Eventlog Analyzer User Guide
Eventlog Analyzer User Guide
2. Introduction 2
2.1. Overview 2
3.3. Prerequisites 12
Collect log data from sources across the network infrastructure including servers, applications, network
devices, and more.
Analyze log data to extract meaningful information in the form of reports, dashboards, and alerts.
Monitor user behavior, identify network anomalies, system downtime, and policy violations.
Detect internal and external security threats.
Generate predefined reports to meet the requirements of regulatory compliance mandates such as PCI DSS,
HIPAA, FISMA, SOX, GLBA, SOX, ISO 27001, and more.
How to add devices and applications, and get logs into EventLog Analyzer?
What are the reports available?
How to generate custom rerports?
How to search logs for specific information?
How to extract additional fields from the logs?
How to generate and send alert notifications?
How to customize the web client?
2.1. Overview
EventLog Analyzer is a web-based, real-time, log monitoring and compliance management solution for Security
Information and Event Management (SIEM) that improves network security and helps you comply with the IT audit
requirements. Using an agent less architecture, EventLog Analyzer can collect, analyze, search, report on, and archive
logs received from systems (Windows, Linux/UNIX), network devices (routers, switches, firewalls, and IDS/IP),
applications (Oracle, SQL and Apache). It provides important insights into user activities, policy violations, network
anomalies, system downtime, and internal threats. It can be used by network administrators and IT managers to
perform audits for regulations such as SOX, HIPAA, PCI DSS, GLBA, etc.
Monitor activities of servers, workstations, devices, and applications spread across geographies.
Monitor user activities like logons/logoffs and objects accessed.
Generate reports for security events of interest.
Generate compliance reports for PCI DSS, HIPAA, FISMA, SOX, GLBA and other regulatory mandates.
Perform log forensics by swiftly searching the log database and save the search results as reports.
Configure automatic e-mail or SMS alerts for indicators of compromise, such as network anomalies or
compliance threshold violations.
Execute workflows upon alert generation to respond to security threats automatically.
Secure and tamper-proof archival of log data for forensic analysis and compliance audits.
For real-time Windows event log collection, DCOM, WMI, and RPC have to be enabled in the remote windows
machine for the logs to be collected by EventLog Analyzer.
For real-time syslog collection ensure that the syslog listener ports in EventLog Analyzer are configured to listen
to the port where the syslog or syslog-ng service is running on that particular (Cisco device, UNIX, HP-UX,
Solaris or IBM AIX) machine.
For application logs, EventLog Analyzer can be scheduled to import logs (HTTP or FTP) periodically from the
application devices. You can also import and analyze the older logs from Windows and Linux machines.
Note: The updates for the Distributed Edition are the same as that of the Standalone edition.
Hardware Requirements
Log management solutions are resource-intensive and selecting the right hardware plays a major role in ensuring
optimal performance.
The following table denotes the suggested hardware requirements based on the type of flow.
Processor cores 6 12 24
RAM 16 GB 32 GB 64 GB
Note:
The above-mentioned values are approximate. It is recommended to run a test environment similar to the
production environment with the setup details mentioned in the above table. Based on the exact flow and
data size, the system requirements can be fine-tuned.
For higher IOPS, we can use RAID or SSD.
Use the following table to determine the type of flow for your instance.
Type 1
Linux, HP, pfSense, Juniper 150 2000 10000 20000
Syslogs
Type 3
Barracuda, Fortinet, Checkpoint 450 1200 4000 7000
Syslogs
Note:
A single-installation server can handle either a maximum of 3000 Windows logs or any of the high flow
values mentioned for each log type in the above table.
For log types which are not mentioned in the above table, choose the appropriate category based on the
log size. For example, in the case of SQL Server logs when the byte size is 900 bytes, and EPS is 3000, it
should be considered as High Flow.
If the combined flow is higher than what a single node can handle, it is recommended to implement
distributed setup.
It is recommended to choose the next higher band if advanced threat analytics and a large number of
correlation rules have been used.
General Recommendations
VM infrastructure
Allocate 100 percent RAM/CPU to the virtual machine running EventLog Analyzer. Sharing memory/CPU with
other virtual machines on the same host may result in RAM/CPU starvation and may negatively impact EventLog
Analyzer's performance.
Employ thick provisioning, as thin provisioning increases I/O latency. In case of VMware, Select Thick
provisioned, eagerly zeroed as lazily zeroed is lower in performance.
Enabling VM snapshots is not recommended as the host duplicates data in multiple blocks by increasing reads
and writes, resulting in increased IO latency and degraded performance.
Web browsers:
EventLog Analyzer has been tested to support the following browsers and versions with at least a 1024x768 display
resolution:
Microsoft Edge
Firefox 4 and later
Chrome 8 and later
Databases:
EventLog Analyzer can use the following databases as its back-end database.
PostgreSQL
External databases
Please note the hardware requirements needed to configure the MS SQL database for EventLog Analyzer:
The below table denotes the suggested hardware requirements based on the type of flow.
Processor Cores 4 6 12
RAM 8 GB 12GB 16 GB
To modify log size, open Event Viewer > right click on the required channel > Log Properties and then modify
Maximum Log Size.
Operating systems
EventLog Analyzer can be installed in machines running the following operating systems and versions:
The below table lists all the differences of the Eventlog Analyzer instance when installed in Windows and Linux.
Domain and
Available N/A
workgroup discovery
N/A
MS SQL discovery and
Available Note: MS SQL log collection is supported via Windows
configuration
agent
Installation server
SIEM solutions are resource-intensive. It is recommended to provide a dedicated server for their optimal
performance.
Eventlog Analyzer uses Elasticsearch. Elasticsearch process is expected to utilize off-heap memory for better
performance. Off-heap memory is maintained by the operating system and will free up when necessary.
Core 12 16
RAM 64 64
Elasticsearch
PORT INBOUND OUTBOUND Additional Rights and Permissions
Ports Usage:
Internal Communication
INBOUND And
PORT Additional Rights and Permissions
OUTBOUND
Ports Usage:
Database
PORT Additional Rights and Permissions
Ports Usage:
EventLog UserGroups:
Windows
TCP/135 Analyzer RPC
Device Event Log
Server
Readers
EventLog Distributed
Windows
TCP/139 Analyzer NetBIOS session RPC/NP COM Users
Device
Server
User Permissions:
EventLog
Windows
TCP/445 Analyzer SMB RPC/NP For root\cimv2 in
Device
Server WMI Properties:
Enable Account
Remote Enable
Read Security.
Dynamic ranges RPC randomly allocates high TCP ports Firewall Permissions:
EventLog
of RPC ports - Windows for Windows Server 2008 and later
Analyzer
TCP/49152 to Device versions, as well as for Windows Vista Predefined
Server
65,535 and subsequent versions Rule:
Windows
Management
Instrumentation
(WMI)
Note:
It is not necessary to open outbound ports on the EventLog Analyzer agent machine and inbound ports on
the EventLog Analyzer server.
For Windows 2000, Windows XP, and Windows Server 2003, dynamic RPC ports range from 1025 to
5000.
To enhance security across a broad spectrum of open ports, it is advisable to include the Server IP address
within the firewall's scope. This ensures that only authorized traffic from the designated server is permitted
through the firewall. Moreover, predefined rules with process and service filters, such as
WMI,RPC,HTTP/HTTPS,Remote Event Log Management can further bolster security by allowing only
specific processes or services to communicate through the designated ports. If the Server IP undergoes
any changes, it is imperative to promptly update the corresponding firewall rule accordingly.
Syslog Collection
SSH Communication
PERMISSION USAGES
Ensure that the algorithm mentioned below is present in the sshd_config file.
Linux Agent
File Location: /etc/ssh/sshd_config
Installation
Key exchange (KEX): diffie-hellman-group1-sha1, diffie-hellman-group- Linux Agent
exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group14-sha256 , Management &
diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, diffie-hellman- Communication
group17-sha512, diffie-hellman-group18-sha512 , ecdh-sha2-nistp256, ecdh-sha2-
Configuring
nistp384, ecdh-sha2-nistp52
Automatic
Ciphers: aes128cbc, aes128ctr, aes192cbc, aes192ctr, aes256cbc, aes256ctr, SysLog
arcfour128, arcfour256, blowfishcbc, tripledescbc Forwarding
Linux MYSQL
MAC: hmacmd5, hmacmd596, hmacsha1, hmacsha196, hmacsha256,
Server
hmacsha512
Discovery
*This will be Required for all Linux Communications.
User Rights:
User Permissions:
UDP/162 EventLog Analyzer Network Device /
SNMP User can customize
(configurable) Server Application
the port.
EventLog
TCP/135 IIS Server RPC User Permissions:
Analyzer Server
EventLog NetBIOS session Read access to the IIS log folder should
TCP/139 IIS Server be enabled.
Analyzer Server RPC/NP
Permissions for the system 32/inetsrv
EventLog should be enabled
TCP/445 IIS Server SMB RPC/NP
Analyzer Server
3. Agent orchestration
Windows Agent Log Collection and Communication
PORTS INBOUND OUTBOUND Additional Rights and Permissions
Note:
Communication includes tasks such as agent synchronization and checking agent status.
EventLog
EventLog
Analyzer
TCP/135 Analyzer RPC
Agent
Server
Machine
User Permissions:
EventLog
EventLog Read, write and modify permissions to files
Analyzer NetBIOS
TCP/139 Analyzer in \\
Agent session RPC/NP
Server <ipaddress>\Admin$\TEMP\EventLogAgent
Machine
should be enabled.
EventLog Access "Remote Registry" service
EventLog
Analyzer
TCP/445 Analyzer SMB RPC/NP At least read control should be granted for
Agent
Server winreg registry key. (Computer
Machine
\HKEY_LOCAL _MACHINE\ SYSTEM\
CurrentContro lSet\Control\ SecurePipe
RPC randomly
Servers\winreg).
allocates high
TCP ports for Read/Write registry keys - SOFTWARE\\
Windows Wow6432Node \\ZOHO Corp\\EventLog
Dynamic Analyzer\\ (or) SOFTWARE \\ZOHO Corp
EventLog Server 2008
ranges of EventLog \\EventLog Analyzer\\.
Analyzer and later
RPC ports - Analyzer
Agent versions, as There should be access to remote
TCP/49152 Server
Machine well as for services.msc
to 65,535
Windows Vista
and
subsequent
versions
Note:
Management involves actions like starting, stopping, or uninstalling the agent software.
NetBIOS name
EventLog
Target resolution
TCP/137 Analyzer
Device RPC/named pipes
Server
(NP)
User Permissions:
EventLog
Target Network access: Do not allow anonymous
TCP/138 Analyzer NetBIOS datagram
Device not allow anonymous enumeration of SAM
Server
accounts and shares.
EventLog Sometimes, connecting to different
Target NetBIOS session
TCP/139 Analyzer workgroup needs credentials even to
Device RPC/NP
Server view the shared resources.
EventLog
Target
TCP/445 Analyzer SMB RPC/NP
Device
Server
5. Discovery
Windows Domain Discovery
PORTS INBOUND OUTBOUND SERVICE Additional Rights and Permissions
User Permissions:
EventLog
Workgroup
TCP/135 Analyzer RPC
Server
Server
Target EventLog
TCP/135 Windows Analyzer RPC
Device Server
Target EventLog
NetBIOS name resolution
TCP/137 Windows Analyzer User Permissions:
RPC/named pipes (NP)
Device Server
The winreg registry key should at
Target EventLog the very least be given read
TCP/138 Windows Analyzer NetBIOS datagram control.
Device Server
EventLog
Workgroup
TCP/139 Analyzer NetBIOS session RPC/NP
Server
Server
EventLog
Workgroup
TCP/445 Analyzer SMB RPC/NP
Server
Server
IIS Discovery
MySql EventLog
TCP/135 RPC User Permissions:
Server Analyzer Server
WMI permission is needed to find the MySQL
MySql EventLog SMB
TCP/445 server configuration file using SFTP.
Server Analyzer Server RPC/NP
PING DEVICE ICMP/No ports Audited Windows / Linux Device EventLog Analyzer Server
TRACE ROUTE WINDOWS ICMP/No ports Audited Windows Device EventLog Analyzer Server
TRACE ROUTE LINUX UDP/33434 -33534 Audited Linux Device EventLog Analyzer Server
WINDOWS ACTIONS
BLOCK PORT INBOUND OUTBOUND SERVICE Additional Rights and Permissions
RPC
RPC ports - Audited EventLog randomly
Environment Permission:
TCP/1024 Windows Analyzer allocated
The computer should not
to 65,535 Device Server high TCP
include EventLog Analyzer
ports
Installed server
RPC
Environment Permission:
RPC ports - Audited EventLog randomly
TCP/1024 Windows Analyzer allocated The user should have read,write
to 65,535 Device Server high TCP and modify access to the
ports shared path in the script.
Execute Methods
Audited EventLog
TCP/445 Windows Analyzer SMB RPC/NP Enable Account
Device Server Remote Enable
Disable
USB Read Security
Environment Permission:
RPC
Remote Registry Service should
RPC ports - Audited EventLog randomly
be running.
TCP/1024 Windows Analyzer allocated
Full Control permission to
to 65,535 Device Server high TCP
HKEY_LOCAL_
ports
MACHINE\SYSTEM\
CurrentControlSet\
Services\USBSTOR
Audited EventLog
TCP/135 Windows Analyzer RPC
Device Server UserGroups:
Audited EventLog
TCP/135 Windows Analyzer RPC
Device Server UserGroups:
Audited EventLog
TCP/135 Windows Analyzer RPC
Device Server UserGroups:
LINUX ACTIONS
BLOCK PORT INBOUND OUTBOUND SERVICE Additional Rights and Permissions
Audited EventLog
TEST TCP/Specified
Linux Analyzer - -
PROCESS port.
Device Server
NOTIFICATIONS
User Permissions
Execute Methods
Enable Account
Pop Up
RPC Remote Enable
WINODWS
RPC ports - Audited EventLog randomly
Read Security
TCP/1024 to Windows Analyzer allocated
65,535 Device Server high TCP
Environment Permission:
ports
"AllowRemoteRPC" should be
1 for HKEY_ LOCAL_MACHINE\
SYSTEM\Current
ControlSet\Control\Terminal
Server.
Audited EventLog
Pop Up TCP/Specified Environment Permission: Sudo
Linux Analyzer -
LINUX port. permission for user.
Device Server
Send TCP/Port
Audited EventLog Environment Permission: SMTP
Email mentioned while
Linux Analyzer - server should be configured on Event
WINDOWS config using
Device Server log analyzer server
& LINUX SMTP server
Send Audited
UDP/Port EventLog Environment Permission: The port
SNMP Trap Windows
specified in Analyzer - mentioned in workflow configuration
WINDOWS / Linux
workflow block Server should be open.
& LINUX Device
AD ACTIONS
User Permissions:
User Permissions:
User Permission:
DISABLE USER The User account provided
Audited EventLog
COMPUTER should have "Read", "Write" ,
TCP/389 Domain Analyzer LDAP
WINDOWS & "modify owners" and "modify
Controller Server
LINUX permissions" permissions
enabled.
MISCELLANEOUS ACTIONS
User Rights:
WRITE TO
User Permissions:
FILE
WINDOWS RPC ports - Audited EventLog For root\cim v2 In Properties:
TCP/1024 to Windows Analyzer
65,535 Device Server Execute Methods
Enable Account
Remote Enable
Read Security
Environment Permission:
Environment Permission:
A "connect" Socket Permission to the
HTTP
- - - host/port combination of the destination
WebHook
URL or a "URL Permission" that permits this
request.
Audited
EventLog
FORWARD TCP/Specified Windows /
Analyzer -
LOGS Port Linux
Server
Device
Audited
EventLog User Permissions:
CSV TCP/Specified Windows /
Analyzer
LOOKUP Port Linux Read permission to the specified CSV file.
Server
Device
FIREWALL ACTIONS
User Permissions:
User Permissions:
User Permissions:
Impact if not
Path Need for whitelisting
whitelisted
Snapshots and
Elasticsearch archival
Elasticsearch index snapshot is taken at this feature will fail if the
<ELA_HOME>/ES/repo
location. files at this location are
deleted.
Snapshots and
Elasticsearch archival
Elasticsearch index snapshot is taken at this
<ME>/elasticsearch/ES/repo feature will fail if the
location.
files at this location are
deleted.
If the file is
Formatted logs are stored before processing for
quarantined or
<ELA_HOME>/data/AlertDump alerts. Might be detected as false positive by
deleted, related alerts
Antivirus applications.
would be missed.
If the file is
Formatted logs are stored before processing for quarantined or
<ELA_HOME>/data/NotificationDump notification. Might be detected as false positive deleted, notification
by Antivirus applications. for triggered alerts
would be missed.
All binaries are included here. Some Antivirus Product might not
<ELA_HOME>/bin
applications might block them as false positive. function.
All binaries are included here. Some Antivirus Product might not
<ELA_HOME>/lib/native
applications might block them as false positive. function.
Performance issues
<ELA_HOME>/archive (If the archive might occur in the
Antivirus applications might slow down frequent
folder is moved to a new location, product if the Antivirus
write operations.
add the new location) applications slow
down write operations.
Performance issues
might occur in the
Antivirus applications might slow down frequent
<ELA_HOME>/ES/CachedRecord product if the Antivirus
write operations.
applications slow
down write operations.
C:\Program Files Agent binaries are The Agent might not work if the files are
(x86)\EventLogAnalyzer_Agent\bin stored here. quarantined.
Antivirus applications
Performance issues might occur in the
C:\Program Files might slow down
product if the Antivirus applications slow
(x86)\EventLogAnalyzer_Agent\bin\data frequent write
down write operations.
operations.
C:\Program Agent binaries are The Agent might not work if the files are
Files\EventLogAnalyzer_Agent\bin stored here. quarantined.
Antivirus applications
Performance issues might occur in the
C:\Program Files might slow down
product if the Antivirus applications slow
(x86)\EventLogAnalyzer_Agent\bin\data frequent write
down write operations.
operations.
Need for
Path Impact if not whitelisted
whitelisting
Antivirus
Performance issues might
applications
occur in the product if the
/opt/ManageEngine/EventLogAnalyzer_Agent/bin/data might slow down
Antivirus applications slow
frequent write
down write operations.
operations.
To fetch the "Log360 Cloud Threat Analytics" feeds, the below URLs will be used
HTTPS/443 https://log360cloud.manageengine.com/
https://log360feeds.manageengine.com/
Note: As soon as EventLog Analyzer is installed on a domain-joined machine, it will automatically discover the
device's domain and add the five Windows Server machines that respond first to a broadcast query in the domain.
These devices can be deleted by the user, and once deleted, will not be added back automatically.
Upon starting the installation you will be taken through the following steps:
Agree to the terms and conditions of the license agreement. You may print it for offline reference.
Select the folder to install the product. Use the Browse option. The default installation location
is C:\ManageEngine\EventLog Analyzer. If the new folder or the default folder does not exist, it will be created
and the product will be installed.
Enter the web server port. The default port number is 8400. Ensure that the default port or the port you have
selected is not occupied by some other application.
Enter the folder name in which the product will be shown in the Program Folder. The default name
is ManageEngine EventLog Analyzer.
Enter your personal details to get assistance.
At the end of the procedure, the wizard displays the ReadMe file and starts the EventLog Analyzer server.
With this the EventLog Analyzer product installation is complete.
How to uninstall?
The procedure to uninstall for both 64 Bit and 32 Bit versions is the same.
Windows:
Linux:
1. Navigate to "<EventLogAnalyzer Home>/_ManageEngine EventLogAnalyzer_installation" directory.
2. Execute the following command in Terminal Shell.
3. You will be asked to confirm your choice, after which EventLog Analyzer is uninstalled.
Windows Service:
During installation, you would have chosen to install EventLog Analyzer as an application or a service. If you installed it as
an application, you can carry out the procedure to convert the software installation to a Windows Service.
Once the software is installed as a service, follow the steps given below to start EventLog Analyzer as a Windows
Service:
Linux Application:
For Linux, based on where EventLog Analyzer has been installed, the steps to start the server are as follows.
When the respective run.sh file is executed, a command window opens up and displays the startup information
of several EventLog Analyzer modules. Once all the modules are successfully started, the following message is
displayed:
Server started.
The 8400 port is replaced by the port you have specified as the web server port during installation.
Note: If the default syslog listener port of EventLog Analyzer is not free then EventLog Analyzer displays "Can't Bind
to Port <Port Number>" when logging in to the UI.
Linux Service:
Once the software is installed as a service, execute the command given below to start Linux Service:
Check the status of the EventLog Analyzer service by executing the following command (sample output given
below):
Windows Application:
Navigate to the Program folder in which EventLog Analyzer has been installed. By default, this is Start >
Programs > ManageEngine Log360 <version number>. Select the Shut Down EventLog Analyzer option.
