]() |
![]() |
| Internationalization Support to handle Native Logs | ![]() |
![]() |
![]() |
| Export/Import of Alert, Report, and Filter Profiles | ![]() |
![]() |
![]() |
| Advanced Search in Raw Logs, Save Result as Report Profile | ![]() |
![]() |
![]() |
| Scheduled import from local and remote (FTP/SFTP) machines | ![]() |
![]() |
![]() |
| Log collection during log collector down time | ![]() |
![]() |
![]() |
| Monitoring Users Accessing EventLog Analyzer Application | ![]() |
![]() |
![]() |
| File Integrity Monitoring | ![]() |
![]() |
|
| Server specific reports | ![]() |
||
| Multi-geographical location monitoring | ![]() |
||
| Scalable architecture | ![]() |
||
| Log field extraction using an interactive regular expression (regex) syntax builder | ![]() |
![]() |
|
| Universal log parsing and indexing (ULPI) to support any log format (Human Readable & non-encrypted log formats) | ![]() |
![]() |
|
| Import users from Active Directory groups | ![]() |
![]() |
|
| Agent for log collection across WAN/Firewalls | ![]() |
![]() |
|
| Import of saved Syslog Files | ![]() |
![]() |
|
| Re-branding Web Client | ![]() |
![]() |
|
| Instant Reports | ![]() |
![]() |
|
|
Analyze Application specific Logs
|
![]() |
![]() |
|
| Support for MS SQL Server and MS SQL Cluster as Backend Database | ![]() |
![]() |
|
| Custom View & User based Views | ![]() |
![]() |
|
| Active Directory & RADIUS Server based Third Party User Authentication | ![]() |
![]() |
|
| IBM AS/400 Logs Analysis (V5R series) Filter, Report, Alert, Archive & Import | ![]() |
![]() |
|
| Real-Time Event Correlation | ![]() |
![]() |
|
| Windows Terminal Server Log Monitoring | ![]() |
![]() |
|
| User Session Monitoring | ![]() |
![]() |
|
|
Cloud Source Auditing
|
![]() |
![]() |
| Implementation Activity | Description | SPECIFICATION |
|---|---|---|
| Installation | Installation of EventLog Analyzer. | - |
| Domain Controllers | Configuration of log collection from all Domain Controllers. | Up to 10 Domain controllers |
| Log Sources | Configuration of all specified log sources. | i. 50 Windows Servers ii. 10 supported syslog devices iii. A maximum of two applications |
| File Integrity Monitoring | Configuration of file integrity monitoring for folders on Windows and Linux devices. | Up to 5 Windows Devices Up to 2 Linux devices |
| Endpoints (Windows workstations) | Configuration of log collection from endpoints. | Up to 200 endpoints. |
| Agents and NAT configuration | Configuration of agent-based log collection and NAT or Proxy server (if needed in your environment). | If requested. |
| Cloud Accounts (AWS Accounts, Microsoft 365 Tenants) | Configuration of log collection from cloud log sources such as AWS, M365 and Salesforce. | Up to 3 cloud accounts. |
| Advanced Threat Analytics | Configuration of Advanced Threat Analytics for added threat intelligence from reputed sources. | If requested. |
| Report Schedules | Scheduling select audit report to the customer's inbox. | Configuration of up to 4 reports schedules. |
| Custom Reports | Creating custom reporting template as per customer's requirements. | Configuration of up to 4 custom reports. |
| Custom Alert Profiles | Creation of custom alert profiles to notify the concerned teams as per customer's requirements. | Configuration of up to 5 custom alert profiles. |
| Custom Security Rules | Creation of custom security rules for threat/security detection as per customer's requirements. | Configuring a maximum of Standard rules - 2 Anomaly rules - 2 Advanced rules - 2 |
| Custom Playbook and Incident Rules | Creation of custom playbooks for remediation and incident rules as per customer's requirement. | Configuring a maximum of 2 playbook and 2 incident rules. |
| Custom Compliance Reports | Creation of reporting template for custom compliance requirements from the customer. | Configuring 1 custom compliance report. |
| Risk Posture Analysis | Configuration of all required log sources for risk posture analysis and scheduling risk analysis reports. | If requested. |
| Dashboard customization | Customizing the dashboard to suit the customer's preferences. | If requested. |
| Technicians & Roles | Creation and assignment of technicians and technician roles within EventLog Analyzer. | Configuring technician and roles for: i. 5 technicians Ii. 4 custom roles |
| Ticketing Tool integration | Configuration of supported ticketing tools in EventLog Analyzer for incident management. | If requested. |
| Automatic Device Configuration | Configuration of automatic addition and/or removal of Windows devices. | If requested. |
| Custom Device Groups | Customized device grouping for reporting and other purposes based on customer's preference. | Creation of up to 2 custom device groups. |
| Product Settings | Configuration of all Mandatory product settings. | Configuration of Admin configurations, Mail Settings, and Security Hardening. |
| Logon Settings | Configuration of Logon settings as per customer's preferences. | As requested. |
| Work Hour Settings | Configuration of Business hours for report views and alerts. | If requested. |
| Privacy Settings | Configuration of data security for GDPR compliance and product usage statistics. | If requested. |
| Archives and Retention Settings | Configuring log archival settings according to organization policy. | As requested. |
| Log Collection Filters | Setting up log filters to support user-specific and event-specific audit exclusions. | As requested. |
| Log Collection Failure Alerts | Configuring alerts to notify failure of log collection in the customer's instance. | As requested. |
| Log Forwarding | Configuring log forwarding. | As requested. |
| Zia insights | Configuration of Zia Insights integration, provided the customer has subscription to the Azure OpenAI service. | If requested, provided the customer has subscription to the Azure OpenAI service. |
| System Settings - General Settings | Configuration of the following settings: Connection Settings Notification Settings Listener Ports Re-branding Reverse Proxy. | As requested. |
| Database setup | Database migration from the default PostgreSQL to MS SQL if preferred. | As requested. |
| Integrated Walkthrough | Educate the customer/stakeholder through the implementation process for better adoption. | Integrated walkthrough will be provided at the end of the implementation. |
| Custom log format and custom parser rules | Support for Custom log sources (if feasible) |
| Custom Extensions | Development of a new extension (if feasible) |
| Custom Incident detection and management | Creation of an end-to-end incident detection and management plan for proposed use cases. |
| Database migration | Backend DB migration from PGSQL to MSSQL |
| Data migration | Migration of ES and Archive data |
| Product migration | Migration of EventLog Anaylzer folders from one drive to another within the same server or from one server to another. |
| Scalable architecture | Configuration of multiple instances for enterprise accounts (or) License above 1000 log sources. |
| Training | A 4-hour training session on EventLog Analyzer. |
A. Standard Edition
Choose this edition for a ready to deploy setup and core implementation.
Includes:
|
$4995 |
B. Advanced Edition
Choose this edition for complex environments that demand extensive customization and tailored integrations.
Includes:
Add-ons:
|
Get Quote |
For customizing your product implementation plan and other queries, reach out to onboarding@eventloganalyzer.com today!
Note: The project will be carried out based on the Scope of Work defined at the beginning of the project, with a detailed breakdown of activities and man-hour allocation.