Features | Free Edition * | Premium | Distributed |
---|---|---|---|
Multiple OS Support | ![]() |
![]() |
![]() |
Monitored Device Support (Windows, Linux, Unix, AIX, Routers, Switches, VMWare, Any Syslog device) |
![]() |
![]() |
![]() |
Customizable dashboard widgets | ![]() |
![]() |
![]() |
Log search using boolean operator, phrase, value ranges, wildcards & grouped search | ![]() |
![]() |
![]() |
FTP Active Mode support for log file import | ![]() |
![]() |
![]() |
Import and Analyze Event files | ![]() |
![]() |
![]() |
Auto Discovery of Hosts | ![]() |
![]() |
![]() |
Filter Events before Storing in Database | ![]() |
![]() |
![]() |
Compressed Archives | ![]() |
![]() |
![]() |
Archive log files encryption | ![]() |
![]() |
![]() |
Hashing and Time stamping of Archive log files | ![]() |
![]() |
![]() |
Real-time Display of Events | ![]() |
![]() |
![]() |
Automated Alerts | ![]() |
![]() |
![]() |
Authorized Access | ![]() |
![]() |
![]() |
Host Grouping for Policy Implementation | ![]() |
![]() |
![]() |
Schedule Data Collection | ![]() |
![]() |
![]() |
Custom Reports | ![]() |
![]() |
![]() |
Scheduling Reports | ![]() |
![]() |
![]() |
PUMA Reports | ![]() |
![]() |
![]() |
Multiple Report Formats | ![]() |
![]() |
![]() |
Multi-level Drilldown | ![]() |
![]() |
![]() |
Trend Analysis | ![]() |
![]() |
![]() |
Security Analysis | ![]() |
![]() |
![]() |
Compliance Reports (EventLog & Syslog) (Predefined and Customization) | ![]() |
![]() |
![]() |
Command Execution on Alerts | ![]() |
![]() |
![]() |
SMS and SNMP Trap Notification for Alerts | ![]() |
![]() |
![]() |
Internationalization Support to handle Native Logs | ![]() |
![]() |
![]() |
Export/Import of Alert, Report, and Filter Profiles | ![]() |
![]() |
![]() |
Advanced Search in Raw Logs, Save Result as Report Profile | ![]() |
![]() |
![]() |
Scheduled import from local and remote (FTP/SFTP) machines | ![]() |
![]() |
![]() |
Log collection during log collector down time | ![]() |
![]() |
![]() |
Monitoring Users Accessing EventLog Analyzer Application | ![]() |
![]() |
![]() |
File Integrity Monitoring | ![]() |
![]() |
|
Server specific reports | ![]() |
||
Multi-geographical location monitoring | ![]() |
||
Scalable architecture | ![]() |
||
Log field extraction using an interactive regular expression (regex) syntax builder | ![]() |
![]() |
|
Universal log parsing and indexing (ULPI) to support any log format (Human Readable & non-encrypted log formats) | ![]() |
![]() |
|
Import users from Active Directory groups | ![]() |
![]() |
|
Agent for log collection across WAN/Firewalls | ![]() |
![]() |
|
Import of saved Syslog Files | ![]() |
![]() |
|
Re-branding Web Client | ![]() |
![]() |
|
Instant Reports | ![]() |
![]() |
|
Analyze Application specific Logs
|
![]() |
![]() |
|
Support for MS SQL Server and MS SQL Cluster as Backend Database | ![]() |
![]() |
|
Custom View & User based Views | ![]() |
![]() |
|
Active Directory & RADIUS Server based Third Party User Authentication | ![]() |
![]() |
|
IBM AS/400 Logs Analysis (V5R series) Filter, Report, Alert, Archive & Import | ![]() |
![]() |
|
Real-Time Event Correlation | ![]() |
![]() |
|
Windows Terminal Server Log Monitoring | ![]() |
![]() |
|
User Session Monitoring | ![]() |
![]() |
|
Cloud Source Auditing
|
![]() |
![]() |
Event Log Analyzer Service Offering | Standard Onboarding | Advanced Onboarding |
---|---|---|
Installation | ![]() |
![]() |
Device management | Windows Server - 10, WKS - 50, Supported Syslog Devices -10 | ![]() |
Application management - IIS, MSSQL, Other Applications | Up to 1 each | Up to 3 each |
Technician management (role configuration) | ![]() |
![]() |
Log collection filter configuration | ![]() |
![]() |
Log retention policy settings | ![]() |
![]() |
Configuring Windows/Linux-based file monitoring basic configuration | ![]() |
Up to 10 |
Tuning product administrative settings 1. Email and SMS server configuration 2. Configuring log collection failure alerts 3. Log forwarding |
![]() |
![]() |
Historic EVT/EVTX file import | ![]() |
![]() |
Custom reports and alerts configuration (provided logs are available) | Up to 1 each | Up to 10 in total |
Reports, alerts, and compliance schedule creation | Up to 1 each | Up to 10 |
Rule-based correlation setup (based on the feasibility/available logs) | Up to 1 | Up to 5 |
Configuring managed servers* | ![]() |
![]() |
Compliance-specific reports configuration | ![]() |
Up to 1 |
Dashboard customization | ![]() |
Up to 5 |
Log import scheduling | ![]() |
Up to 5 |
Custom log parser rule (creating additional fields) (subject to feasibility) | ![]() |
![]() |
Advanced Threat Analytics configuration** | ![]() |
![]() |
Incident management configuration | ![]() |
![]() |
SOAR workflow configuration | ![]() |
![]() |
External threat feed configuration | ![]() |
![]() |
Setting up Windows logging | ![]() |
![]() |
Security hardening & privacy 1. SSL configuration 2. Configuring TFA 3. GDPR privacy configuration 4. CAPTCHA |
![]() |
![]() |
Database migration (PGSQL to MSSQL) | ![]() |
![]() |
High availability configuration | ![]() |
![]() |
Restoration of an available backup | ![]() |
![]() |
Data migration (ES/archive) | ![]() |
![]() |
Agent deployment (agent-level registry changes will be performed) | ![]() |
![]() |
NAT configuration | ![]() |
![]() |
Expert consultation | ![]() |
![]() |
Comprehensive documentation | ![]() |
![]() |
User acceptance testing | ![]() |
![]() |
Integrated walkthrough | ![]() |
![]() |
Signing | ![]() |
![]() |
Post-implementation health check | ![]() |
![]() |
Supporting new log formats (subject to feasibility) | ![]() |
![]() |
Additional custom correlation rules configuration (based on the feasibility/available logs) | ![]() |
![]() |
Training (up to 4 participants) | Available as an add-on | ![]() |