Alternatively, you can navigate to the <EventLog Analyzer Home>\bin folder and execute the shutdown.bat
file. You will be asked to confirm your choice, after which the EventLog Analyzer server is shut down.
Windows Service:
To stop a Windows service, follow the steps given below.
Linux Application:
Navigate to the <EventLog Analyzer Home>\bin directory. Execute the shutdown.sh file.
You will be asked to confirm your choice, after which the EventLog Analyzer server is shut down.
Linux Service:
Execute the commands given below to stop the Linux service (sample outputs are given):
Note: You can also execute run.bat but this is not preferred.
Open a supported web browser. Type the URL address as http://<devicename>:8400 (where <devicename> is
the name of the machine in which EventLog Analyzer is running, and 8400 is the default web server port)
You can also open EventLog Analyzer from the EventLog Analyzer shortcut available in the desktop.
Log in to EventLog Analyzer using the default username/password combination of admin/admin.
If you import users from Active Directory or add RADIUS server details, you will find that the options are listed in
the Log on to field (below the Password field). In this case, enter the User Name, Password, and select one of
the three options in Log on to (Local Authentication or Radius Authentication or Domain Name). Click
the Login button to connect to EventLog Analyzer.
EventLog Analyzer provides two external authentication options apart from the local authentication. They are Active
Directory and Remote Authentication Dial-in User Service (RADIUS) authentication. The Log on to field will list the
following options:
Local Authentication - If the user details are available in the local EventLog Analyzer server user database.
Radius Authentication - If the user details are available in a RADIUS server and dummy user
entries are available in the local EventLog Analyzer server user database.
Domain Name(s) - If the user details of a domain are imported from Active Directory into the local EventLog
Analyzer server user database.
Once you log in, you can start collecting logs, generating reports and more.
Note: Before starting the backup process, stop EventLog Analyzer service.
Backup the data file and log file from the current location <MSSQL Home>\data\eventlog.mdf and
<MSSQL_Home>\data\eventlog_log.LDF to the new location <New Location>\eventlog.mdf and
<New Location>\eventlog_log.LDF.
Re-attach the database and point to the old location by using the following commands:
3. Restart the product after memory allocation. The changes will be effective only after the product is restarted.
EventLog Analyzer comes in two editions: Standalone and Distributed. The solution is licensed based on the number of
Windows Workstations, Windows Servers, and Syslog devices along with add-ons such as Application Auditing for IIS
and SQL servers , Linux File Server Auditing and Advanced Threat Analytics.
Available Editions
Standalone Edition
If your company is a Small or Medium Business (SMB), the network is in a single geographical location, and the number
of devices and/or applications to be monitored is less than 1000, the Standalone edition is suitable for your company.
Also, the log reception rate should be well within 20,000 logs/second. If your log rate increases, then you can easily
switch over to Distributed Edition to handle the capacity.
Distributed Edition
If your company is a Large Business or Managed Security Service Provider (MSSP), and the network is spread
across multiple geographical locations, the Distributed edition is suitable for your company. You can monitor 50 to
virtually unlimited number of hosts/applications with this edition.
License Models
Perpetual model
In this model, the licensing is perpetual and a nominal amount is charged as Annual Maintenance and Support (AMS)
fee to provide the maintenance, support, and updates.
Home
The Home tab provides dashboards that allow you to gain a high-level overview of important security events in the
network. You can view the severity levels of events, trends in logs, network traffic, and security threats that have been
flagged.
Reports
The Reports tab displays audit reports. EventLog Analyzer provides over 1000 pre-built reports for a wide range of
devices, networking equipment, and applications. You can view, add, manage, schedule, and filter reports from the
reports tab. To learn more about EventLog Analyzer's reports, click here (attach link here).
Compliance
EventLog Analyzer simplifies IT compliance and regulatory audit(s). The Compliance tab in the UI helps you export
comprehensive compliance reports in any format, tweak the existing report templates, and create new compliance
reports. Click here to learn more about compliance reports.
Search
The Search tab allows you to search through your logs and extract relevant information about a security incident. The
click-based search engine makes it easy to drill-down to the root cause of an incident. The search results can then be
saved as a report for auditors.
Correlation
EventLog Analyzer's real-time correlation engine helps you detect and mitigate security threats at an early stage. You
can leverage the predefined rules that address a wide range of use cases and set custom rules based on the
requirements of your organization. Click here (attach link here) to learn more about correlation feature in EventLog
Analyzer.
Alerts
The Alerts tab in the UI helps you view all alerts that have been triggered in your network. You can leverage the built-in
alert profiles and configure custom alerting criteria as per your requirements. Furthermore, critical capabilities for
incident response such as ticketing tool integrations and response workflows can be configured here.
Settings
The Settings tab can be used to access the configuration settings (attach link here), admin settings (attach link here)
and system settings (attach link here).
LogMe
The LogMe tab in the UI displays the different log sources supported by EventLog Analyzer and describes how to
configure them for auditing.
Support
The Support tab allows you to get in touch with our technical support team and gives you access to resources that help
you learn more about the solution. You can also request for a new feature and create support logs from this tab.
Just getting started? Download our quick start guide to see how to install EventLog Analyzer, add devices, import logs
etc.
Domain Setup
For admin users
In a domain setup, the domain admin privilege allows admins to collect logs in Windows devices.
Step 2: Create a new domain level GPO and link the GPO
1. Open the Run command in domain controller and type gpmc.msc to open Group Policy Management Console.
2. Right click on the domain → Create a GPO in this domain and link it here.
3. Name the GPO as "ELA GPO" and click OK.
Step 3: Add user to Event Log Readers and Distributed COM user
1. Open the Run command in domain controller and type gpedit.msc to open the Group Policy Management Console.
2. Right click on the created GPO → Edit.
Note:
Event Log Readers: Members of this group are allowed to read event logs.
Distributed COM Users: Members of this group are allowed to launch, activate, and use Distributed COM objects
on the computer.
Step 4: Enable WMI and Remote Event Log Management traffic through Firewall
1. Open the Run command and type gpmc.msc to open the Group Policy Management Console.
2. Right click on the GPO created → Edit.
3. Select Computer configuration → Policies → Windows Settings → Security Settings → Windows Firewalls with
Advanced Security → Inbound Rules.
4. Right click on Inbound Rules → New Rule and select WMI in predefined field → select all rules → Allow connection.
Note: These rules open ports of the range, 49152 - 65535, that are exclusive for WMI communication and so these
cannot be accessed by other applications.
Read Security: Allows users to read the security setting of WMI resources.
Execute Method: Allows users to execute a method defined within WMI classes.
Make sure that the user has the privilege to run the script in the workstation. If not, please refer to the steps below to
enable the privilege:
Navigate to Computer Configuration > Administrative Templates > Windows Components > Windows
PowerShell.
Double-click on the Turn on Script Execution option.
Note:
After all the required devices are given WMI permissions, remove the script from Computer Configuration
Policies Windows Settings Scripts (Startup/Shutdown) → Startup or the scripts will run every time during
startup.
Not applicable for Multiple workgroup devices.
Workgroup Setup
Step 1: Add user to EventLogReader and Distributed COM users
1. Log in to your workgroup with admin privileges and open the Run command and type compmgmt.msc to open
Computer Management → Local User and Group.
2. Right click on user and add new user.
Note: Installation of Windows agent application is mandatory to collect Windows eventlogs for EventLog Analyzer
deployed on Linux operating systems.
Note: You have the option to update, reload and delete a workgroup by clicking on the respective icons next to the
Select Domain drop down window. Optionally, you can manually add the device as shown below by clicking on
the Configure Manually link.
1. Enter the Device name or IP address. You can add the device as a Syslog device by clicking the Add as Syslog
device checkbox.
2. Enter the Username and Password with administrator credentials, and click on Verify Credential.
3. Click on the Add button to add the device for monitoring.
When syslogs are forwarded to the EventLog Analyzer server, syslog devices can be added automatically. This
capability is particularly useful for adding multiple syslog devices without requiring manual involvement.
How it works:
When a syslog packet reaches the EventLog Analyzer server, it attempts to determine the source IP address and resolve
it to a corresponding name.
If resolution is successful : The syslog device will be added with a resolved hostname.
If resolution is unsuccessful : The syslog device will be added using the IP address.
Note:
1. Make sure that the default ports : UDP- 513,514 , TCP- 514 are open in inbound rules of the firewall.
2. To configure the TLS ports, click here.
3. If the source IP address or resolved hostname already exists in the database, incoming logs will be associated
with that device.
2. Enter the Start IP and End IP or the CIDR range in order to discover the Syslog devices and click on Next.
6. Click on the Add Device(s) button to add the devices for monitoring.
Once a Unix device has been added, you will be prompted to Configure Auto Log Forward.
How it works:
Prerequisite: Forwarded syslogs should adhere to standard RFC 3164 and the corresponding Relay server
configuration must be enabled in EventLog Analyzer.
Sample Log - <34>Oct 18 22:00:15 rootmachine su: 'su root' failed for test on /dev/pts/
Note:
The hostname ( rootmachine ) is parsed from the syslog packet and the syslog device is added with the
hostname.
If the hostname is already present in the database, then the logs will be mapped to that device.
The syslog device can be Unix, Cisco, Fortinet, Palto Alto,etc.
DHCP Configuration
Usecase: When the IP addresses of syslog devices change frequently due to DHCP, a new device is added with a new IP
address whenever the IP changes and if the name cannot be resolved.
How it works:
Prerequisite: Forwarded syslogs from all the syslog devices to Eventlog Analyzer should adhere to standard RFC 3164
and the corresponding DHCP configuration must be enabled in EventLog Analyzer.
Note:
The hostname( rootmachine ) is parsed from the syslog packet and the syslog device is added with the
hostname.
If the hostname is already present in the database, then the logs will be mapped to the respective device.
In the Manage Devices page, navigate to the Other Devices tab and click on the Add Device(s) button. This will open the
Add Device(s) window.
Note: The credentials provided must have an authority level of 50. Otherwise, EventLog Analyzer will not be able
to login to fetch History logs from these devices.
Note: For setting up Security auditing in AS 400/iSeries machines, you must have the *AUDIT special authority.
Note: This example uses a library called JRNLIB for journal receivers.
Place the journal receiver in any library of your choice. Ensure that it is not placed in the QSYS library, which is a
system library.
Enter a name for the journal receiver.
When you want the naming convention to be applied to naming all journal receivers, use the *GEN option.
Specify an appropriate threshold level that suits your system size and activity. The size you choose should be
based on the number of transactions on your system and the number of actions you choose to audit. For system
change journal management support, the threshold must be at least 5000KB.
To limit access to the information stored in the journal, specify *EXCLUDE on the AUT parameter.
Note: To create this journal you must have the authority to add objects to QSYS.
Specify the journal receiver name that you created, using the JRNRCV parameter.
Specify *EXCLUDE on the AUT parameter to limit access to the information stored in the journal.
(*SYSTEM) is passed as the parameter for Manage Receiver (MNGRCV). Thus when the attached journal
receiver reaches its threshold size, the system itself detaches this receiver and creates and attaches a new
journal receiver.
Avoid detaching receivers and creating & attaching new receivers manually, using the CHGJRN command.
To retain the detached journal receivers, specify (*NO) as the value for DLTRCV. This will prevent the automatic
deletion of detached receivers by the system.
QAUDJRN receivers are your security audit trail. Hence, ensure that they are adequately archived.
To specify which actions are to be logged into the audit journal for all the users on the system, you need to set
the audit level to the QAUDLVL system value using the WRKSYSVAL command.
If you want to set action and object auditing for specific users, use the CHGUSRAUD command.
You can also set object auditing for specific objects as per your requirement, using
the CHGOBJAUD and CHGDLOAUD commands.
Setting the QAUDENDACN system value helps you determine the systems action when it is unable to write an
entry to the audit journal.
With the QAUDFRCLVL system value parameters, you can control the transfer of audit records from memory to
auxiliary storage.
To start auditing set the QAUDCTL system value to any value other than *NONE.
Once this security auditing set up is completed, EventLog Analyzer will automatically fetch the logs collected in the
journal receiver of the AS400/iSeries device that is added for monitoring. If the AS400/iSeries machine is not added to
EventLog Analyzer server, add the device to begin collecting its logs.
DDL/DML Monitoring
Advanced Auditing
Column Integrity Monitoring
2. In the Database Management page, click + Add SQL Server Instance. The SQL server instances are automatically
3. Select the SQL Server instance(s) you wish to monitor and click Next. You will be taken to the Credential
Configuration page and prompted to enter valid credentials.
4. If you wish to use the default credentials, select the check-box (default credentials could be the device or domain or
logged on credentials). Alternatively, you can enter a username and password in the credentials field and click
Save.
If the SQL Server instance you wish to add for monitoring is not discovered automatically, click
+ Add Manually and you will be prompted to enter details for Windows Server configuration and SQL Server instance
configuration.
Select the Windows server and enter valid credentials. Alternatively, you can use the default credentials.
SQL Server instance configuration
Enter the instance name, port number, and credentials in the given fields
Enable or disable Advanced Auditing.
Note: Enabling advanced auditing will create an audit policy and disabling advanced auditing will
remove the audit policy on the selected SQL Server instance.
Select the instance authentication method (Windows or SQL authentication) from the available dropdown
menu.
Click Add.
Note: Advanced Auditing needs to be enabled for server-level audit specification to be created. It can be
disabled later. The required logs will be fetched even if Advanced Auditing has been disabled.
Note: The queries to fetch logs will succeed only if Advanced Auditing is enabled.
When advanced auditing is enabled, the following event id's will be enabled in the SQL server for the following reports.
DBCC Information Reports - 211, 427, 610, 8440, 9100, 15612, 15615, 2509, 2510, 2514, 17557
Note: The minimum permission required for SQL server auditing is given in this link (under SQL server auditing
section).
Note: The time-zone selected must be the same as that of the IIS server. Also, EventLog Analyzer uses port 445
(TCP) to read IIS log files using the Server Message Block (SMB) protocol.
Troubleshooting steps:
1. Ensure that configuration log has been successfully configured. If not, you must configure it.
2. The device that has been configured must be enabled. This can be done in the Manage Devices tab.
3. Ensure that the Microsoft-IIS-Configuration/Operational option is enabled in the configure event source file for
the device. This option can be enabled in the Manage Devices tab.
4. The Configuration log monitoring credential provided must have the WMI access.
3. Add the service account user with read permission level and click on Share
5. Navigate to inetpub → logs → properties → Security → add the service account with read access permission.
(Note: The default location may vary)
Enter the name of the device or click on the + icon to choose from the list of discovered MySQL servers.
Enter the port number of the MySQL server.
Note: If the name of the MySQL server is manually entered, the port number has to be filled. For the MySQL servers
selected from the list of discovered servers, the port number will be filled in automatically.
Advanced Settings
To make changes to the time zone and file encoding, click on the Advanced button and choose the relevant option from
the drop downs provided.
The Secure Shell protocol is used to access the mysqld process to get the configuration file path.
The SFTP protocol is used to read configuration file.
WMI API is used to access mysqld.exe process to get the configuration file path.
SMB protocol is used to read the configuration file.
If the MySQL configuration file is not found with the mysqld or mysqld.exe process, then the following occurs:
/etc/my.cnf
/etc/mysql/my.cnf.
C:/Windows/my.ini
C:/Windows/my.cnf
C:/my.ini
C:/my.cnf
From the command line parameters and the configuration file, the MySQL server General log path and Error log path
are discovered.
Note: In Linux installations, MySQL server discovery on Windows devices is not possible.
Choose from the drop-down menu to add Configured devices, Workgroup devices, domain devices, etc.
To add new devices manually, click on Configure Manually and enter Log Source.
If the device type is Unix, check the Add as Syslog device box. If the device type is Windows, enter Username >
Password > Verify Credentials and click on Select.
Based on your selected device type, choose between Windows and Unix platform options. If you have
configured the log sources manually, the platforms will be automatically updated.
Click on Add to add the log source.
Reference: http://download.oracle.com/docs/cd/B28359_01/network.111/b28531/auditing.htm#CEGBIIJD
The AUDIT_SYSLOG_LEVEL parameter is set to specify a facility and priority in the format
AUDIT_SYSLOG_LEVEL=facility.priority.
facility: Describes the part of the operating system that is logging the message. Accepted values are user, local0–
local7, syslog, daemon, kern, mail, auth, lpr, news, uucp, and cron.
The local0–local7 values are predefined tags that enable you to sort the syslog message into categories. These
categories can be log files or other destinations that the syslog utility can access. To find more information about
these types of tags, refer to the syslog utility MAN page.
priority: Defines the severity of the message. Accepted values are notice, info, debug, warning, err, crit, alert, and
emerg.
The syslog daemon compares the value assigned to the facility argument of the AUDIT_SYSLOG_LEVEL parameter
with the syslog.conf file to determine where to log information.
For example,the following statement identifies the facility as local1 with a priority level of warning:
AUDIT_SYSLOG_LEVEL=local1.warning
See Oracle Database Reference for more information about AUDIT_SYSLOG_LEVEL.
2. Log in to the machine that contains the syslog configuration file, /etc/syslog.conf, with the superuser (root)
privilege.
3. Add the audit file destination to the syslog configuration file /etc/syslog.conf.
For example: assuming you had set the AUDIT_SYSLOG_LEVEL to local1.warning, enter the following:
Now, all audit records will be captured in the file /var/log/audit.log through the syslog daemon.
5. Restart the Oracle server so that the changes take effect.
Note: When logged in as SYSDBA/SYSOPER, Oracle database provides limited information on database
activity monitoring. Hence, to get the complete audit trail activities of Oracle database, we suggest that you
log in as a user with privilege other than SYSDBA/SYSOPER.
Auditing statements
DDL
You can audit DDL activities of a selected user in the database.
Note: To check the audit options that are enabled under any user, execute the statement given below.
Note: To check the audit options that are enabled under any object, simply execute the below statement.
Navigate to Settings > Log Source Configuration > Applications. You can also click on the +Add button on the
top-right corner of the Home page and select Application.
Next, select the General Application -> Add General Applications.
Choose the Application Type as Printer.
Expand the list by clicking the "+" icon to add a new device.
Choose from the drop-down menu to add Configured devices, Workgroup devices, domain devices, etc.
To add new devices manually, click on Configure Manually and enter Log Source.
If the device type is syslog, check the Add as Syslog device box. If the device type is Windows, enter Username
> Password > Verify Credentials.
Click on Select and Add to add the log source.
Note: If the print server device is a 64-bit Windows OS machine (i.e., Windows Vista and above), carry out the
following registry configuration:
Open the registry editor 'regedit' of the print server machine in the Command Line Window.
Navigate to Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\eventlog\
To create a new key, right click on eventlog, click new > key. You can name the key as Microsoft-Windows-
PrintService/Operational or Microsoft-Windows-PrintService/Admin or Microsoft-Windows-
PrintService/Debug as per your logging process requirement.
For instance, if you need to enable logging for the Operation process, create a new key with the
name Microsoft-Windows-PrintService/Operational.
This will convert the log type to 'Administrative' thus enabling you to perform searches and generate reports out of these
logs.
In order to obtain the document name, you have to enable the audit policy:
Navigate to Settings > Log Source Configuration > Applications. You can also click on the +Add button on the
top-right corner of the Home page and select Application.
Click on the General Application -> Add General Applications.
Choose Syslog Application as Application Type
Expand the list by clicking the "+" icon to add a new device.
Choose from the drop-down menu to add Configured devices, Workgroup devices, domain devices, etc.
To add new devices manually, click on Configure Manually and enter Log Source > Select and click on Add.
To gain more insights from Syslog Application logs, you can extract or create custom/new fields from the logs. Click
here to know more.
Devices that have Sysmon installed in them can be added as Sysmon Application to categorize the events into
different reports.
Navigate to Settings > Log Source Configuration > Applications. You can also click on the +Add button on the
top right corner of the Home page and select Application.
Click on the General Application -> Add General Applications.
Choose Sysmon Application as Application Type
Expand the list by clicking the "+" icon to add a new device.
Choose from the drop-down menu to add Configured devices, WorkGroup devices, domain devices, etc.
To add new devices manually, click on Configure Manually and enter Log Source.
If the device type is syslog, check the Add as Syslog device box. If the device type is Windows, enter Username
> Password > Verify Credentials.
In Search
Navigate to Search. You can search for Syslog Application logs by clicking the drop down box and scrolling down. You
will find a specific logtype categorization for Sysmon Application.
To gain more insights from Sysmon Application logs, you can extract or create custom/new fields from the logs. Click
here to know more.
Configuring Terminal Server: Open Event Viewer > Application and Service Logs > Microsoft > Windows >
TerminalServices-Gateway > Operational and right click and select 'Enable Log'. This will enable logging for the
corresponding 'Gateway' or 'Operational' processes. The logs can be viewed in Event Viewer.
