Analysis of log data, including SNMP traps, Windows® event logs, W3C logs, text-based logs, Syslog, SQL Server® and Oracle® audit logs.
GFI EventsManager provides you with specific reports for some of the major compliance acts as well as other standard reports.
Filter-enabled charts provide fast and easy access to the important data you need.
GFI EventsManager offers deep granular control of log data to easily classify the information from your system.
GFI EventsManager offers safe storage of log data according to industry standards and security best practices.
GFI EventsManager offers action profiles enabling you to react by remediating security incidents or IT infrastructure problems.
Classify log records for particular conditions and configure event log monitoring rules for a specific computer or a group of computers.
GFI EventsManager collects and compiles event log data from installations on multiple sites and locations across your network, into one central database.
GFI EventsManager provides a unique combination of active checks and debug logs collection, offering major IT management advantages.
Released: January 22, 2013
In this release of GFI EventsManager, we have added active network and server monitoring, which adds advanced monitoring checks to track the health and performance of network infrastructure, applications and services, helping you identify and remediate issues quicker than ever.
NOTE: Hard disc size depends on your environment, the size specified in the requirements is the minimum required to install and archive events.
Supported operating systems
Most of the industry standards, security best practices, or regulations covering network data management require that logs are kept in a secure manner that guarantees their accuracy and integrity. At the same time, access to the log data needs to be controlled to avoid disclosure of sensitive information or tampering attempts.
GFI EventsManager provides three layers of log data consolidation: encryption of the log data store using strong AES algorithm; hashing of log entries to prevent and identify attempts to tamper with log data at the binary level; and controlled and audited access to log data using the GFI EventsManager console. Access to the log data is granted based on two-factor authentication: one using the Windows credentials which need to have administrative privileges and the second based on the built-in user role system. All access is granted on a need-to-know basis. GFI EventsManager users can only work with the data coming from the assets they manage, and all the actions taken are logged and reviewable at a later stage.