Note: If the terminal server device is a 64-bit Windows OS machine (i.e., Windows Vista and above), carry out the
following registry configuration::
Open the registry editor 'regedit' of the Terminal Server machine in the Command Line Window.
Navigate to Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\eventlog\
To create a new key, right click on eventlog, click new > key. You can name the key as Microsoft-Windows-
TerminalServices-Gateway/Operational.
This will convert the log type to 'Administrative' thus enabling you to perform searches and generate reports out of these
logs.
ADAudit Plus
ADManager Plus
Endpoint Central
ADSelf Service Plus
ITOM Solution Products
Password Manager Pro
ServiceDesk Plus
These integrations help users receive debug, server, and security information, that can be analyzed and displayed as
actionable reports on EventLog Analyzer. Apart from this, integration with applications like Password Manager Pro
enables users to correlate activities that are tracked within Password Manager Pro like the sharing of passwords, and
events within Windows environment, like starting a remote sessions. This ensures early threat detection, mitigation and
response.
Through the integration with ManageEngine's Endpoint Central, IT teams can generate alerts from Endpoint Central logs
such as information on software and patches installed, policy modifications, and remote actions performed by
Endpoint Central administrators. The integration also facilitates administrators to conduct forensics, correlate logs from
both products, detect patterns, and run a response workflow to mitigate identified threats.
Note: Only access logs and debug logs are imported in import configuration
The supported products are:
ADAudit Plus
ADSelfServicePlus
ADManager Plus
OpManager
OpManager Plus
OpManager MSP
Firewall Analyzer
Netflow Analyzer
Network Configuration Manager
ServiceDesk Plus
Syslog Configuration
Configuring ManageEngine ADAudit Plus
Note: Only the ADAudit Plus user with admin tab and configuration setting privilege can enable integration with
EventLog Analyzer.
Note: For security reasons, only the ADManager Plus built-in admin can enable integration with EventLog Analyzer.
Note: For security reasons, only the ADSelfService Plus built-in admin can enable integration with EventLog
Analyzer.
Note: The following products from ManageEngine ITOM Solution support syslog integration with EventLog
Analyzer:
OpManager
OpManager Plus
OpManager MSP
Firewall Analyzer
Netflow Analyzer
Network Configuration Manager
For EventLog Analyzer to parse logs from OpManager, the message variables in the syslog profile of OpManager
should be entered in the following format:
ALARM_MESSAGE:$message
ALARM_ID:$alarmid
ALARM_CODE:$alarmid
ALARM_SOURCE:$displayName
ALARM_CATEGORY:$category
ALARM_SEVERITY:$stringseverity
ALARM_TRIGGER_TIME:$strModTime
ALARM_EVENT_TYPE:$eventType
Entity: $entity
Last Polled Value: $lastPolledValue
4. Click Next.
Criteria
Device Selection
Select the By Device option and select all the devices listed under Remaining Devices and click Next.
Schedule
Preview
Note: If the same machine is running two or more ManageEngine products, ensure the following:
Note: Only Endpoint Central users with admin tab and integrations setting privilege can enable the integration
with EventLog Analyzer.
Navigate to the Settings tab and click Applications under the Log Source Configuration menu.
Select ME Applications tab under Applications component.
Note: Kindly enable predefined alert profiles and correlation rules to use Data Enrichment.
Navigate to the Settings tab and click Applications under the Log Source Configuration menu.
Select ME Applications tab under Applications component.
DesktopCentralCloud.PatchMgmt.UPDATE,DesktopCentralCloud.PatchMgmt.read,DesktopCentralCloud.Common.read,DesktopCentralCloud.VulnerabilityMgmt.READ
Schedule the required interval to sync data.
Click Add to configure the chosen Endpoint Central Cloud application. Note: Ensure the credentials have
sufficient permissions to access APIs.
Note: Kindly enable predefined alert profiles and correlation rules to use Data Enrichment.
These comparators are available only after successful integration and can be used with device fields.
Click here to learn how to create custom correlation rules using vulnerability and misconfiguration comparators.
Click here to learn how to create custom alert profiles using vulnerability and misconfiguration comparators.
Approve Patches
Install Patches
Click here to learn how to create incident workflows utilizing these actions.
This solution provides you the capability to import log files. The supported log formats include Windows and syslog
device formats, application log formats and archived files log formats.
Note: To import .evt logs (Windows XP and Windows 2003), you will need to convert the .evt to .evtx using the
command wevtutil export-log application.evt application.evtx /lf in your EventLog Analyzer installation.
Note: You can view a preview of the selected log file and extract the desired fields, by clicking on the View
symbol of the attached log file and enabling the pop-up window option in your browser.
4. Click on the + button and OK to select the device that the log file is associated to. You can also enter the name of the
device or select the device from the pop-up that appears.
5. If you wish to store the imported logs for 2 days, enable the Store logs for a short term option. By default, the log
Note: You can view a preview of the selected log file and extract the desired fields, by clicking on the View
symbol of the attached log file and enabling the pop-up window option in your browser.
5. Click on the + button and OK to select the device that the log file is associated to. You can also enter the name of the
device or select the device from the pop-up that appears.
6. If you wish to store the imported logs for 2 days, enable the Store logs for a short term option. By default, the log
storage time-period is 32 days.
7. If you want to automate a log file import at regular time intervals, enable the Schedule log import option.
8. With the Schedule drop-down menu you can customize the time interval between each log file import.
9. Additionally, you can build a file name pattern for the imported log files, using the time format options given. The
name of the file stored at the specified time is updated in accordance to the file name pattern.
10. Click on Import.
5. Browse and select the key file from the device. You can refer to this link to learn how to generate a key file with ssh-
keygen, a standard component of Secure Shell protocol.
6. If the key file is passphrase protected, select the Use Passphrase checkbox and enter the phrase in the field below.
7. Browse and select the Associated Device.
8. The Store Logs for Short-term option will store the imported log data in EventLog Analyzer for a brief period of two
days. If the option is left unchecked, the logs will be stored as per your database retention configuration.
9. If you would like to automate a log file import at regular time intervals, enable the Schedule Log Import option.
10. With the Schedule drop-down menu, you can customize the time interval between each log file import.
11. Additionally, you can build a Filename Pattern for the imported log files using the time format options given. The
name of the file stored at the specified time will be updated in accordance to the file name pattern.
12. Click on Import to save the configuration.
In the Cloud tab, click the link displayed to configure the AWS account.
Once the AWS account gets added, it will be displayed in the drop-down list available in the Cloud tab.
From the drop-down list, select the AWS account and then the S3 bucket from which logs are to be imported.
Click Import to initiate log importing.
For example, consider an application which writes logs on a date-based schedule. Lets take the file name generated on
Nov 22, 2023, as LOG_22_11_2023. Here the first part, "LOG_", will remain constant, and the latter part, i.e. the date
"22_11_2023" changes daily. Keeping this in mind, select the pattern as "LOG_${DD}_${MM}_${YYYY}" from the drop
down menus.
The drop down menu will provide multiple options to choose from as shown in the GIF below.
Open the my.cnf file (in case of Linux) or my.ini file (in case of Windows) and add the below entries to the file.
For error logs: log_error=<error-log-file-name>
For general logs:
>= v5.1.29:
general_log_file=<general-log-file-name>
general_log=1 (or) ON
< v5.1.29:
log=<log-file-name>
Restart the MySQL instance for the changes to take effect.
To import MySQL logs in EventLog Analyzer,
You can import MySQL log files from a local path, a shared path , or a remote path.
To import MySQL log files, you need to manually choose the log format. Once you've selected the right file, select
MySQL Logs from the Log Format drop-down list in the Selected File(s) section.
Click Import to initiate the log importing process.
The default format of PostgreSQL logs is '%m [%p] ' which logs a time stamp and the process ID.
The log_line_prefix parameter must follow the format(key- value pair) given below in the postgresql.conf file.
log_line_prefix format:
log_line_prefix = 'time_stamp=%m or %t process_id=%p application_name=%a database_name=%d
connection_from_with_port=%r connection_from=%h session_id=%c transaction_id=%x user_name=%u command_tag=%i
sql_state_code=%e session_start_time=%s '
Process ID process_id %p
Session ID session_id %c
Transaction ID transaction_id %x
rsau/enable = 1
rsau/local/file = <log location>/audit_00
Note: The user should have permission to read this audit file while importing.
For Windows:
Note: Once you share the DHCP log location in Windows (i.e. %windir%\System32\Dhcp), you can automatically
use this UNC path to fetch and import logs to EventLog Analyzer on a daily basis.
For Linux:
The default DHCP log location in Linux is "var/log/syslog" OR "var/log/messages" (for older versions).
If DHCP server logs are not available on the above files, please follow below steps. To store the DHCP server logs alone in
a separate file, an admin would have to make changes to the following configuration files:
Note: Replace the given paths with the paths of your choice for data path and archive path respectively.
> db2audit configure scope all status both error type normal
Note: Replace the given parameters with the parameters of your choice.
Now the logs will be generated for the DB2 instance in the given data path.
Run the following command to create an audit policy for the database:
Note: Replace policy_name with the name of the audit policy that you created.
Now the logs will be archived to a new file with a timestamp appended to the filename. An example of the filename is
given below.
Both files have to be extracted into a human-readable format to be imported into EventLog Analyzer.
Note: Replace the instancelog with the filename of your choice. Replace
db2audit.instance.log.0.20060418235612 with the filename of the archived instance logs.
Both files will be extracted to the given archive path and can be imported into EventLog Analyzer.
Run the following command to find the location of the diagnostic log file.
or
or
Note: The path corresponding to Current member resolved DIAGPATH is the path to the diagnostic log file.
Navigate to the specified path and import the file named db2diag.txt to EventLog Analyzer. Here is a
comprehensive guide on how to import log files in EventLog Analyzer.
You can create a custom field by clicking on the tools icon at the top-right corner of your log message. Follow the
steps given in this page to use custom patterns for logs.
You can see the created custom fields on the left pane.
Finally, click Save.
While importing the log files in the Combined log format, the log files will not include the values for the fields response
time and bytes received.
The following widgets in the Apache Overview dashboard can display their values accurately only if the response time
and bytes received fields are parsed.
1. Bytes Transferred
2. Top 20 Slowest URLs
3. Web Activity Trend
4. Top 10 Slowest Servers
The modified log format containing the parameters for response time and bytes received is:
%{ms}T - time taken to serve the request (in milliseconds) %I - bytes received, including headers
The modified log has 2 directives in addition to the commonly used Combined Log Format. These directives are present
at the end of the format, therefore, the combined log format will continue to be parsed as it was parsed in the previous
versions.
Note: The configuration files by default are located at /etc/apache2/ in Debian/Ubuntu/Linux Mint or,
/etc/httpd/conf on Red Hat/Fedora/CentOS
2. The label can be used to reference the new format string as the customLog directive.
3. The new format will go into effect when the webserver is restarted.
After the log files have been imported, the updated Apache Overview dashboard has been displayed below:
After five minutes you can view the reports rolling out for the AWS instance.
Note:
Install one agent on each AWS Windows server instance.
You should not associate other AWS server instances with an AWS agent.
Note: Please take a note of the default port numbers used for the different protocols.
Follow the steps below to configure log forwarding to EventLog Analyzer server based on the Syslog Service used.
1. Add the required entries in the configuration file based on protocol. Restart the syslog daemon service to apply the
changes
syslogd
File path: /etc/syslog.conf
UDP:
> *.*<space/tab>@<eventloganalyzer_server_name>:<port_no>
rsyslogd
File path: /etc/rsyslog.conf
UDP:
> *.*<space/tab>@<eventloganalyzer_server_name>:<port_no>
TCP:
> *.*<space/tab>@@<eventloganalyzer_server_name>:<port_no>
TLS:
Note: Please check the prerequisites before appending the entries mentioned
syslog-ng
File path: /etc/syslog-ng/syslog-ng.conf
<source_name> can be found from existing configuration of source with system(); and internal();
calls in the syslog-ng.conf file
source s_src {
system();
internal();
};
UDP:
TCP:
>
destination d_eventloganalyzer { network(<eventloganalyzer_server_name> port(<port>) transport("tcp")); };
log { source(<source_name>); destination(d_eventloganalyzer); };
TLS:
Note: Please check the prerequisites before appending the entries mentioned
>
destination d_eventloganalyzer { network(<eventloganalyzer_server_name> port(<port>) transport("tls") tls(key-file("/path/to/private.key") cert-file("/path/to/certificate.crt") ca-dir("/path/to/ca/directory"))); };
log { source(<source_name>); destination(d_eventloganalyzer); };
2. Save the configuration and restart the Syslog daemon using the below command
or
Note:
The above configuration will only enable forwarding the machine logs to the EventLog Analyzer server.
To configure auto log forwarding from EventLogAnalyzer server using sudo or non sudo user, refer here.
Prerequisites:
Enable HTTPS and configure a valid certificate in server.xml. Click here to know how to configure a
valid SSL certificate.
Only pfx format is supported for storing certificate, if you use keystore format, please convert it to pfx.
Note:
1. If you want to use a different port other than the default ports as specified above, please specify it in the port
management settings.
2. The CommonName should be the same value as given in the certificate file.
$InputFileName /var/log/sample.log
$InputFileStateFile sample
$InputFileSeverity info
$InputFileFacility local6
local6.info @eventloganalyzer-Server:514
Note:
1. These instructions can be applied to all Linux devices.
2. Please use a unique <State_Filename> for different <Monitored_File_Absolute_Path>.
3. When forwarding audit logs, sometimes default policies in Red Hat systems with Security enhancement
(SElinux) won't allow the audit logs to be read. Refer troubleshooting tips.
For Ubuntu:
For other Linux distros kindly refer the official website for package installation.
Example:
Please follow the instructions below to give restart privilege for the syslog/rsyslog service for non-sudo user:
Example:
visudo -f /etc/sudoers.d/testuser
testuser ALL=NOPASSWD: /usr/sbin/service rsyslog restart
Note: The acl package must be installed. Before that the filesystem is mounted with the acl support. For more
details, kindly refer the official documentation [ ref ].
Note: Ensure that the EventLog Analyzer server IP address is reachable from the MAC OS device.
where <ela_server_name> is the name of the machine where EventLog Analyzer is running. Ensure that there is only
a tab separation in between *.debug and @<ela_server_name>.
Neither vSphere Client nor vicfg-syslog can be used to configure syslog behavior for an ESX device. To configure syslog
for an ESX device, you must edit the /etc/syslog.conf file.
On ESXi devices, you can use the vSphere Client or the vSphere CLI command vicfg-syslog to configure the
following options:
1. Log file path: Specifies a datastore path to the file where syslogd logs all messages.
2. Remote host: Specifies a remote device to which syslog messages are forwarded. In order to receive the
forwarded syslog messages, your remote host must have a syslog service installed.
3. Remote port: Specifies the port used by the remote host to receive syslog messages.
Configuration using vSphere CLI command: For more information on vicfg-syslog, refer the vSphere
Command-Line Interface Installation and Reference Guide.
Configuration using vSphere Client:
5. In the Syslog.Local.DatastorePath text box, enter the datastore path to the file where syslog will log
messages. If no path is specified, the default path is /var/log/messages.
The datastore path format is [<datastorename>] </path/to/file> where the path is relative to the root of the
volume backing the datastore.
6. In the Syslog.Remote.Devicename text box, enter the name of the remote host where syslog data will be
forwarded. If no value is specified, no data is forwarded.
7. In the Syslog.Remote.Port text box, enter the port on the remote host where syslog data will be forwarded.
By default Syslog.Remote.Port is set to 514, the default UDP port used by syslog. Changes to
Syslog.Remote.Port only take effect if Syslog.Remote.Devicename is configured.
8. Click OK.
3. Configure the switch as below (here, we have used Catalyst 2900) to send the logs to the EventLog Analyzer server:
We can also configure logging facility and trap notifications with the below commands:
Note: The same commands are also applicable for Cisco Routers.
Please refer Cisco® documentation for detailed steps on configuring the Syslog service in the respective routers or
switches. Contact [email protected] if the Syslog format of your Cisco devices are different
from the standard syslog format supported by EventLog Analyzer.
Name: Specify the name which uniquely identifies the Syslog server.
Host: Specify the IP address/hostname of Syslog server.
Port: Specify the port number of Syslog server.
Facility: Select any facility that is configured on your Syslog server.
Severity: Select any Severity that is configured on your Syslog server.
Tag: Specify tag name that you want to appear with the Syslog message.
Note: From Version 6.3 and above, make sure to enable timestamping in the RFC 5242 format in Firepower Threat
Defense for collecting syslogs along with their timestamps.
Use a web browser to connect to the SonicWall management interface and login with your username
and password.
1. Click on the Log button on the left menu. This will open a tabbed window in the main display.
2. Click on the Log Settings tab.
3. Under Sending the Log, enter the IP address of the machine running the Kiwi Syslog Server into the field Syslog
Server 1. If you are listening on a port other than 514, enter that value in the field Syslog server port 1.
4. The Syslog ID must be firewall for the effective parsing of firewall logs.
5. Under Automation, set the Syslog format to Enhanced Syslog.
6. Under Categories > Log, check all the types of events that you would like to receive Syslog messages for.
7. Click on the Update button.
host ela-server{
any any;
port 513;
}
This will forward the log data in standard format. You can customize the syslog severity level by editing the
command.
5. For structured logs, mention 'structured-data' in the command line. Consider the following command.
host ela-server{
any any;
port 513;
structured-data;
}
Note: Under "Syslog Server Profile" -> "Custom Logformat" all "Log Type" must be "default"
Configure the following settings and then select OK to create the syslog server.
IP address (or FQDN) Enter the IP address or FQDN of the EventLog Analyzer.
Syslog Server Port Enter the EventLog Analyzer's port number. The default port is 514.
3. Use the following CLI commands to send Fortinet logs to the Eventlog Analyzer server.
> Netscreen > set syslog config <ip address> facilitates local0 local0
Netscreen > set syslog config <ip address> port 514
Netscreen > set syslog config <ip address> log all
Netscreen > set syslog enable
Note: At the moment, only the Malwarebytes Management Console (MBMC) is supported.
Once the threat source is added, EventLog Analyzer will start parsing the fields in the logs. This log data can now be
viewed in the form of reports.
1. In the EventLog Analyzer console, navigate to Settings > Log Source Configurations > Applications > Security
Logging can be enabled in Dell switches by entering the following commands in the command prompt.
Command Parameters
Note: For more information, kindly refer to the documentation of your Dell switch.
Open a web browser and navigate to the NGAF's management IP address. Login using your administrator
credentials.
2. Navigate to System > Logging Options
3. Check all Syslog checkboxes under Log Location for the type of logs to be forwarded.
4. In Syslog Server tab, enter the IP address of EventLog Analyzer server and port (514), which is EventLog Analyzer's
syslog listener port, in the respective boxes.
5. Click OK to apply changes.
For NGAF version 6.4 and below:
1. Access the NGAF Web Interface.
Open a web browser and navigate to the NGAF's management IP address. Login using your administrator
credentials.
2. Navigate to System > Logging Options > Syslog
3. Check Enable Syslog checkbox.
4. Enter the IP address of the EventLog Analyzer server and port (514), which is EventLog Analyzer's syslog listener
port, in the respective boxes.
Open a web browser and navigate to the IAM's management IP address. Login using your administrator
credentials
2. Navigate to System > General> Advanced > Syslog Server.
Example:
$kato config set logyard drainformats/systail-ela-local[{<13>{{.Text}}]
By default, EventLog Analyzer uses 513 and 514 as default UDP ports. In case you have changed the UDP port
number, specify the same here.
Logyard will now drain all logs in the format name as specified to EventLog Analyzer's UDP port number as given.
EventLog Analyzer can now collect all the stackato logs as syslogs and analyze them with special reports.
Dashboard tab
The Dashboard tab contains multiple dashboards that give you insights into important network activities. The below
dashboards are present by default when you click on the Dashboard tab:
Events Overview
Network Overview
Security Overview
VPN Overview
Incident Overview
Events Overview
This tab presents a high-level overview of security events by generating graphical reports such as Logs Trend, Syslog
Severity Events, Windows Severity Events, and Recent Alerts. These reports are generated for events that occur in a
specific time frame (which can be customized). Hovering your mouse pointer over the charts or graphs will give you
information about the Event Count of a particular device, its IP address, and the Severity of the event (Information,
Notice, Debug, Warning, Alert, Error, Critical, and Emergency).
Network Overview
This tab gives you information about network traffic in your environment. It provides details on the traffic trend, allowed
and denied network connections, and more to help you track events of interest.
Security Overview
The security overview dashboard consolidates events from network devices such as IDS/IPS, endpoint security
The dashboard also contains the Alerts Count Overview widget that displays the number of alerts triggered in a given
time frame.
VPN Overview
You can customize the Dashboard tab to include the VPN Overview tab by navigating to Settings → Add Tab → VPN
Overview. EventLog Analyzer monitors VPN session activities and generates reports to help you visualize events of
interest. The VPN Overview dashboard will give you insights on VPN user and session activities by displaying widgets
such as Live Sessions Count, Total Logon Hours, Average Login Time, Closed Sessions, and Top Users and Status. You
can also customize the VPN dashboard by adding and reordering widgets by navigating to Settings → Add Widgets
and Settings → Reorder Widgets respectively.
Incident Overview
This tab helps you effortlessly manage the security incidents detected. The dashboard gives you the count of all, active,
unassigned and overdue incidents. It also provides the mean time to resolve. The dashboard provides insights such
as:
Note: mean time to resolve refers to the average time taken to resolve an incident.
Devices
Applications
File Integrity Monitoring
Devices
The Devices section displays the entire list of systems (Windows, Linux, IBM AS/400, HP-UX, etc.) and devices (routers,
switches, etc.), from which EventLog Analyzer is collecting logs. The device list displayed is categorized based on the
Device group selected from the drop-down list (default: All Groups). You can add a new device (+Device), or add and
schedule new reports (+Schedule) from this section. You can search for a particular device based on its IP Address or
Device Name, delete a device or set of devices, and disable/enable log collection from a particular device or set of
devices.
The device list table displays details like device type, event summary (error, warning, failure, others), connection status
of the device, time when the last log message was fetched, and device group to which the device belongs. Moving the
mouse over any device brings up some options:
You can even customize the columns you would like to display in the device table by clicking the column selector icon or
increase the number of devices that are displayed per page (from a minimum of 5 devices per page to a maximum of
200 devices per page). Using the drop down menu, you can list out only the Active devices or Enabled devices and
have the option to exclude synced devices from Active Directory Audit Plus.
Scheduled Reports
Applications
The Applications section provides an overview pie-chart (which can be drilled down to raw log information) and lists the
devices from which application logs for IIS W3C Web Servers, IIS W3C FTP Servers, MS SQL Servers, Oracle Live Audit,
DHCP Windows/Linux Servers, Apache Web Servers or Print Servers, have been received or imported into EventLog
Analyzer. The device list displayed is categorized based on Application Type selected from the drop-down list.
Applications logs can be imported into EventLog Analyzer by selecting +Import from the Actions drop-down list.
The application device list displays details like device name, application type, total events, recent records, time
imported, start time and end time. Click on the device name or the corresponding section in the pie chart to get the
complete overview of the application event data, and generate corresponding reports. You can even customize the
columns you would like to display in the application device table by clicking the column selector icon.
At the top of this dashboard, you can find the Manage File Integrity Monitoring tab which allows you to add, delete, and
manage devices for File Integrity Monitoring. The FIM Alert tab allows you to configure alerts for anomalous file and
folder modifications. The FIM Scheduled Reports tab helps you view and export scheduled reports.
Settings icon
The settings icon displays multiple options to customize all dashboards by adding, managing, and ordering the
widgets and tabs that are displayed. You can also refresh the changes made to the time frame in the product using the
Refresh Interval option.
Reports tab
This tab displays a dashboard that contains reports for all events taking place in your network. At the top left corner, you
can find a drop-down menu that allows you to choose and view reports based on Devices, Applications, File
Monitoring, Threats, Vulnerability, and Virtual Machines. You can also view Custom Reports, User Based Reports,
and Top and Trend reports by clicking on the required option from this drop-down menu. The Export As drop-down
menu enables you to export reports in either the CSV or PDF formats. You can schedule reports by clicking on the +Add
option present in the Schedule Reports tab.
On the left pane, you can find multiple pre-defined reports that are automatically generated when log sources are
added to EventLog Analyzer. You can also create custom reports by clicking on the Manage Reports tab present at the
lower-left corner of the screen. The Scheduled Reports tab allows you to view existing scheduled reports and export
them as and when needed.
Compliance tab
The Compliance tab provides the set of canned reports as required by various compliance policies, namely, FISMA,
PCI-DSS, SOX, HIPAA, GLBA, GPG, and ISO 27001:2013. The +Add option allows you to create and select the reports
required for a new compliance policy of your choice. The Edit option allows you to customize the reports available under
each compliance policy.
Search tab
The Search tab provides two options to search the raw logs: Basic Search or Advanced Search. The search result is
displayed in the lower half of the page and the final search result can be saved as a report (in PDF or CSV format) and
can also be scheduled to be generated at predefined intervals and be automatically mailed to a set of configured users.
You can use Basic search if you are interested in manually constructing the search query. Here you can use phrase
search, Boolean search, grouped search, and wild-card search to build your search query. You can use Advanced
search to interactively build complex search queries easily with field value pairs and relational operators. New fields
can be extracted from the search result and regular expression (regex) patterns can be constructed to easily identify,
parse and index these fields in new logs received by EventLog Analyzer.
Alerts tab
This tab displays the number of Active Alerts in the dashboard along with their severities. You can view tabulated
information about the alerts, their time of generation, the status, and their corresponding response workflow (if
configured) in the dashboard.
Settings tab
This section allows you to configure EventLog Analyzer as per your requirements. It has three sub-sections as given
below:
Configuration Settings
This section allows you to Manage Devices, Device Groups, Application Sources, Import Log Data, Threat Sources, File
Integrity Monitoring, Vulnerability Data, FIM Templates, and vCenter. You can also configure threat management and log
forwarding from this section.
Admin Settings
This section allows you to perform various administrative activities by managing Alert Profiles, Archives, Technicians
and Roles, DB Retention Settings, Log Collection Filters, Working Hour Settings, Product Settings, Log Collection Failure
Alerts, Dashboard profiles, Privacy Settings, Logon Settings, Domain and Workgroups, Report Profiles, Resource
Grouping, Custom Log Parsers, Tags, and Log360 Cloud platform.
System Settings
This section can allow you to configure various settings including Notification Settings, System Diagnostics, Database
Access, Re-branding, NT Service, Connection Settings, and Listener Ports.
Add tab
This tab allows you to easily add log sources from Devices and Applications. It also has the provision to let you import
logs from other sources. You can add Alert Profiles, Log Filters and create custom Reports from this tab.
Dashboard tabs:
The EventLog Analyzer dashboard comes with the following default subtabs:
Events Overview
Network Overview
Security Overview
Events Overview
This tab presents an overview of various security events monitored by EventLog Analyzer. The widgets in this dashboard
provide insights on the various critical events generated in the network during the specified time frame.
This widget presents the total number of Syslog events collected during the
Syslog
given time frame. Furthermore, the pie chart splits the syslog events into
Events
warning, error and critical events.
This widget provides a count of all the enabled devices from which log data is
being collected. The server image in the corner will have a green tick if all logs
are being collected successfully. A warning icon indicates that logs aren't
All being collected from some of the devices. Additionally, this widget has a View
Devices All Devices link. Clicking on the link will redirect you to the device dashboard
page which will provide detailed information of each device. Clicking on All
Device will take you to the Devices tab from where you can create a new list of
Scheduled Reports
Widget
Function Widget image
Name
This widget presents a time-based log count trend of all events/logs ingested
into EventLog Analyzer. The X-axis represents the time range, which is based
Logs Trend on the calendar range you choose. If you choose the time range as less than
24 hours, then the graph will present you with hourly log trend data. The Y-
axis represents the Event Count.
Top 5
This widget presents the top 5 devices based on event count.
Devices
Security This widget shows a summary of various security events such as Logon,
Events Account Logon, Account Management, and Object Access.
Windows
This widget displays a graph in which the X-axis represents the Severity of a
Severity
Windows Event and the Y-axis represents the Event Count.
Events
Syslog
This widget displays a graph in which the X-axis represents the Severity of a
Severity
Syslog Event and the Y-axis represents the Event Count.
Events
Top 5 File
This widget presents a 3D graph which displays the details of the top 5 file
Integrity
servers based on the log count. Each row contains additional data of various
Monitoring
file based events.
Events
Application This widget displays a pie chart of the top 10 applications like IIS, DHCP etc
Events based on event count.
Network Overview
This tab gives an overview of various network-related events monitored by EventLog Analyzer by generating graphical
reports. The widgets in this dashboard provide insights on the various critical events generated in the network during
the specified time frame.
This widget presents the count of all the connections that were allowed
Allowed by the network device. The pie chart highlights the allowed connections
Connections from the total number of connections that occurred in the network
during the specified time period.
This widget presents the count of all the connections that were denied
Denied by the network device. The pie chart highlights the denied connections
Connections from the total number of connections that occurred in the network
during the specified time period.
Network This widget provides a total count of network devices that are added for
Devices monitoring.
This widget presents a 3D graph that shows a time based trend of allowed traffic
and blocked traffic. The X-axis represents the time range. It will be based on the
calendar range you choose. If the calendar range is less than 24 hours, then this
Traffic Trend
will show hourly ranges. If it is less than 1 hour, it will show 1 minute ranges. If it is
less than 30 days, it will show 1 day ranges. If it is more than 30 days, it will show
1 month ranges. The Y-axis represents the Event Count.
Top Network
Devices This widget displays the top 10 network devices based on the log count. Each
Based On row is further split into allowed traffic and blocked traffic.
Traffic
Top 5
Denied
This widget displays the top 5 sources for which connections were denied.
Connections
by Source
Recent
This widget shows the recent interface status for each interface in each network
Interface
device. The red downwards arrow indicates that the interface is down. The green
Status
upwards arrow indicates that the interface is up.
Changes
Top
This widget categorizes the top 10 websites accessed based on the number of
Websites
times the site was accessed.
Accessed
Top VPN
Logons by This widget lists the top 10 users based on VPN logons.
User
Security Overview
This tab provides an overview of the key security events monitored by EventLog Analyzer. The widgets in this dashboard
provide insights on the various critical events generated in the network during the specified time frame.
Correlative This widget refers to the number of incidents detected via EventLog
Incidents Analyzer's correlation engine.
This widget presents the total number of threats detected during the
Threats
chosen time frame from the Threat Sources (such as Symantec,
Detected
McAfee, Malwarebytes etc) added in the EventLog Analyzer.
This widget presents the total count of IDS/IPS events during the
IDS/IPS
chosen time frame.
Threats
detected by
This widget displays the count of threats detected by "Advanced
Advanced
Threat Analytics" feature in EventLog Analyzer.
Threat
Analytics
Recent
This widget displays the most recent 50 threats based on
Threats
the calendar range.
Identified
Top Affected
This widget shows the Top 5 endpoint devices in which
Endpoints
threats were detected by Threat Sources (Symantec,
from Threat
McAfee, etc)
Sources
In addition to the above, predefined templates are also available for dedicated monitoring of Cisco, IIS and SQL Server
Devices.
To customize the dashboard according to your preferences, the following options are available to you:
In EventLog Analyzer's dashboard, click the icon on the top-right corner and select Add Tab.
In the pop-up box that appears, you can see the following:
1. Three default tabs: Events Overview, Network Overview, and Security Overview
2. Three predefined templates: Cisco Overview, IIS Overview, and SQL Server Overview
3. Add Custom Tab option
Click Add Custom Tab. Enter a name for the tab in the given field and click Add.
Navigate to the new tab in your dashboard and click Add Widget to start adding widgets of your choice.
If you want to add an existing report as a widget, click here to know how.
In EventLog Analyzer's dashboard, navigate to the tab to which you want to add a new widget and click the
icon on the top-right corner.
Click Add Widget. In the pop-up box that appears, select the widget, widget type, chart type, chart color, and
enter a display name for the widget.
You also have the option of pinning a report as a new widget. To know how, click here.
In EventLog Analyzer's dashboard, click the icon on the top-right corner and click Manage Tabs.
In the Manage Tab dialog box that appears, click the icon corresponding to that tab that you want to delete.
In the pop-up confirmation box, click Yes to complete the deletion of the tab
In EventLog Analyzer's dashboard, click the icon on the top-right corner and click Manage Tabs.
Click the icon and drag and drop the tabs in the order of your choice.
In EventLog Analyzer's dashboard, navigate to the tab whose widgets you want to reorder, click the icon on
the top-right corner and click Reorder Widgets.
Click and drag the widgets wherever you want to place them.
You can also resize widgets by dragging them from their bottom-right corner and adjusting their sizes as
required.
Click on the Save button present on the top-right corner.
In EventLog Analyzer's dashboard, click the icon corresponding to the widget that you want to edit.
Select Edit Widget. Update the necessary information and click Update.
In EventLog Analyzer's dashboard, click the icon corresponding to the widget that you want to delete.
Select Delete Widget and click Yes in the pop-up box that appears.
In the full screen view, you can view a slideshow of the tabs by clicking the play icon located at the top of the
screen.
You can switch to different tabs by clicking on the drop-down button located at the top of the screen.
You can also remove a particular tab from the slideshow by clicking the toggle button next to the name of the tab
in the drop-down list.
You can also switch to dark mode by clicking the toggle button at the top-right corner of the screen.
To go back to the normal viewing mode, click the icon.
To refresh a particular widget, in EventLog Analyzer's dashboard, click the icon on the top-right corner of the widget.
In EventLog Analyzer's dashboard, click the icon on the top-right corner and click Refresh Interval.
In the pop-up box that appears, select the refresh interval—Never, 30 Secs, 1 Min, 5 Mins, 10 Mins, and 1 Hr.
Note: If you choose Never for the refresh interval, the dashboard will never be refreshed automatically. You will
have to refresh it manually.
Check out our video for a step by step demonstration of customizing the EventLog Analyzer dashboard here.
To embed a widget,
This will display a table containing all the Active Dashboard Links.
A window will appear allowing you to modify the properties of the chosen link. Make the necessary changes.
It helps the security analysts by providing supplementary information like live logs being received, and the details
related to the server such as server-name,TCP ports and IP address where EventLog Analyzer is set up. (Refer Fig 1)
Syslog Viewer
The Syslog Viewer tab showcases real-time logs that are currently being forwarded to the EventLog Analyzer server
through the default ports (513, 514).
Note:-
The list shows the live packets being received at the specified port in your machine. This does not
guarantee that EventLog Analyzer has received the Syslog packets.
The Log Receiver will listen for logs for up to three minutes or until 1000 packets are received. After
reaching this limit, the Log Receiver requires a manual restart to resume listening. Click on Start Listening
to resume the process. The option to restart is available under the Syslog Viewer tab.
Point 2 - Apply
Interface - It showcases all available network interfaces on the EventLog Analyzer server machine. To examine
live logs for a specific interface, you can choose it from the dropdown box. Otherwise, it can be left as "All."
IP - To verify whether logs from a specific device are received on the server machine, enter the IP address of the
machines forwarding logs to EventLog Analyzer. For multiple devices, input their IP addresses with comma-
separated values. To check for all devices, leave the field blank.
Port - Specify the ports to which the logs are being forwarded to the EventLog Analyzer Server.The logs are
forwarded to the EventLog Analyzer Server by default on ports 513 or 514.
Protocol - You can specify the protocol as either UDP or TCP.
Click "Apply" to verify the logs received by the EventLog Analyzer server. The logs will be presented with details such as
source IP, destination IP, port, and accompanied by the respective messages.
Server Details
Server Details displays comprehensive information regarding EventLog Analyzer, including server name, IP, Access
URL, Port details, Log flow, and more. The details regarding the mentioned fields are provided below. (Refer Fig 3)
1. Server Name - The name of the current server or machine where EventLog Analyzer is installed.
2. Server IP Address - It indicates the network adapter linked to EventLog Analyzer; if none is specified, it displays "All
Interface."
3. Application Access URL - The URL utilized for accessing the EventLog Analyzer application.
4. UDP ports - The UDP ports configured in EventLog Analyzer that are either in a listening state or have encountered
failures.
5. TCP ports - The TCP ports configured in EventLog Analyzer that are either in a listening state or have encountered
failures.
6. TLS ports - The TLS ports configured in EventLog Analyzer that are either in a listening state or have encountered
failures.
7. SNMP Traps Port - The SNMP Trap ports configured in EventLog Analyzer that are either in a listening state or have
encountered failures.
8. Server Status - The current status of EventLog Analyzer
9. Flow Rate - The log flow per second for the past hour.
10. Received - The log flow for the previous hour.
11. Current hour log rate - Displays the log flow per second for the current hour.
12. Total Packets Received - Total logs received for the current hour
For instance, to search for reports related to Windows, type "Windows" in the global search bar. All relevant Reports, and
Settings will be displayed in the search screen. This feature can also provide quick access to particular compliance
mandates such as HIPAA and PCI-DSS.
To search for a report or a particular setting, click on the search bar in the top right corner of the screen. You can also use
the keyboard shortcut Ctrl+Space to access Global Search.
Recent Searches:
The Recent Searches section displays recent searches for each tab in the Global Search feature.
Frequent Searches:
The reports can be accessed from the Reports tab of the UI. The event counts shown in the reports can be drilled down
to the raw logs. The logs can be further filtered based on various log fields. EventLog Analyzer also allows you to
schedule reports to be automatically generated and emailed periodically.
Types of reports
EventLog Analyzer offers a wide category of reports. Some of them are listed below.
Windows
The Windows reports allow you to get an overview of the events happening in your Windows environment. A few
examples are given below:
Unix
The Unix reports allow you to get an overview of the events happening in your Unix environment. A few examples are
given below:
Applications
The application reports allow you to get an overview of the events happening in the applications installed in your
network. ManageEngine EventLog Analyzer supports a wide range of applications including Terminal Server, DHCP
Windows and Linux Servers, MS IIS W3C FTP Server, MS IIS W3C and Apache Web Servers, MS SQL and Oracle
Database Servers, Sysmon, and Print Server. These reports also help you to identify the performance and security
status of the above applications.
Network Devices
The network devices reports allow you to get an overview of the events happening in your networking devices. A few
examples are given below.
Custom Reports
The custom reports that you have created will be listed in this section.
In this help document, you will learn to set up Windows report generation.
There are certain reports, mentioned in the table below, that will require manual creation of keys in your Windows
Registry. To set up the generation of these reports, follow the steps given below.
Please make sure event logging has been enabled by right clicking on the event source > Properties >
checking the Enable logging box, in Event Viewer.
Open the Registry Editor and navigate to HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Service >
EventLog. Here, create the keys given in the New keys column of table below.
Next, open Local Group Policy Editor and navigate to Computer Configuration > Windows Setting > Security
Setting. Further paths and steps to enable the generation of reports are given in the Audit policies column.
To Enable Windows Firewall logs, execute the below commands in the target device from where the logs are to be collected.
Enable Audit
Handle
Manipulation,
Audit
Removable
Storage and
Audit File
System
Removable (required for To start logging removable storage events, navigate to
Microsoft-Windows-DriverFrameworks-
Disk auditing Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Storage and set the registry key
UserMode/Operational
Auditing delete HotPlugSecureOpen to 1.
operation in
NT Version
6.2), under
Advanced
Audit Policy
Configuration
> Object
Access.
Windows
No
Backup &
Microsoft-Windows-Backup modification
Restore
required.
Reports
Microsoft-Windows-
GroupPolicy/Operational
Microsoft-Windows-
NetworkProfile/Operational
Microsoft-Windows-
WindowsUpdateClient/Operational
Microsoft-Windows-
Winlogon/Operational
Windows Microsoft-Windows-WLAN- No
System AutoConfig/Operational modification
Events Microsoft-Windows-TerminalServices- required.
Gateway/Operational
Microsoft-Windows-TerminalServices-
RDPClient/Operational
Microsoft-Windows-TerminalServices-
RemoteConnectionManager/Operational
Microsoft-Windows-Wired-
AutoConfig/Operational
Microsoft-Windows-Hyper-V-Worker-
Admin
Microsoft-Windows-Hyper-V-VMMS-
Storage
Microsoft-Windows-Hyper-V-VMMS-
Networking
Microsoft-Windows-Hyper-V-VMMS-
Admin
Hyper-V
Microsoft-Windows-Hyper-V-Hypervisor-
Server
Operational No
Events
Microsoft-Windows- Hyper-V-Config modification
Hyper-V VM
required.
Management Microsoft-Windows-Hyper-V-High-
Reports Availability
Microsoft-Windows-Hyper-V-Hypervisor
Microsoft-Windows-Hyper-V-Integration
Microsoft-Windows- Hyper-V-SynthFC
Microsoft-Windows-Hyper-V-SynthNic
Microsoft-Windows- Hyper-V-SynthStor
Microsoft-Windows- Hyper-V-VID
Microsoft-Windows- Hyper-V-VMMS
Program No
Microsoft-Windows-Application-
Inventory modification
Experience/Program-Inventory
Reports required.
No
IIS Microsoft-IIS-Configuration/Operational modification To access IIS reports, open EventLog Analyzer and navigate to Reports > IIS W3C web server > IIS Admin Configuration Reports
required.
Microsoft-Windows- No
Print service PrintService/Operational modification
Microsoft-Windows-PrintService/Admin required.
No
Microsoft-Windows-TerminalServices-
Terminal modification
Gateway/Operational
required.
EventLog Analyzer will now start generating the reports mentioned in the table.
To change the order of devices, hover the mouse pointer on the space to the left of the device name. A icon
will appear.
Use the icon to drag and drop the devices in the required order.
You can also enable or disable reports by clicking on the toggle button under the Enable/Disable Format
column corresponding to the required device.
Similarly, you can also rearrange the reports inside each report group by clicking on the report group and
following the steps mentioned above.
If no devices are configured in a category, you can disable it from the reports page using the "Disable Category"
button available in the top right corner.
In this help document, you will learn to perform the following operations.
Choose the required report and click on the (Manage Custom Views) icon present on the right corner.
Enter a suitable name for the view and choose the required parameters on which the view should be based. You
can choose up to four different parameters.
Click on Add.
The new view will be added as a separate tab in the report.
Choose the report whose views you want to edit and click on the (Manage Custom Views) icon present on
the right corner.
In the pop-up that appears you can see a list of views for that report.
To edit a report view, click the icon corresponding to the view that you want to modify. Make the required
changes and click on Update.
To delete a report view, click the icon corresponding to the view that you want to delete.
2. In the Create Custom Report dashboard, enter a name for your report.
5. Select the type of view for your report (see types of view).
Note:
When the given criteria is separated by commas, it is treated as a separate criteria with OR condition.
(Eg: If the criteria is given as EventID = 4678,4679 , then it is treated as EventID= 4678 OR 4679).
If you intend to give a single criteria with a comma character, please use "," instead of "," .
3. To delete a custom-made report, click on the adjacent delete icon. Click Yes in the pop-up box that appears.
5. To share the reports with technicians, hover over the report and click on the share icon that appears. Select the
technician(s) and click Share.
Types of views
Tabular View
This view displays the data in the form of a simple table. You just need to frame the criteria for selecting logs for the
report. You can generate different views of the same tabular view report. To create a new view, refer the Manage Report
Views section.
Pivot View
This view is useful when you have to monitor particular values of the field based on which the report is generated. After
selecting the report criteria, you can select the field and the values in the field that you want to monitor. Each of those
values will be displayed as separate columns with the'count'.
1. Click on the Schedule Report link on top right corner of the Reports page. Alternatively, you can click on the
+Create New Schedule button on the top right corner of the Scheduled Reports page. This will open the Create
New Schedule page.
On the right top corner of the tab, click on More and select Add to Favorites.
The selected report will be added to the Favorites section.
This can now be accessed quickly by clicking on ''Favorites'' in the top right corner.
Note: While upgrading to the latest build of EventLog Analyzer, favorite reports in Builds 11212 and below will not
be retained.
To pin a report,
For instance, a misconfigured router, switch, or firewall can lead to the entry of malicious traffic. Monitoring network
activity along with the changes in perimeter network devices can spot and help seal such loopholes.
EventLog Analyzer helps you collect, analyze, and conduct forensic investigation on perimeter devices' log data.
This solution offers built-in support for different types of networking and security devices such as routers, switches,
intrusion detection and prevention systems, and firewalls.
IDS/IPS Activity
The reports in this category help you to understand what type of attacks your network is susceptible to, which network
devices need to be secured further, how to decide which malicious traffic sources to target, and more.
Firewall Threats
These reports give detailed information on possible security threats to the network.
Threat Detection
This section contains reports on some common threats to the Windows environment which can aid in the detection,
analysis, and forensic investigation of vulnerabilities. The attacks in this category are primarily focused on weakening
the defenses of a system. Conducting a deeper analysis of the threats captured in these reports can help prevent an
attack at a later stage.
DoS Attack Subsided - Possible denial of service attack that have ended.
DoS Attack Entered Defensive Mode - This report is generated when the Windows Filtering Platform has
discovered a potential DoS attack and entered into a defensive mode.
DoS Attacks - This report captures information on the denial of service attacks in a system where legitimate
users will be deprived of a service due to a high volume of malicious traffic.
Downgrade Attacks - This report captures instances of Downgrade Attacks. In this attack, advanced security
features of a system will be downgraded to adopt older legacy security features thereby making it vulnerable to
attacks.
Replay Attack - This report captures instance of legitimate data or requests that are captured and replayed by
an attacker to bypass authentication or for other malicious purposes.
Defender Malware Detection - Instances of malware detection in Windows defender will be listed in this report.
Defender Real Time Protection Detection - This report contains information on anti-virus data from Windows
Defender.
Terminal Server Attacks - This report captures data on attacks to the terminal. server that enables multiple
clients in a network to communicate.
Terminal Server Exceeds Maximum Logon Attempts - Information of multiple failed logon attempts in the
terminal server will be available here.
IP Conflicts - If more than more than one host is assigned the same IP address, an IP conflict that inhibits
communication between hosts will occur.The information on such IP conflicts in a network will be listed here.
Application Whitelisting
Reports on whitelisted and blocked EXE, DLL, and MSI files or automated scripts are listed here.
EXE or DLL File Allowed to Run - This event is generated when certain apps blocked by the organization are
allowed to run.
EXE or DLL Files Not Allowed to Run due to Enforced rules -This event is generated when certain apps are not
allowed to run due to enforced rules.
EXE or DLL File Not Allowed to Run - This event is generated when certain apps blocked by the organization is
not run.
MSI or Script File Allowed to Run -This event is generated when certain scripts or MSI files blocked by the
organization are allowed to run.
MSI or Script Files Not Allowed to Run due to Enforced rules - This event is generated when certain scripts or
MSI files are blocked due to enforced rules.
MSI or Script File Not Allowed to Run - This event is generated when MSI files or automated scripts blocked by
the organization are not allowed to run in a system.
Software Restricted to Access Program - Any software that is restricted from making changes to systems or
files.
Domain Events
Reports on crucial Active Directory events will be listed here. Monitoring these critical changes is essential to ensure
that the security features in Active Directory have not been compromised or downgraded.
Special groups assigned to new logon - This report captures instances of logons to special groups
designated by the administrators.
SID History added to account - If a user is migrated to a new domain, the security identifier history will be
added to the new domain. This report essentially helps in tracking users across domains by recording
instances where SID history has been added to an account.
Failed SID History addition - Instances of failed additions of SID history to a user account will be listed here.
Kerberos policy changes - This report will contain a history of policy changes made to the Kerberos
authentication protocol in a network. Monitoring these policy changes is essential to ensure that authentication
standards in a network are not downgraded.
Special groups logon table modifications - This report captures all instances of modifications to special
groups.
Application Crashes
This report group helps monitor issues related to performance of applications installed in Windows devices.
Application Errors - This report captures instances of errors in the loading of applications installed in Windows
devices.
Application Hanged - This report captures instances of applications hanging in Windows devices.
Windows Error Reporting - This report will have information on the frequently occurring errors in Windows
devices.
Blue Screen Error (BSOD) - This report contains instances of blue screen errors in Windows devices.
Registry Changes
This report group helps in monitoring the Windows registry changes, and records attempts to modify it.
USB Plugged In
USB Plugged Out
Removable Disk Reads
Removable Disk Failed Reads
Removable Disk Creates
Removable Disk Failed Creates
Windows Startups
Windows Shutdowns
Windows Restarts
Unexpected Shutdown
System Uptime
Windows Startup and Windows ShutDown
Service Audit
These reports help you track all the services installed in your Windows devices.
Program Inventory
These reports provide information on software, services, or updates that happen in your Windows environment.
Software Installed
Software Updated
Failed software installations
Failed software installations due to privilege mismatches
Software Uninstalled
Windows Updates - Installed
Windows update process failed
Failed hot patching
Update Packages Installed
Non valid Windows license
Failed Windows license activations
Non activated windows products
New kernel filter driver installed
Eventlog Reports
These reports help you track the status of your event logging service in Windows devices.
Eventlog Reports
These reports capture instances of the logging service shut down to prevent recording logs of any change including
malicious or inadvertent activity.
System Events
These reports can help you monitor some critical system events in your Windows infrastructure.
All Events
Important Events
User Based Report
Trend Report
This report group gives an overview of the trends detected in the logs collected from Windows devices. This report
group helps identify the events that are generated the most and the frequency of those events.
Weekly Report
Hourly Report
Success Events
Information Events
Failure Events
Warning Events
Error Events
Rule Added
Rule Modified
Rule Deleted
Settings Restored
Settings Changed
Group Policy Changes
User Logons
SU Logons
SSH Logons
FTP or SFTP Logons
Logons Overview
Top logons based on users
Top logons based on devices
Top logons based on remote devices
Top Unix Logon Method
Logon Trend
User Logoffs
SU Logoffs
SSH Logoffs
FTP or SFTP Logoffs
Logoffs Overview
USB Plugged In
USB Plugged Out
SUDO Commands
The reports in this group can help ensure that security privileges of the super user are not misused.
Trend report
The reports in this group give an overview of the trend in activity in Unix devices.
Unix Threats
The reports in this group and their corresponding alert profiles help discover and mitigate some of the threats common
to Unix devices.
Cron Jobs
Cron Edit
Cron Job Started
Cron Job Terminated
Connection aborted by a software
Receive identification string
Session Connected
Session Disconnected
Deactivated services
Unsupported Protocol Version
Timeout While Logging
Failed Updates
Device Name Mismatch Error
Device Address Mismatch Error
Top cron jobs based on users
File downloads
File Uploads
Data transfer stall timeouts
Login Timeouts
Session idle timeouts
No transfer timeouts
Connection timeouts
FTP Reports Overview
Top FTP operations based on user
Top FTP operations based on remote device
Emergency Events
Alert Events
Critical Events
Error Events
Warning Events
Notice Events
Information Events
Debug Events
VMWare Logons/Logoff
This report group helps in the monitoring of logons/logoffs of the virtual machines installed in Unix devices. The reports
in this group categorize the events based on the type, status, and the number of events.
User Logons
SU Logons
SSH Logons
SFTP Logons
Logons Overview
Guest Login on VM
VM Created
VM Deleted
VM State Changes
AS400 Reports
This report group contains reports to monitor changes in AS400 devices. All critical system changes, logon events,
hardware errors, configuration changes and more can be tracked with this report.
Logons
Failed Logons
Logoff
Failed Authorization
Authority changes
User Profile changes
Objects deleted
Job changes
Ownership changes
Logon failure due to invalid passwords
System value changes report
Successful Job Start
Successful Job End
Job Logs
Device Configuration
System time changes
Subsystem varied off workstation
ASP storage threshold reached
ASP storage limit exceeded
Disk Unit Errors
Expired system IDs report
Unable to write audit record
Disabled user profiles due to maximum number of sign-on attempts
Report on weak battery
Report on battery failures
System password bypass period ended
Storage directory threshold reached
Report on serious storage conditions
Report on battery cache expiry
Report on i5 grace period expiry
Temporary IO Processor errors
System Processor Failure
Hardware Errors
Top logons based on users
The DHCP Linux overview report will summarize all DHCP log events.
Discovers
Offers
Requests
Acknowledges
Releases
Negative Acknowledges
Abandoning IP
Information Report
DHCP Linux Overview
Top Operation
Top IP Address
Top MAC Address
Top Gateway
Logons
Failed Logons
Login attempts
File downloads
File uploads
Disconnects
File Transfer Aborts
File Deletions
Make Directories
Remove Directories
Rename Operations
List Directory Contents
Password Changes
Bad Sequence of Commands
Successful Commands
Command Syntax Errors
Transfer Incomplete due to insufficient space
Security Data Exchange
Top File Types Downloaded
Top File Types Uploaded
Top Users
Top Clients
Top Methods
Top Status
FTP Reports Overview
Top Visitors
Top Users
Top URL
Top Browsers
Top Errors
Top Referrers
Apache Server Trend
Apache Reports Overview
Databases Created
Databases Dropped
Databases Altered
Tables Created
Tables Dropped
Tables Altered
Views Created
Views Dropped
Views Altered
Stored Procedures Created
Stored Procedures Dropped
Stored Procedures Altered
Index Created
Index Dropped
Index Altered
Triggers Created
Triggers Dropped
Triggers Altered
Schemas Created
Schemas Altered
Selected Tables
Inserted Tables
Updated Tables
Deleted Tables
Execute Command
Receive Command
Check reference command executed
Jobs Added
Jobs Updated
Jobs Deleted
DML Events Summary
Trusted Logons
Non-Trusted Logons
Top logons based on user
Top logons based on remote devices
Logons Trend
Logout Accounts
Failed Logons
Top failure logons based on users
Top Failure Logons based on Remote Devices
Failed Logons Trend
Server Startups
Server shutdowns
Status Reports
Login Created
Login Dropped
Login Altered
Logins Enabled
Logins Disabled
Server roles Created
Server roles Dropped
Server roles Altered
Credential Created
Credential Dropped
Credential Altered
User Created
User Dropped
User Altered
DataBase Role Created
DataBase Role Dropped
DataBase Role Altered
Application Role Created
Application Role Dropped
Application Role Altered
User Created
User Dropped
User Altered
Login Created
Login Dropped
Login Altered
You can also track account lockouts, privilege abuses, and unauthorized copying of sensitive data with these reports.
Privilege Abuse
Unauthorized Copies of Sensitive Data#
Account Lockouts
SQL Injection
Denial of Service
Additional Security Events
Trace Audit C2 On
Trace Audit C2 Off
Started Trace Audits
Stopped Trace Audits
Access violation
Cold Start
Warm Start
Link Down
Link Up
Authentication Failure
EGP Neighbor Loss
Enterprise Specific
Error Events
Information Events
Created Databases
Dropped Databases
Altered Databases
Created clusters
Dropped clusters
Altered Clusters
Created Tables
Dropped Tables
Altered Tables
Selected Tables
Inserted Tables
Updated Tables
Deleted Tables
Created functions
Created profiles
Dropped profiles
Altered profiles
Users created
Dropped users
Altered users
Roles created
Dropped roles
Altered roles
Granted roles
Revoked roles
System Grant
System Revoke
Connect Events
Server Startup
Server Shutdown
Logons
Failed Logons
Top logons based on users
Top logons based on remote devices
Top failed logons based on users
Top failed logons based on remote devices
Logon Success
Logon Failures
DDL Statements
DML Statements
Transactional and Locking Statements
Utility Statements
Replication Statements
Printer Auditing
The printer auditing reports help you keep track of the documents that get printed within your network. These reports
can also help you identify which documents get printed the most and by whom. This can help ensure that sensitive
information is not indiscriminately printed which can increase the risk of data theft.
Documents Printed
Deleted documents
Timed out documents
Moved Documents
Resumed Documents
Paused documents
Corrupted documents
Documents' priority changes
Insufficient Privilege to Print Documents
Top printed documents based on users
Top printed documents
Printer Activity trend
Failed Printer Activity Trend
All Activity
All Activity
Instances Created
Services Created
Server Started
Successful Logins
Failed Logins
Datacenter changes
Datacenter created
Datacenter deleted
Datacenter renamed
Datastore changes
Datastore created
Datastore destroyed
Datastore renamed
Datastore file copied
Datastore file moved
Datastore file deleted
Folder changes
Folder created
Folder deleted
Folder renamed
Inventory objects moved into a folder
Permission changes
Permission created
Permission removed
Permission updated
Role changes
Role added
Role removed
VM changes
VM created
VM deployed
VM removed
VM renamed
VM reconfigured
VM power state changes
Device changes
Device added
Device added failure
Device IP changed
Device shutdown
Device removed
Device connection overview
Device powered down to standby
EventLog Analyzer also provides predefined alert criteria for all the above mentioned vCenter events. Setting up vCenter
alert profile is same as setting up a predefined alert profile, except that you need to choose 'vCenter' type in alert
criteria.
Logon Reports
Successful Logons
Successful Logon Trend
DHCP Reports
Allocated IP address
Conflicting IP Address
Lease Extend IP Address
System Events
Configuration Changes
Clock Update
System Reboot
Fan Failure
Memory Status
CPU Status
Temperature Status
High Availability Status
Severity Reports
Emergency Events
Alert Events
Critical Events
Error Events
Warning Events
Notice Events
Information Events
Debug Events
Logon Reports
Successful Logon
Top Source
Top Users
Logoff Events
Top Source
Top Users
Successful Logons Trend
Allowed Traffic
Allowed Traffic
Top Source
Top Destination
Top Protocol
Top Port
Allowed Traffic Trend
Denied Connections
Denied Connections
Top Source
Top Destination
Top Protocol
Top Port
Denied Connections Trend
Interface Status
Interface Up
Interface Down
Severity Reports
Emergency Events
Alert Events
Critical Events
Error Events
Warning Events
Notice Events
Information Events
Debug Events
Logon Reports
Successful Logon
Failed Logons
Logon Overview
Traffic Reports
Allowed Traffic
Denied Connections
Traffic Overview
System Event
Clock Updated
System Shutdown
System Reboot
IDS/IPS Reports
Attack Overview
Severity Report
Emergency Events
Alert Events
Critical Events
Error Events
Warning Events
Notice Events
Go to the Reports section. Navigate to Network Devices and select HP from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
The left panel lists all the available out-of-box reports for HP. Select the report you want to view.
Click Scheduled Reports to have this report exported and emailed periodically.
Go to the Reports section. Navigate to Network Devices and select Barracuda from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
To quickly export the report in view, click Export as and choose the format. Once done, you can download the
report.
Go to the Reports section. Navigate to Network Devices and select CheckPoint from the displayed list of
devices.
Select the Period for which you want the data to be displayed and click Apply.
To quickly export the report in view, click Export as and choose the format. Once done, you can download the
report.
Click Scheduled Reports to have this report exported and emailed periodically.
Go to the Reports section. Navigate to Network Devices and select FirePower from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
This panel lists all the available out-of-box reports for FirePower. Select the report you want to view.
Click Scheduled Reports to have this report automatically generated, exported, and emailed to the specified users in
the desired format, at the specified times.
Fortinet Events: These reports provide valuable information on all events including important events such as
logons, failed logons, possible attacks, users added/deleted etc., on Fortinet devices.
Firewall Allowed and Denied Traffic: The reports in this category provide insights on traffic based on the
source, destination, protocol and port, and traffic trends.
Successful and Failed Logons: These reports provide information on source, user-based, and trends reports.
Firewall IDS/IPS Events: The reports in this category provide insights on possible attacks, and attacks based on
the source and destination IP address. They also provide reports on attack trends.
Firewall Security Events: These reports provide valuable information on applications, email and web filters.
They also provide reports on antivirus and DLP.
Firewall Accounts Management: This category provides reports on administrators and users added, deleted,
or modified.
Firewall Policy Management: The reports in this category provide useful information on policies added,
deleted, or modified.
Successful and Failed VPN Logon Reports: These reports provide insights on VPN logons and logouts based
on success, failure, remote devices, users and trends.
System Events: These reports provide valuable information on configuration changes, license expiration,
power restores and failures, system shutdowns and reboots, and failed commands.
Device Severity Reports: The reports in this category provide insights into emergency, alerts, critical, error,
warning, notice, information, and debug events.
VPN lP Assigned Reports: These reports provide information on private IP assigned, IP assigned users, remote
IP and VPN IP assigned.
Go to the Reports section. Navigate to Network Devices and select Fortinet from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
The All Events panel lists all the available out-of-the-box reports for Fortinet. Select the report you want to view.
To export the report being viewed, click Export as and choose the format. Once done, you can download the
report.
Huawei Events: These reports provide valuable information on all events, including important events such as
logons, failed logons, policies added/deleted, users added/deleted etc., on Huawei devices.
Successful and Failed Logons: These reports provide information on source and user-based reports, and
trend reports.
Firewall Allowed and Denied Traffic: The reports in this category provide insights on traffic based on the
source, destination, protocol and port, and traffic trends.
Firewall Accounts Management: This category provides reports on users and groups added, deleted or
modified.
Firewall Policy Management: This category of reports provides valuable information on policies added,
deleted, modified, enabled or disabled.
Firewall IDS/IPS events: This category of reports provide useful insights on attacks based on the source and
destination IP address. They also provide reports on attack trends.
Firewall Security Events: These reports provide information on application, email and web filters. They also
provide reports on antivirus and DLP.
Successful and Failed VPN Logon Reports: This category of reports provide insights into VPN logons and
logouts based on source, users and trend reports.
System Events: This category provides reports on power status, command executed, CPU status, clock update,
interface status, temperature status, and fan status.
Device Severity Reports: The reports in this category provide insights into emergency, alerts, critical, error,
warning, notice, information, and debug events.
Go to the Reports section. Navigate to Network Devices and select Huawei from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
The All Events panel lists all the available out-of-the-box reports for Huawei. Select the report you want to view.
To export the report being viewed, click Export as and choose the format. Once done, you can download the
report.
Juniper Events: These reports provide valuable information on all events including important events such as
logons, failed logons, possible attacks, configuration errors, interface up/down, etc., for Juniper devices.
Successful and Failed Logons: These reports provide insights on source and user-based reports, trends
reports. They also provide information on firewall, web, and CLI logons.
Configuration Reports: The reports in this category provide information on interface settings, commands
executed, and configuration errors.
Firewall Allowed and Denied Traffic: This category of reports provides valuable insights on traffic based on the
source, destination, protocol and port, and traffic trends.
Firewall IDS/IPS Events: These reports provide insights on possible, critical, top attacks; attacks based on
source, destination IP address, and severity; and attack trends.
Application Tracking Reports: The reports in this category provide useful information on applications
accessed based on username and reports on applications started and stopped.
System Events: These reports provide information on process and fan status, and system reboots.
Device Severity Reports: The reports in this category provide insights on emergency, alerts, critical, error,
warning, notice, information, and debug events.
Go to the Reports section. Navigate to Network Devices and select FirePower from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
The left panel lists all the available out-of-the-box reports for Juniper. Select the report you want to view.
To quickly export the report being viewed, click Export as and choose the format. Once done, you can
download the report.
Malwarebytes Events: The reports in this category provide valuable information on detected threats and exploits based
on source and users. Additionally, granular reports on blocked, allowed exploits, quarantined threats, and websites
blocked based on source and users are available.
You can set filter criteria for events based on object type, action value, action, object scanned, risk name,
username and source IP. Use logical operators as required.
Select the Period for which you want the data to be displayed and click Apply.
In the left panel, under Malwarebytes Reports, you can view all the available threat reports for Malwarebytes.
Select the report you want to view.
To quickly export the report being viewed, click Export as and choose a format. Once done, you can download
Click Scheduled Reports to have this report exported and emailed periodically.
Meraki Events: The reports in this category provide information on all events including important events such as
allowed traffic, denied connections, possible attacks etc., on Meraki devices.
Firewall Allowed and Denied Traffic: This category of reports provide valuable insights on traffic based on the
source, destination, protocol, port, and traffic trends.
Logon Reports: These reports provide valuable information on user logons and its trends.
Firewall Website Traffic: This category provides reports on traffic based on the source, destination IP address,
website, and traffic trends.
Firewall IDS/IPS Events: The reports in this category provide insights on possible attacks, and top attacks
based on source and destination IP address. They also provide reports on attack trends.
Firewall Security Events: This category provides reports on web filtering.
Successful and Failed VPN Logon Reports: These reports give you valuable insights on VPN logouts and
logons based on remote devices, users and trend reports.
Device Severity Reports: The reports in this category provide insights on , alerts, critical, error, warning, notice,
information and debug events.
Go to the Reports section. Navigate to Network Devices and select Meraki from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
The All Events panel lists all the available out-of-the-box reports for Meraki. Select the report you want to view.
To quickly export the report being viewed, click Export as and choose the format. Once done, you can download
the report.
Go to the Reports section. Navigate to Network Devices and select NetScreen from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
To generate and redistribute the reports over email at periodic time intervals, you can use the Schedule
Reports option.
The More link at the top right corner provides you the below customization options:
1. Set as Default: Allows you to set the selected report as the default report.
Palo Alto Events: Provides information on all the events associated with Palo Alto devices.
Firewall Allowed and Denied Traffic: Provides insights on traffic based on source, destination, protocol and
port, and also generates a report on traffic trends.
Firewall Website Traffic: Provides traffic reports based on source, destination, and website traffic trend.
Successful and Failed Logons: Provides source and user based reports, trend reports.
Firewall Accounts Management: Provides reports on administrator added, deleted or modified.
Firewall Policy Management: Provides information on policies added, deleted, or modified.
Firewall IDS/IPS Events: Provides insights on attacks based on source and destination IP address, also
provides a report on attack trends.
System Events: Provides reports on configuration changes, clock update, system status, start and stop of
services, features and license status.
Failed VPN Logon Reports: Monitors the VPN activities from Palo Alto logs and offers out-of-the-box reports for
failed VPN logons.
Device Severity Reports: Provides reports on emergency, alerts, critical, error, warning, and notice events.
Go to the Reports section. Navigate to Network Devices and select PaloAlto from the displayed list of devices.
If you want to generate the reports for a specific time period, select the Period calendar option from the top right
corner, specify the time period and then click Apply.
To export a report, click Export as and choose the format. The solution allows you to export the reports in PDF
and CSV formats.
To generate and redistribute the reports over email at periodic time intervals, you can use the Schedule
The More link at the top right corner provides you the below customization options:
1. Set as Default: Allows you to set the selected report as the default report.
2. Add to Favorites: Marks the selected report as favorite.
3. Pin to dashboard: Pins the selected report to the dashboard in the Home page.
Go to the Reports section. Navigate to Network Devices and select pfSense from the displayed list of devices.
If you want to generate the reports for a specific time period, select the Period calendar option from the top right
corner, specify the time period and then click Apply.
To export a report, click Export as and choose the format. The solution allows you to export the reports in PDF
and CSV formats.
The More link at the top right corner provides you the below customization options:
1. Set as Default: Allows you to set the selected report as the default report.
2. Add to Favorites: Marks the selected report as favorite.
3. Pin to dashboard: Pins the selected report to the dashboard in the Home page.
Go to the Reports section. Navigate to Network Devices and select SonicWall from the displayed list of devices.
If you want to generate the reports for a specific time period, select the Period calendar option from the top right
corner, specify the time period and then click Apply.
To generate and redistribute the reports over email at periodic time intervals, you can use the Schedule
Reports option.
Sophos Events: Provides information on all the events associated with Sophos devices.
Firewall Allowed and Denied Traffic: Provides insights on traffic based on source, destination, protocol and
port, and also generates a report on traffic trends.
Firewall Website Traffic: Provides traffic reports based on source, destination, and website traffic trend.
Successful and Failed Logons: Provides source and user based reports, trend reports.
Firewall Accounts Management: Provides reports on administrator added, deleted or modified.
Firewall Policy Management: Provides information on policies added, deleted, or modified.
Firewall IDS/IPS Events: Provides insights on attacks based on source and destination IP address, also
provides a report on attack trends.
System Events: Provides reports on configuration changes, clock update, system status, start and stop of
services, features and license status.
Failed VPN Logon Reports: Monitors the VPN activities from Sophos logs and offers out-of-the-box reports for
failed VPN logons.
Device Severity Reports: Provides reports on emergency, alerts, critical, error, warning, and notice events.
Go to the Reports section. Navigate to Network Devices and select Sophos from the displayed list of devices.
Select the Period for which you want the data to be displayed and click Apply.
To generate and redistribute the reports over email at periodic time intervals, you can use the Schedule
Reports option.
The More link at the top right corner provides you the below customization options:
1. Set as Default: Allows you to set the selected report as the default report.
1. Go to the Reports section. Navigate to Network Devices and select WatchGaurd from the displayed list of devices.
4. Select the Period for which you want the data to be displayed and click Apply.
6. To quickly export the report in view, click Export as and choose the format. You can then download the report.
7. Click Scheduled Reports to have this report exported and emailed periodically.
F5 reports dashboard
2. You can set filter criteria for events based on Source, Severity and Device and Message.
4. Select the Period for which you want the data to be displayed and click Apply.
5. The panel on left lists all the available out-of-the-box reports for F5. Select the report you want to view.
7. Click Scheduled Reports to have this report exported and emailed periodically.
1. Go to the Reports section. Navigate to Servers and Workstation and select IBM AS/400 from the displayed list of
devices.
3. You can set filter criteria for events based on Source, Severity and Device and Message.
5. To view the security events of specific time period, select the period from the Period calendar option on the top
right corner and click Apply.
6. To quickly export the report in view, click Export as and choose the format. You can then download the report.
Sangfor Events:
Provides information on all the events associated with Sangfor devices.
Logon Report
These reports provide information on successful logons, logoffs, and logon overview.
VPN Reports:
Provides insights on VPN logons, failed logons, logons trend, VPN blocked connections.
System Events:
Provides reports on configuration changes.
Topsec Events:
Provides information on all the events associated with Topsec devices.
Logon Reports
These reports provide information on successful logons, logoffs, failed logons, and logon overview.
Interface Events
The reports in this category let you monitor interface events such as Interface Up and Interface Down.
System Events:
Provides reports on configuration changes and system reboot.
EventLog Analyzer can automatically analyze data from the above solution and gives you insights on commonly found
severities, source and destination IP addresses, and the most targeted ports in the form of security analytical reports.
These reports can also be exported in the PDF, CSV, and HTML formats. Report generation can also be automated using
the Schedule report option. These are the solutions that EventLog Analyzer supports.
EventLog Analyzer can process log data from FireEye and present the data in the form of graphical reports. For the
solution to start collecting log data from FireEye, it has to be added as a threat source.
Once the threat source is added, EventLog Analyzer will start parsing the fields in the logs. This log data can now be
viewed in the form of reports.
Domain matches
Malware infections
Callbacks
Malware objects
EventLog Analyzer also provides reports that give information on the top:
Severities
Source IPs of infections
Target IPs
Target ports
Malware
Active sensors
EventLog Analyzer collects log data from Symantec Endpoint Solutions and presents it in the form of graphical reports.
For the solution to start collecting this log data from, it has to be added as a threat source.
Once the threat source is added, EventLog Analyzer will start parsing the fields in the logs. This log data can now be
viewed in the form of reports.
Security risks
Virus detected
Port cans
Installation of commercial applications
Threat activities
Affected devices
Source devices
Risks
Problems
EventLog Analyzer collects log data from Symnatec DLP Applications and presents it in the form of graphical reports. For
the solution to start collecting this log data, the it has to be added as a threat source.
Once the threat source is added, EventLog Analyzer will start parsing the fields in the logs. This log data can now be
viewed in the form of reports.
Senders
Recipients
Targets
Protocols
Data Owners
EventLog Analyzer collects log data from Malwarebytes and presents it in the form of graphical reports. For the solution
to start collecting this log data, the device has to be added as a threat source.
Detected Threats
Quarantined Threats
Allowed Threats
Top Threats based on source
Top Threats based on user
EventLog Analyzer collects log data in the CEF format and presents it in the form of graphical reportsFor the solution to
start collecting this log data, the device has to be added as a threat source.
3. Configure your McAfee ePO server to use the newly created syslog server.
4. Add a new registered server and select Syslog for the type of server.
5. Enter the FQDN of the Syslog server.
6. Enter 6514 for the port number. If the listener port number was changed in the TLS, enter that port number.
7. Click on enable event forwarding.
8. Click on test connection. A Syslog connection success message will be displayed.
9. Click on save.
Available reports:
McAfee Events
McAfee Threat Reports
McAfee Virus Reports
EventLog Analyzer also has predefined alert criteria corresponding to the above categories. Setting up an alert profile
for vulnerability scanners is similar to a predefined alert profile. The only difference is that you need to choose
Vulnerability as the type from the predefined list and then choose the appropriate alert condition.
Nexpose
Nessus
1. Select a scan under Scans Tab.
2. In the upper-right corner, click Export
3. From the drop-down box, select Nessus.
NMAP
1. Go to the Scan menu and select the scan that you want to save.
2. Click Save Scan.
3. In the Save dialog box, choose the format as Nmap XML format.
OpenVas
1. Under the Scans menu, select Vulnerabilities
2. If there is no Vulnerabilities tab, choose Results.
3. Click Export page contents from the bottom right corner.
Qualys
1. Go to the Scans menu in the dashboard.
2. Right-click the scan report that you need to export.
3. Select Download from the Quick Actions menu.
4. Select Download Format as Extensible Markup Language(XML).
Once you have exported the data from the corresponding scanners, you need to import the log data to the EventLog
Analyzer server.
Available reports:
GHOST in Linux - This report lists any detected instance of the GHOST vulnerability in Linux.
Shellshock Report - This report contains information on the detected instances of the Shellshock privilege
escalation vulnerability in Linux systems in your network.
Admin Discovery Report - An overview of all the admin accounts in a network will be available in this report.
Top exploitable vulnerabilities - An overview of the vulnerabilities in your network that are most prone to
attacks will be available here.
Credential failures report - An account of all instances of credential failures in your network will be displayed
here.
Elevated privilege failures report - Failed attempts at privilege escalation will be displayed here.
Registry access failures - Failed attempts at accessing the Windows Registry will be recorded here.
Patch report - A report of all the patches applied in the device will be displayed.
Overall Nessus report - An overview of events in Nessus vulnerabilty scanners in your network will be available
here.
For instance, the risk assessment (ID.RA) section of NIST compliance that states,
"The organization understands the cybersecurity risk to organizational operations (including mission, functions, image,
or reputation), organizational assets, and individuals. Threat and vulnerability information is received from
information sharing forums and sources."
The data from vulnerability scanners that can be used to ensure compliance to regulations are also categorized
according to the device types, in EventLog Analyzer. The solution categorizes the reports as follows based on the
devices' data that Nessus analyzes.
Windows devices
Unix devices
Databases
Cisco IOS
Huawei
Unix file contents
IBM iSeries
SonicWall, SonicOS
Citrix XenServer
VMware, vCenter, and vSphere infrastructure
Once the Nessus vulnerability scanner is added, this data from Nessus can be manually imported into EventLog
Analyzer or automated imports can be scheduled. This data is then collated into comprehensive reports to comply with
PCI DSS requirements.
The information on potential vulnerabilities in a network including service vulnerabilities and potential vulnerabilities
gathered from Qualys will be provided in these reports. This information is also presented in the graphical format for
improved insights.
Available reports:
Information gathered from vulnerabilities - Information that can be gathered from detected vulnerabilities
such as CVSS scores and the severity level will be available in this report.
Services vulnerabilities - Service vulnerabilities like open TCP and UDP services will be listed in this report.
Potential vulnerabilities - Vulnerabilities that could be exploited by an attacker will be listed in this report.
Confirmed vulnerabilities - Vulnerabilities that are above a CVSS base score of 5 will be listed in this report.
Severe vulnerabilities - Vulnerabilities with the severity level 'Urgent'will be listed in this report.
Open TCP Ports - Open TCP ports in the network will be displayed in this report.
Open UDP Ports - Open UDP ports in the network will be displayed in this report.
Qualys Reports Overview - An overview of all important events in Qualys reports will be displayed here.
Available reports:
Top Vulnerable Service - From NMAP data, the services in the system most prone to be exploited will be
available here.
Top Vulnerable OS - From NMAP data, the services in the operating systems most prone to be exploited will be
available here.
Top Open Ports - A list of all the open ports in the system will be available here.
Open Ports - A list of all the open ports in the system will be available here.
Top Vulnerable Devices - A list of the most vulnerable devices, according the the NMAP data will be available
here.
Top Vulnerable protocol - The most vulnerable protocols used in the system will be available in this report.
Top Vulnerable ports - A list of the most vulnerable ports according to the NMAP data will be available here.
EventLog Analyzer collects data from OpenVas and helps you classify the reports based on the threat level as high,
medium, or low.
Top Vulnerabilities High Threat - Vulnerabilities that pose the highest risk of attacks will be listed here.
Top Vulnerabilities Medium Threat - Vulnerabilities that pose a moderate risk of attacks will be listed here.
Top Vulnerabilities Low Threat - Vulnerabilities that do not pose a high risk of attacks will be listed here.
Data from OpenVas is also segregated based on severity, CVS score, and group.
Top CVS Score by Count - This report identifies the most frequent vulnerabilities categorized based on the
CVS score.
Top Vulnerable Group - This report lists the most vulnerable workgroups in your network based on the
Top Vulnerabilities - This report lists the most common vulnerabilities in the network.
EventLog Analyzer collects data from Nexpose and categorizes the vulnerability information based on the level of
severity.
Available reports:
Critical threats - Vulnerabilities that pose the highest risk of attacks will be listed here.
High threats - Vulnerabilities that pose a considerably high risk of attacks will be listed here.
Medium threats - Vulnerabilities that pose a moderate risk of attack will be listed here.
Low threats - Vulnerabilities that do not pose a high risk of attacks will be listed here.
Vulnerability trend - The general trend that can be inferred based on the vulnerabilities in your network will be
listed here.
For instance, the two events "employee logs on to Device A" and "employee logs on to Device B" seem perfectly normal.
However, "same employee logs on to two different devices (Device A and Device B) at almost the same time" may
indicate a possible account sharing incident.
For more information on constructing a correlation rule using these parameters, see Constructing custom correlation
rules.
General pattern: Failed logon -> Failed logon -> Failed logon -> (...) -> Successful logon (all within a few minutes, to
the same device)
Specific pattern: At least 10 failed logons to a single device within 2 minutes -> (within the next 1 minute) ->
Successful logon to the same device
Threshold: None.
Filters: The device name should be the same as the device name from Action 1.
Some examples
General action flow: Application crash -> Application crash -> (...) -> Application crash (all within few hours on a
single device, not applicable to Device-1234)
Specific action flow: At least 5 application crashes on a single device within 180 minutes (except for Device-
1234)
Threshold: This action should occur a minimum of 5 times within 180 minutes.
Filters:
The device name should be the same for all occurrences of Action 1.
The device name should not equal Device-1234.
General action flow: Process started -> File modified -> File modified -> (...) -> File modified (all within a few
minutes, on the same device)
Specific action flow: Process started -> (within the next 5 minutes) -> At least 15 file modifications on the same
device, by the same process
Threshold: None.
Filters: None
You can also perform several reporting actions, empowering you to gain maximum value from your log data. To know
more about what correlation is, how correlation rules are structured, and more, see understanding correlation.
To view the report for a specific rule, go to the Correlation tab, navigate to the rule name on the left menu, and click on it.
You can also go to the incident report from the incidents overview report by clicking on the corresponding entry in the
graphical or tabular parts of the report.
Timeline view
The timeline view provides the history of correlated actions for each occurrence of an incident. It is a sequential list of
logs that led to the triggering of a particular rule.
To get an Event timeline for each incident on the table, click on Event Timeline corresponding to the specific
incident.
To export a report, navigate to the required report, and click on the Export as option.
Select the format in which you would like to export the report from the drop down list.
The status of all previous and ongoing exports can be viewed by clicking on the Report export history icon
next to the Export as option.
2. Schedule reports
An incident report schedule allows you to generate incident reports at regular periods, and optionally receive them
via email.
To view the list of existing schedules for a specific report, navigate to the required incident report and click
on Schedule Report.
You can enable/disable or edit the schedules by clicking on the respective icons. To create a new
schedule, click on Add Schedule.
You can choose what information must be displayed in your incident report by adding or removing the required fields
as columns in the report.
Select the fields to be displayed in the report by choosing the respective checkboxes under each action.
You can also specify the below options for each field by clicking on the edit icon next to the required field.
Display name: This is the name of the field as displayed in the report. This is useful if you would like to display
the same field (e.g. username) from more than one action. You can distinguish between similar fields by
changing their display names. For instance, 'Failed logon username' and 'Successful logon username'.
Show value of: When you have specified a threshold value for the action and it occurs more than once, you can
choose to display the field value from either the first, last or all occurrences of the action. Once you have
specified the required information to be displayed, click Save.
The Incidents Overview window provides you with the list of 10 previous correlation incidents, in raw log format.
Users can toggle between the List and Grid report views.
Advanced options
1. You can select a filter field from the dropdown list provided. The fields provided in the dropdown may vary based
on the action selected.
2. You can select the comparison type as equals, not equals, contains, starts with, ends with, link to, or is
constant, from the dropdown provided.
Note: When you provide more than one value for an equals comparison, the set of values provided are treated as
a list of possible values and the action is accepted if any one value from the list is true. The same holds true for
the contains, starts with, and ends with comparisons.
When you provide more than one not equals comparison, the set of values provided need to hold true for the action to
be accepted.
Link to
The link to comparison type is used to check the value of the selected field against the value of a field in another action
(belonging to the same rule or the primary action of the other rule). For instance, if the field Device type of Action 1 is
linked to Action 2's Device type value, then Action 1 would get triggered only if the value of both the linked fields are the
same.
When you choose link to, the icon appears at the end of the filter. Clicking on the icon will present a new tab.
Note: At least one field of the starting rule should be linked to a field in the ending rule.
Is constant
The is constant option is used to treat the specific field as constant. By selecting this option, a set of repeated actions
are accepted by the rule only if this field's value remains constant throughout all the iterations. For instance, if the Target
User field is kept as constant, then the action gets triggered only when the value of this field remains constant in all the
iterations. The action doesn't get triggered if the event is generated with different values.
To know more details of a particular session, you can click on View History. This tab displays all the details as given
below:
This page contains the Configure Fields and Advanced View tabs. The Configure Fields tab allows you to view similar
logs generated in a session by extracting logs that have the same field value (Domain, Device Name, Logon ID, and
Username). You can choose the field by which you want to retrieve logs by clicking on the desired options from the
drop-down box. By clicking on the Advanced View tab, you can drill down and view the raw logs of that session.
In the User-based view, you can analyze the weekly login and logout activities of a particular user. You can hover your
mouse pointer over a generated user-based report in the table to find the Weekly Login View tab. Clicking on this tab
displays a timeline graph for every day of the week in which you can view a particular user's active session duration,
login time, and logout time for any given day. This view also provides the number of hours the user was active per day
and for the entire week. The Weekly Login View report is available only for all system-generated reports.
To open the correlation rule builder, click on the Correlation tab of the product. Click on Manage Rules on the top right of
the tab and select +Create Correlation Rule on the top right. Creating a custom rule involves:
To know more about what correlation is, how correlation rules are structured, and more, see Understanding correlation.
To create correlation rules, select one or more actions from the following groups:
General Events
MITRE ATT&CK TTP(S)
Custom Actions
Advanced options
Each action in a correlation rule corresponds to a log. Logs contain various fields, and each field has a specific value.
With advanced options (found under Filters on the right of the action), you can provide filter criteria for each field of the
log/action, specify a threshold limit on the minimum number of repetitions of the action, and also bunch the filter criteria
into groups, which can be used to create rules for complex scenarios.
1. You can select a filter field from the dropdown list provided. It is to be noted that the filters provided in the
dropdown may vary based on the action selected.
Note: When you provide more than one value for an equals comparison, the set of values provided are treated
as a list of possible values and the action is accepted if any one value from the list is true. The same holds true
for the contains, starts with, ends with, less than, greater than, and between comparisons.
When you provide more than one not equals comparison, the set of values provided need to hold true for the action
to be accepted. The same holds true for the not contains, not starts with, not ends with, and not between
comparisons.
Less than, greater than, between, and not between conditions are applicable only for IP, port number, and
privilege fields.
Link to
The link to comparison type is used to check the value of the selected field against the value of a field in another
action (belonging to the same rule). For instance, if the field Device type of Action 1 is linked to Action 2's Device
type value, then Action 1 would get triggered only if the value of both the linked fields are the same.
When you choose link to, the icon appears at the end of the filter. Clicking on the icon will present a new tab.
Click the check box corresponding to the field of the second action against which you want to compare the value of
the previous action. Click OK to complete linking the two actions.
Note: Using the link to condition, you cannot link a field to another one having the is variable condition.
Is constant
The is constant condition is used to treat the specific field as constant. When you select this condition, this action
Is variable
The 'is variable' condition is used to treat a field as a variable. When you select this condition, this action will get
triggered when the field's value keeps changing each time it is checked. For instance, if the is variable condition is
applied for the 'Target User' field in an action, the action would get triggered when the value of the field is different
in each iteration.
Note: A field having the is variable condition cannot be linked to another one using the link to condition.
Is malicious
The 'is malicious' condition is available only for IP address fields. It can be used to check if the detected IP address
is present in the predefined list of malicious IP addresses that the product has stored in the internal database.
3. Values which are to be compared against the selected field can be provided directly in the textbox. Specify the
value to be checked for, in the corresponding textbox.
1. To add another filter to the same log/action, click the icon on the right side of the value textbox. The new filter
gets added on the next line.
You can choose if the two filters are to be logically ANDed or ORed with the previous one, by selecting AND
or OR from the dropdown list present on the left side of the second filter.
You can delete a filter by clicking on the icon on its right.
Note: To utilize the vulnerability and misconfiguration comparators, please configure data enrichment for
ManageEngine Endpoint Central. Click here to know how.
Note: If the action is the first action in the rule, then you should also provide a time window within which the
repetitions have to be observed (as it is the first action and there is no preceding action or time window).
Once you have built the rule pattern and specified the configurations, click Create so that the rule gets saved and
EventLog Analyzer can start correlating logs to check for this rule pattern.
You can now choose what report will be displayed by clicking on the check box. The selected report will be displayed or
Make sure that you only enable the rules that the organization requires.
Depending on the logs obtained, each rule may operate differently in each organization. So, make sure to
enable the rules in batches, and then watch the behavior of that particular set of rules in that batch and identify
the rules that are actually required. Depending on the requirement, the rules can be fine-tuned to reduce false
positives.
Multi-event correlation rules are typically set up by adding various conditions (action, threshold, advanced
operators) into them. The number of logs that match each correlation condition determines the amount of
resources required. The larger the matched data set, the more resources required, resulting in increased
memory utilization. Ensure the criteria you specify is constrained to reduce the dataset used for analysis; this
will limit the memory usage.
Make sure to monitor the memory utilized by each correlation rule. By determining the memory utilization of
each rule, the rules can be fine-tuned for improved efficiency.The correlation memory usage can be monitored
by navigating to Settings -> System Diagnostics -> System Info -> View report in correlation information.
Event Sequence: A large number of traffic events to multiple ports from the same IP are identified within a short
span of time.
Threshold: 1000 different ports within 5 mins.
Event Sequence: Large number of login failed events across multiple devices attempted from the same device
within a short span of time.
Threshold: 100 events from the same IP.
Event Sequence: Login attempts made to an account in the same device from different countries within a
specified time frame, i.e., the username and device name would be the same but the country would be
different.
Threshold: 10 events within 10 mins.
Event sequence: More than 100 network connections identified as malicious within 5 mins.
Threshold: 100 times within 5 mins.
You can use the search bar ( ) on the top of the table to search for a specific rule. You can use the dropdown on the top
right of the table to select the number of rules to be displayed per page.
Rule actions
You can perform a several managerial actions on the rules, by clicking on the respective icons, as described below:
Enable/disable rule ( / ): The icon implies that a rule is currently enabled, and the icon implies that
it is disabled. You can toggle between enabling/disabling the rule by clicking on these icons. When a rule is
disabled, EventLog Analyzer does not check for the pattern and does not report on the rule.
Update rule ( ): You can modify the rule definition and configurations by selecting this icon, which takes you
to the correlation rule builder page. You can modify all details except for the rule name.
Delete rule ( ): You can delete any of the custom rules created by clicking on this icon. Predefined rules
cannot be deleted.
Enable/disable notification ( ): You can enable or disable notifications/alerts for the correlation rules by
using this option. You can view and manage correlation alerts under the Alerts tab of the product:
View correlation alerts, assign owners and track their status under Correlation Alert Profiles.
You can update notification settings for each correlation alert profile on the Manage Alert Profile page.
You can also enable or disable a group of rules by selecting the rules and clicking on the enable or disable icon on the
top of the table. You can enable or disable all rules by using the More Options dropdown.
Edit Compliance
Go to Manage Compliance.
Select the required risk posture source.
Click Edit to edit parameters of the rules with the possible values to get your personalized scores. (By default,
the recommended values from the Microsoft/CIS standards will be present).
There is an option to edit risk posture source configurations from the risk posture widget as well.
This status informs that the selected source's configurations have met the Recommended / User set compliance value
as per their norms.
High Risk
This status informs that the selected source's configurations have not met the Recommended / User set compliance
value as per their norms.
Unable to Verify
This status informs that the EventLog Analyzer server was unable to fetch the required data needed for analyzing the
specific rule. It can be due to the following reasons.
Troubleshooting Steps:
Troubleshooting Steps:
Update credentials and server details in Settings → Log Source Configuration → Database Audit.
Update Advanced Auditing credentials in Settings → Log Source Configuration → Database Audit →
Advanced Auditing.
Refer here for more details.
Possible Reasons for "No SQL Server(s) Configured" in edit compliance are as follows:
1. No SQL server(s) is configured.
2. Advanced Auditing not enabled for the SQL server.
Vulnerability:
Enabling Ad Hoc Distributed Queries allows users to query data and execute statements on external data sources. This
feature can be used to access remotely and exploit vulnerabilities on remote SQL Server instances and to run unsafe
visual basic for application functions.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'.
Recommendation:
Vulnerability:
The clr enabled option specifies whether user assemblies can be run by SQL Server. Enabling use of CLR assemblies
widens the attack surface of SQL Server and puts it at risk from both inadvertent and malicious assemblies.
Possible Values:
Enabled or '1'
Disabled or '0'
Recommendation:
Run the following T-SQL command:
Vulnerability:
This option allows a member of the db_owner role in a database to gain access to objects owned by a login in any other
database, causing an unnecessary information disclosure. Cross-database ownership chaining should only be enabled
for the specific databases requiring it, instead of enabling it at the instance level for all databases by using the ALTER
DATABASESET DB_CHAINING ON command. This database option may not be changed on the master, model, or
tempdb system databases.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'.
Recommendation:
Run the following T-SQL command:
Vulnerability:
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'. Disabling the Database Mail XPs option reduces the SQL Server surface,
eliminates a DOS attack vector and channel to exfiltrate data from the database server to a remote host.
Recommendation:
Run the following T-SQL command:
Vulnerability:
The OLE Automation Procedures option controls whether OLE Automation objects can be instantiated within Transact-
SQL batches. These are extended stored procedures that allow SQL Server users to execute functions external to SQL
Server. Enabling this option will increase the attack surface of SQL Server and allow users to execute functions in the
security context of SQL Server.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'.
Recommendation:
Run the following T-SQL command:
> EXECUTE sp_configure 'show advanced options', 1; RECONFIGURE; EXECUTE sp_configure 'Ole
Automation Procedures', 0; RECONFIGURE;
GO
EXECUTE sp_configure 'show advanced options', 0; RECONFIGURE;
6. Remote Access
Description:
Vulnerability:
The 'Remote Access' option controls the execution of local stored procedures on remote servers or remote stored
procedures on local server. This functionality can be abused to launch a Denial-of-Service (DoS) attack on remote
servers by off-loading query processing to a target.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'.
Recommendation:
Run the following T-SQL command:
Vulnerability:
The remote admin connections option controls whether a client application on a remote computer can use the
Dedicated Administrator Connection (DAC).The DAC lets an administrator access a running server to execute
diagnostic functions or Transact-SQL statements, or to troubleshoot problems on the server, even when the server is
locked or running in an abnormal state and not responding to a SQL Server Database Engine connection.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
In a cluster scenario, the administrator may not actually be logged on to the same node that is currently hosting the SQL
Server instance and thus is considered "remote". Therefore, this setting should usually be enabled (1) for SQL Server
failover clusters; otherwise, it should be disabled (0).
Recommendation:
Run the following T-SQL command:
Vulnerability:
The scan for startup procedures option, if enabled, causes SQL Server to scan for and automatically run all stored
procedures that are set to execute upon service startup. Setting Scan for Startup Procedures to 0 will prevent certain
audit traces and other commonly used monitoring stored procedures from re-starting on start up. Additionally,
replication requires this setting to be enabled (1) and will automatically change this setting if needed.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'.
Recommendation:
Run the following T-SQL command:
> EXECUTE sp_configure 'show advanced options', 1; RECONFIGURE; EXECUTE sp_configure 'scan
for startup procs', 0; RECONFIGURE;
GO
EXECUTE sp_configure 'show advanced options', 0; RECONFIGURE;
Vulnerability:
The TRUSTWORTHY database option allows database objects to access objects in other databases under certain
circumstances. Provides protection from malicious CLR assemblies or extended procedures.
Possible Values:
Enabled or 'ON'
Disabled or 'OFF'
Best Practice:
Recommendation:
Run the following T-SQL command for the databases where this property is turned on:
Vulnerability:
SQL Mail provides a mechanism to send, receive, delete, and process e-mail messages using SQL Server in 2008 R2
or Before.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'.
Recommendation:
Run the following T-SQL command:
> EXECUTE sp_configure 'show advanced options', 1; RECONFIGURE; EXECUTE sp_configure 'SQL
Mail XPs', 0; RECONFIGURE;
GO
EXECUTE sp_configure 'show advanced options', 0; RECONFIGURE;
Vulnerability:
Enabling Ad Hoc Distributed Queries allows users to query data and execute statements on external data sources. This
feature can be used to access remotely and exploit vulnerabilities on remote SQL Server instances and to run unsafe
Visual Basic for Application functions.
Possible Values:
Any port available in the server.
Best Practice:
The port can be anything but the default 1433.
Recommendation:
Note: The connection settings of any application that uses port number to communicate with SQL server needs to
be reconfigured while changing the port of SQL server.
Vulnerability:
Non-clustered SQL Server instances within production environments should be designated as hidden to prevent
advertisements by the SQL Server Browser service. However, clustered instances may break if this option is selected. If
you hide a clustered named instance, the cluster service may not be able to connect to the SQL Server.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '1'.
Recommendation:
Using GUI,
Note:
Restart the SQL Server service.
Applications that use SQL Browser service to discover SQL Server instance will not be able to discover the
instance automatically if 'Hide Instance' is enabled. Either the 'Hide Instance' should be temporarily
disabled or port number should be used to connect to SQL Server instance.
Vulnerability:
The sa account is a widely known and often widely used SQL Server account with sysadmin privileges. This is the
original login created during installation and always has the principal_id=1 and sid=0x01. Enforcing this control reduces
the probability of an attacker executing brute force attacks against a well-known principal.
Possible Values:
Enabled
Disabled
Best Practice:
It is not a good security practice to code applications or scripts to use the sa account. However, if this has been done,
disabling the sa account will prevent scripts and applications from authenticating to the database server and executing
required tasks or functions.
Recommendation:
Run the following T-SQL command:
Vulnerability:
It is easier to launch password-guessing and brute-force attacks against the sa login if the name is known.
Possible Values:
Any set of characters that are allowed by Microsoft SQL login name restrictions
Best Practice:
The sa Login should be renamed.
Recommendation:
Run the following T-SQL command:
Note: The applications which use sa login to authenticate SQL Server connection need to be reconfigured with
different user while altering the sa login.
15. XP CMDSHELL
Description:
Ensure 'xp_cmdshell' Server Configuration Option is set to '0'
Vulnerability:
The xp_cmdshell option controls whether the xp_cmdshell extended stored procedure can be used by an authenticated
SQL Server user to execute operating-system command shell commands and return results as rows within the SQL
client.The xp_cmdshell procedure is commonly used by attackers to read or write data to/from the underlying Operating
System of a database server.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '0'.
Recommendation:
Vulnerability:
AUTO_CLOSE determines if a given database is closed or not after a connection terminates. If enabled, subsequent
connections to the given database will require the database to be reopened and relevant procedure caches to be
rebuilt.
Possible Values:
Enabled or 'ON'
Disabled or 'OFF'
Best Practice:
This configuration should be set to 'OFF'.
Recommendation:
Run the following T-SQL command for databases where this configuration is 'OFF':
Vulnerability:
The sa login (e.g. principal) is a widely known and often widely used SQL Server account. Therefore, there should not be
a login called sa even when the original sa login (principal_id = 1) has been renamed.
Possible Values:
Login names can be of any set of characters allowed by Microsoft SQL Login name guidelines.
Best Practice:
No Logins should be named as 'sa'.
Recommendation:
Run the following T-SQL command for logins where name is 'sa':
Note: The applications which use the altered logins to authenticate SQL Server connection need to be
reconfigured another user with equivalent privileges.
Vulnerability:
The clr strict security option specifies whether the engine applies the PERMISSION_SET on the assemblies in SQL Server
2017 and 2019.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
This configuration should be set to '1'.
Recommendation:
Run the following T-SQL command:
> EXECUTE sp_configure 'show advanced options', 1; RECONFIGURE; EXECUTE sp_configure 'clr
strict security', 1; RECONFIGURE;
GO
EXECUTE sp_configure 'show advanced options', 0; RECONFIGURE;
Vulnerability:
Windows provides a more robust authentication mechanism than SQL Server authentication.
Possible Values:
SQL Server Authentication
Windows Authentication
Mixed Authentication
Recommendation:
Using GUI,
Vulnerability:
A login assumes the identity of the guest user when a login has access to SQL Server but does not have access to a
database through its own account and the database has a guest user account. Revoking the CONNECT permission for
the guest user will ensure that a login is not able to access database information without explicit access to do so.
Possible Values:
The guest users might have or might not have CONNECT permissions.
Best Practice:
CONNECT permission for guest users must be revoked in all databases except for master, msdb and tempdb.
Recommendation:
Run the following T-SQL command for the databases with guest connect permission on:
Vulnerability:
A database user for which the corresponding SQL Server login is undefined or is incorrectly defined on a server
instance cannot log in to the instance and is referred to as orphaned and should be removed. Orphan users should be
removed to avoid potential misuse of those broken users in any way.
Possible Values:
A Database might have or might not have any orphaned users
Best Practice:
No orphaned users must be present in a database server.
Recommendation:
Run the following T-SQL command for all the orphaned users:
Note: The orphaned users can be troubleshooted if possible. Refer Microsoft learn for further details.
Vulnerability:
Contained databases do not enforce password complexity rules for SQL Authenticated users. The absence of an
enforced password policy may increase the likelihood of a weak credential being established in a contained database.
Possible Values:
SQL Server Authentication
Windows Authentication
Mixed Authentication
Best Practice:
This configuration should be set to 'Windows Authentication Mode'.
Note: Applications that use dropped logins to authenticate the SQL server need to be reconfigured with different
logins.
Vulnerability:
The 'public' is a special fixed server role containing all logins. Unlike other fixed server roles, permissions can be
changed for the public role. In keeping with the principle of least privileges, the public server role should not be used to
grant permissions at the server scope as these would be inherited by all users. Every SQL Server login belongs to the
public role and cannot be removed from this role. Therefore, any permissions granted to this role will be available to all
logins unless they have been explicitly denied to specific logins or user-defined server roles. When the extraneous
permissions are revoked from the public server role, access may be lost unless the permissions are granted to the
explicit logins or to user-defined server roles containing the logins which require the access.
Possible Values:
Any number of permissions might be given to public role.
Best Practice:
No extraneous permission must be given to public role and should be removed if given and delegated to user defined
role if needed.
Recommendation:
Add the extraneous permissions found in the results to the specific logins to user-defined server roles which require the
access.
Vulnerability:
The BUILTIN groups (Administrators, Everyone, Authenticated Users, Guests, etc.) generally contain very extensive
memberships which would not meet the best practice of ensuring only the necessary users have been granted access
to a SQL Server instance. These groups should not be used for any level of access into a SQL Server Database Engine
instance.
Possible Values:
Any group may it be BUILTIN or user defined, they can be SQL Logins.
Best Practice:
The Windows BUILTIN groups must be removed from SQL Logins. Note that before dropping the BUILTIN group logins,
ensure that alternative AD Groups or Windows logins have been added with equivalent permissions. Otherwise, the
SQL Server instance may become totally inaccessible.
Recommendation:
Using GUI,
Vulnerability:
Local Windows groups should not be used as logins for SQL Server instances. Allowing local Windows groups as SQL
Logins provides a loophole whereby anyone with OS level administrator rights (and no SQL Server rights) could add
users to the local Windows groups and give themselves or others access to the SQL Server instance.
Possible Values:
Best Practice:
The Windows Local groups must be removed from SQL Logins. Note that before dropping the Local group logins,
ensure that alternative AD Groups or Windows logins have been added with equivalent permissions. Otherwise, the
SQL Server instance may become totally inaccessible.
Recommendation:
Using GUI,
Vulnerability:
Granting access to SQL Agent proxies for the public role would allow all users to utilize the proxy which may have high
privileges. This would likely break the principle of least privileges.
Possible Values:
The public role might have access to any number of proxies.
Best Practice:
Revoke any agent proxy access to public role. Before revoking the public role from the proxy, ensure that alternative
logins or appropriate user-defined database roles have been added with equivalent permissions. Otherwise, SQL
Agent job steps dependent upon this access will fail.
Recommendation:
Using GUI,
Open SQL Server Management Studio → Connect to the database → Select Server SQL Agent → Select the
proxy in interest → Right Click and select Properties → Add specific security principals which require access.
Alternatively use sp_grant_login_to_proxy T-SQL. Refer Microsoft learn for further details.
Revoke access to the <proxyname> from the public role using the following T-SQL command:
Vulnerability:
Applies the same password expiration policy used in Windows to passwords used inside SQL Server if turned on. Else
the passwords in use might be weak.
Possible Values:
Enabled or 'ON'
Disabled or 'OFF'
Best Practice:
This option should be set to 'ON'. This is a mitigating recommendation for systems which cannot follow the
recommendation to use only Windows Authenticated logins.
Recommendation:
Run the following T-SQL command for the login names where check expiration is set to 'OFF':
Vulnerability:
Applies the same password complexity policy used in Windows to passwords used inside SQL Server if turned on. Else
the passwords in use might be weak.
Possible Values:
Enabled or 'ON'
Disabled or 'OFF'
Best Practice:
This option should be set to 'ON'. The setting is only enforced when the password is changed. This setting does not force
existing weak passwords to be changed. Thus existing passwords need to be changed manually.
Recommendation:
Run the following T-SQL command for the login names where check policy is set to 'OFF':
Vulnerability:
SQL Server error log files must be protected from loss. The log files must be backed up before they are overwritten.
Retaining more error logs helps prevent loss from frequent recycling before backups can occur.
Possible Values:
All positive numerical values
Best Practice:
This option should be set to greater than or equal to 12.
Recommendation:
Using GUI,
Vulnerability:
The default trace provides audit logging of database activity including account creations, privilege elevation and
execution of DBCC commands.
Possible Values:
Enabled or '1'
Disabled or '0'
Best Practice:
Recommendation:
Run the following T-SQL command:
Vulnerability:
This setting will record failed authentication attempts for SQL Server logins to the SQL Server Errorlog. Capturing failed
logins provides key information that can be used to detect or confirm password guessing attacks. Capturing successful
login attempts can be used to confirm server access during forensic investigations, however, using this audit level
setting to also capture successful logins creates excessive noise in the SQL Server Errorlog which can hamper a DBA
trying to troubleshoot problems.
Possible Values:
None
Failed
Successful
Both Failed and Successful
Best Practice:
This configuration should be set to 'failure'.
Recommendation:
Using GUI,
Vulnerability:
SQL Server Audit is capable of capturing both failed and successful logins and writing them to one of three places: the
application event log, the security event log, or the file system. By utilizing Audit instead of the traditional setting under
the security tab to capture successful logins, we reduce the noise in the ERRORLOG.
Possible Values:
Any number of Server Audits might be present in a Server with Audit Action Type of AUDIT_CHANGE_GROUP,
FAILED_LOGIN_GROUP and SUCCESSFUL_LOGIN_GROUP.
Best Practice:
There should be atleast one Server Audit specification must be created/present with following audit names:
AUDIT_CHANGE_GROUP
FAILED_LOGIN_GROUP
SUCCESSFUL_LOGIN_GROUP
Recommendation:
Using GUI,
Alternatively run the following T-SQL command replacing <Enter audit name here> and <Enter audit spec name here>:
Vulnerability:
Setting CLR Assembly Permission Sets to SAFE_ACCESS will prevent assemblies from accessing external system
resources such as files, the network, environment variables, or the registry. Assemblies with EXTERNAL_ACCESS or
UNSAFE permission sets can be used to access sensitive areas of the operating system, steal and/or transmit data and
alter the state and other protection measures of the underlying Windows Operating System.
Possible Values:
SAFE_ACCESS
EXTERNAL_ACCESS
UNSAFE
Best Practice:
All CLR Assemblies should have the permission set to 'SAFE_ACCESS' except for those which are Microsoft-created
(is_user_defined = 0) are excluded from this check as they are required for overall system functionality. The remediation
measure should first be tested within a test environment prior to production to ensure the assembly still functions as
designed with SAFE permission setting.
Recommendation:
Run the following T-SQL command:
Vulnerability:
Possible Values:
DES
Triple DES
TRIPLE_DES_3KEY
RC2
RC4
128-bit RC4
DESX
128-bit AES
192-bit AES
256-bit AES
Best Practice:
All Symmetric keys in database must use 'AES_128' or higher as encryption algorithm.
Recommendation:
Refer Microsoft learn for learning about Altering symmetric key.
Vulnerability:
Microsoft Best Practices recommend to use at least a 2048-bit encryption algorithm for asymmetric keys. The
RSA_2048 encryption algorithm for asymmetric keys in SQL Server is the highest bitlevel provided and therefore the
most secure available choice.
Possible Values:
512 bit
1024 bit
2048 bit
Best Practice:
Asymmetric key size should be set to greater than or equal to 2048 bits.
EventLog Analyzer provides basic and advanced search functionalities. Types of search queries supported are wild-
card, phrase, boolean, grouped searches.
2. Click Pick device and select the devices across which you want to search. Click Add. If nothing is specified in this
field, log search will be carried out across all available devices.
Type the field name and value into the Search box.
Note: The result graph is displayed for a period of two weeks only.
Comparison operators:
You can use the following comparison operators: =, !=, >, <, >=, <=.
Wild-card characters:
You can use the following wild-card characters: ? for a single character, * for multiple characters.
Phrases:
Use double quotes ("") to specify a phrase as the field value.
For example, if the archive period is set to 30 days and the retention period 90 days, logs less than 30 days old will be
available for searching. And, logs older than 30 days but less than 90 days will be archived.
To search for logs beyond the archive period (30 days in this case), these archived logs need to be unarchived first
before they can be made available for searching. This process takes some time depending on the log size. The log data
will be available as and when a zip file gets unarchived.
Free space, Expected unarchive size, Number of zip, and whether the user wants to proceed with unarchiving
or cancel the option and return to normal search.
2. This flow for unarchiving logs is the same for all the other tabs of EventLog Analyzer such as Dashboard,
Reports, Compliance, Correlation, and Alerts.
4. To save as search, click Save Search. Enter a name without space. Click Save.
6. To save as an alert, click Save as Alert. In the window that opens, click Save (see Create alert profile).
Enhancements
Edit graph:
After clicking on Edit Widget, you can choose Graph Type, Chart Type, and Graph Color, and the changes will be
reflected accordingly.
Graph selection:
When you choose a specific section of the graph by dragging the cursor, the table will automatically adjust to show data
within that time range, and the graph will be highlighted according to its chart type. You'll also notice an option to clear
the selection becomes available. It's important to note that in this case, the chosen time range will not be updated in the
calendar.
If you require an exact time range, you can utilize the Select query with date option.
Search History:
Search requests will be saved in your browser's local storage and displayed as a Search History list. This list can
contain up to 50 entries. When the limit is reached, older entries will be deleted to accommodate new ones. If you
perform a search with the same criteria as an existing entry in the search history, the new query will replace the previous
one.
To share a search with other technicians, select the Saved Search option from the More dropdown menu and then click
Share.
Note: When a search is shared to a role, they won't have the ability to delete the shared search. The same applies
for the guest users too.
Alternatively, you can also click on Choose, which will redirect you to the following page where all the technician names
along with their role can be seen.
EventLog Analyzer allows administrators to create custom (new) fields or extract fields from raw logs by using the
interactive Field Extraction UI to create regular expression (RegEx) patterns to help EventLog Analyzer to identify, parse
and index these custom fields from new logs it receives from network systems and applications.
Note: Alternatively, you can also extract additional fields while importing the log file.
You can view the extracted field details in the Event Information window. If the required value is not parsed, you
can extract further fields by clicking the Extract Additional Fields.
Regex method
Delimiter method
Provide a name for this field. Optionally, specify the prefix and suffix to the field value.
Click on Create Pattern to generate a parser rule pattern.
Validate link is used to test the generated pattern against the previous search results. You can manually check the
suitability of the pattern by analyzing the 'Matched Log Messages' and 'Unmatched Log Messages' displayed.
Click on Choose another pattern to choose a pattern from the list of patterns generated by the application.
You can define any existing field matching criteria to apply the pattern for this specific log type.
Save the pattern to extract the field(s) from the upcoming logs.
2. Click on the tag icon on the right side of any log entry in the displayed search result.
Note: You can also edit tags on the search results page by clicking the edit icon below the tag name.
Note: Typing # provides you with a list of all created tags for ease of selection.
2. Click on the delete icon beside the tag name in the tag table. Click Yes in the pop-up.
The tag name and the notes added to the tag should contain only alphanumeric characters.
Tag criteria can be edited only by the user who created the tag and EventLog Analyzer users with
Administrative privilege.
Any user of EventLog Analyzer can add a note to a tag, irrespective of the creator of the tag.
12.1.1. Overview
The Incident workbench is Eventlog Analyzer's investigation console that unifies analytics of the core entities
such as users, processes, and threat sources.
This feature facilitates users to add, compare, and analyze data with enriched integrations like UEBA and
Advanced Threat Analytics.
Utilize the contextual assesment with risk based profiling, conduct faster root cause analysis by probing the
process trees, and minimize the overall time taken to investigate and resolve threats.
Features:
Here are the entities you can analyze using Incident Workbench:
Users
Analytics offered: ML-based user activity and risk score data compiled through UEBA integration from Log360's
suite.
Process
Analytics offered: Process hunting tree with parent-child relationships and event timeline.
Threat sources
Analytics offered: Risk analysis from security vendors using Advanced Threat Analytics integration.
From Reports
1. Check the Access page to learn how to invoke Incident Workbench from different dashboards of EventLog
Analyzer.
2. To get user analytics, you can click on any of the following fields that uniquely identify a user:
Username
Target User
VPN UserName
User Principal Name
Destination User
Sourceuser
Subject Username
The following data will be available in the user analytics section of the Incident Workbench:
Other than the risk score analysis, the following messages will be displayed for the specific cases:
User Account Management Tracks create, modify, and delete actions related to the user account.
Device Severity Events Consolidates the device severity events for the devices accessed by the user
Active Sessions Overview Shows the list of active sessions on different devices and their duration
Software Installations and List of softwares installed, uninstalled and updated by the user during the
Updates selected period
This sections fetches the Active Directory object details such as:
User Details
Contact Details
Terminal Server Details
Account Details and
Object Details
Note: Minimize the tab to access the Incident Workbench while you traverse through different pages in EventLog
Analyzer. As long as you don't close the workbench, the analysis will be available even if you log out of EventLog
Analyzer and login again. You can also save it to an existing incident or create a new one.
Note:
1. Check the Access page to learn how to invoke the Incident Workbench from different dashboards of EventLog
Analyzer.
2. To access the process hunting tree, you can click on any of the following fields that uniquely identify a
process:
Process Id
Parent Process ID
Process GUID
Parent Process GUID
Process Name
Parent Process Name
3. The process spawning will be available in graphical format for upto 50 child processes.
4. The Process being analyzed currently will be highlighted in orange and the rest of the linked processes will be in a
different color.
5. Select the dropdown button next to the process tree to alternate between different graphical formats
Domain
Canonical Name
Client Domain
URL Site
IP Analysis:
Remote DeviceIp
Source IP
Client IP Address
Server IP Address
Address
Destination IP
Device Ip
Remote Ip
Source Host Address
NAT Source Address
NAT Destination Address
Destination IP
Original Client IP
IP Address
Endpoint IP
Private Ip
Target Ip
Source Device
Target Machine
Destination Host Address
Target Device
URL Analysis:
Payload URL
Object Url
URL
Note: Check out the Advanced Threat Analytics page to learn about the configuration and analysis.
When you purchase Advanced Threat Analytics, you also gain access to Dark Web monitoring. You can use your domain
to enable Dark Web monitoring. This feature actively scans for any compromise of user data on the Dark Web and sends
alerts. Compromised data can include credentials, credit card information, and more. With this information, the
security analyst can gain insight into the depth of the breach and the type of information that has been breached.
Note: Check out the Advanced Threat Analytics page to learn about the configuration and analysis.
Note: Minimize the tab to access the Incident Workbench while you traverse through different pages in EventLog
Analyzer. As long as you don't close the workbench, the analysis will be available even if you log out of EventLog
Analyzer and login again. You can also save it to an existing incident or create a new one.
Note: You can add upto 20 analysis tabs in a single instance of the Incident Workbench. If you want to analyze
more entities you will have to close the current instance, and open a new one.
1. Click on Add to Incident in the top right corner of the Incident Workbench to save the instance.
2. The dropdown contains the list of existing incidents. Use the search bar to find specifc incidents and add the
Incident Workbench instance.
3. Once you select the incident, the following page will appear. Assign a person to handle the incident, add severity
and status, and set the deadline to resolve the incident.
5. Once the instance has been saved, you'll get the success message notification. The Click here link in the
notification will lead you to the incident management console.
Access:
Users can access the Device Summary from multiple dashboards of EventLog Analyzer such as Reports, Log Source,
Alerts, Incidents and others.
SQL Overview
The alerts are categorized on three severity levels: Attention, Trouble, and Critical. The severity level indicates the
degree of importance associated with the alert. This helps you prioritize alerts and remediate them quickly.
EventLog Analyzer offers a powerful real-time event response system with which you can generate:
You can also designate a workflow for a triggered alert to automatically initiate responses such as disabling the affected
Active Directory user account, shutting down a system, and killing a process.
The list of all alerts triggered can be viewed under the Alerts tab.
7. Clicking on +Add near the Alert Format Message section will open another pop-up. There you can set the variables
by clicking on the drop down and enter the required message format in the space provided.
Threshold
You can set the threshold for alerts based on the number of occurrences of an event within a specific time frame.
There are 2 threshold modes: Manual and Smart.
Using the Manual Threshold mode, you will have to manually assess and set the values for the number of
events and the time interval in minutes.
Using the Smart Threshold mode, you will only have to enter the time interval. EventLog Analyzer will
analyze the usual occurrence of events based on ML algorithms and automatically determine the number of
events that will be ideal for reducing false positive triggers.
Select the preferred time during which the notification has to be sent.
Choose the preferred medium for receiving notifications. You can either choose Email Notification or SMS
Notification or both. You can find the steps to configure the mail server and SMS server here.
Workflow
Predefined Alerts
Select Predefined Alert under Define Criteria:
Select the log type and then choose the desired category.
Among the reports, select the desired report by clicking on the radio button next to it.
Append new criteria to predefined alert by clicking + Add Criteria.
You can use the Advanced settings to tweak the alert trigger conditions in order to reduce alert noise. Here you
can set the threshold (number of occurrences of an event within a specific time frame) and time range (working
hours) for the alert profile.
You can then specify the notification type for the alert profile.
Compliance Alerts
Compliance alerts contain sets of pre-defined compliance related alerting criteria to notify you of any violation of IT
regulations. EventLog Analyzer provides granular audit reports to help you comply with compliance regulations such as
PCI DSS, SOX, HIPAA, GLBA, PDPA, NIST, CCPA, GDPR, ISO 27001:2013, and more. The compliance alerts detects
anomalies such as policy changes, privilege escalations, sensitive file access and modification events, and
unauthorized logons to help you mitigate internal and external threats.
You can then specify the notification type for the alert profile created.
You can define 'n' number of criteria and group them with AND/OR operations.
To define alert criteria, choose desired attributes from the predefined list.
Specify the values for the attributes. Select the comparator and then provide the value for the attributes.
With drag and drop, you can group and ungroup the alert criteria.
To generate alert for specific custom extracted field of imported log, choose the log type and select the imported log for
which you need to trigger alerts. Specify the custom field and its value, upon the occurrence of which the alert has to be
triggered. EventLog Analyzer will automatically populate all the custom extracted fields for the selected log type and you
choose the field of your choice from the list and then specify the value for the selected custom field.
You can then specify the notification type for the alert profile created.
Note: To utilize the vulnerability and misconfiguration comparators, please configure data enrichment for
ManageEngine Endpoint Central. Click here to know how.
You can edit, enable, disable, and delete the default alert profiles.
Note: When you edit a default custom alert profile, auto-addition will be stopped. For example, if you manually add
devices to an alert profile, devices will not be automatically added to that alert profile from then on.
The Filter Alerts pop-up opens. Here, you can select the appropriate filter options based on the various Alert
Parameters and Alert Criteria-Based Fields available.
You can also create custom views for alerts by configuring a filter for the alert and clicking Apply. Click the Save As View
link to enter a name for the view and click Save.
The custom views can only be viewed by the respective users who created the views. Hover your mouse pointer over the
created view in the Select View drop-down menu to edit and delete the created views.
Alert Configurations
You can access the following options from the top right corner of the Alerts page:
The Export As drop-down menu allows you to export alert messages in the CSV and PDF formats.
Click the settings icon on the top right corner of the page to view the following options:
Workflow: This option allows you to assign workflows to alert profiles to execute a logical action in your network
when an adversity is detected.
Ticketing tool Integration: This option allows you to configure an external help desk software (ServiceDesk
Plus, ServiceNow, Jira Service Desk, Zendesk, Kayako, and BMC Remedy Service Desk) to forward the alerts to.
Whitelisting Threats
Click on the check boxes to select the required alerts. Once the alerts are selected, the options Assign, Status, Delete,
and More will appear. You can assign the alert to an administrator, change the status, or delete the alerts by choosing
the appropriate options.
Clicking on More will give you the option to Whitelist the Source. In case an alert is raised by Advanced Threat
Analytics and you are convinced that the source is not malicious, you can whitelist it by choosing the option here.
Hovering over the alert gives additional information such as what triggered the alert, the domain, the device involved
and more.
Details such as SL Event ID, Logon Type and more can be obtained by clicking on More Details.
Workflow status
In case a workflow is configured for the alert, the status of the workflow can be viewed in the Alert Format Message pop-
up.
Threshold alerts
For Threshold based alerts, you can now view each instance by clicking on the alert. There will be a section called
Threshold.
Note: The default columns cannot be removed and rearranged. The default columns are Time, Notes, and Alert
Format message.
Further, you can also remediate the alert condition by creating incident workflows.
1. Enable the Email Notification check box under the Notification Settings tab to enable email notifications.
2. Choose Send Notification: Choose the desired frequency for receiving alert notifications. This will notify you
whenever an alert has been triggered, based on the frequency you set.
All Alerts: An alert notification will be generated for each alert created.
Once a day: An alert notification will be generated only once daily.
Once a week: An alert notification will be generated weekly once.
Once a month: An alert notification will be generated monthly once.
Custom: You can also tailor the notification schedule by predetermining the exact number of days, hours
and minutes between each notification.
Note: The email content of correlation alerts can be customized to include the rule name, correlated time,
and the action. Furthermore, you can select and add specific fields of the action by choosing them from the
list that appears when the action is clicked. Please refer to the image below.
6. If the mail server is not configured in EventLog Analyzer, you will be prompted to when Notify by Email option is
selected.
1. Enable the SMS Notification check box under Notification Settings tab checkbox to enable SMS notifications.
2. Enter the recipient’s number.
3. You can customize the SMS content by clicking Add More Fields next to SMS Message field.
If SMS settings is not configured in EventLog Analyzer, you will be prompted to set it when Notify by SMS option is
selected.
Note: Notification using Run Program can now be configured with Incident Management Workflows.
Navigate to Alerts → Alert Configurations → Manage Alert Profiles → Select the update
OnDemand Workflows
Users can run workflows and view their statuses directly from the Alerts console.
Select an Alert and click the Run Workflow button under Workflow Status.
You can select Associate to Alert Profile to assign a workflow to the alert profile on the dashboard directly.
You can check the status of the workflow by clicking Workflow History.
Note: Only users with permissions to view, add, edit, and delete requests can proceed with the configuration.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From
the Ticketing Tool drop-down list, select ManageEngine ServiceDesk Plus On-Demand.
1. Choose Data Center in drop-down list. Click API Registration URL to generate Client ID and Client Secret ID.
4. To create a new client, enter the required details. Enter the redirect URL as given in the EventLog Analyzer console
and click Create.
7. Enter the Subject and the Message for the alert. You can either select them from the predefined list available under
Macros or enter your own. Click the Test and Save button. On clicking the Test and Save button, a verify popup will
be displayed. Click the URL to approve the usage of the clients of ServiceDesk Plus On-Demand.
Note: Only users with the super admin or the alarm admin role can proceed with the configuration.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From
the Ticketing Tool drop-down list, select ManageEngine AlarmsOne.
1. Open ManageEngine AlarmsOne and click the Applications icon, then click Applications(+) button in the left panel.
From the list displayed, select Custom API Integration.
2. Enter an Application Label and Application Name. If a notification profile is already configured, select it. Click Add.
You can also associate a notification profile later.
4. Click API Registration URL in EventLog Analyzer, to generate a Client ID and Client Secret ID.
9. Back in the ELA console, paste the Webhooks URL, Client ID, and Client Secret ID in the required fields.
For ServiceNow
Note: Only users who have been granted permissions to execute create, read, write, and delete operations on the
incident table can proceed with the configuration.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From
the Ticketing Tool drop-down list, select ServiceNow.
2. Enter the login name and password of a valid account in the ticketing tool.
4. Click the Test and Save button to establish communication and complete configuration.
Note: Only users with permissions to create, delete, and edit issues can proceed with the configuration.
To configure EventLog Analyzer with Jira Service Desk On-Demand, you need to first get some details from your Jira
ticketing tool. Go to the Official JIRA Cloud Doc to get the API Token.
1. After logging into your Jira Service Desk On-Demand account, click the settings icon on the top right corner and
select Projects.
2. In the project list, note down the Key corresponding to the project in which you want your tickets to be raised.
3. Click the settings icon on the top right corner and select Issues.
4. Note down the type of issues that the particular project can hold. The issues raised from EventLog Analyzer should
have the same type for a ticket to be successfully raised in Jira Service Desk On-Demand.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From
the Ticketing Tool drop-down list, select Jira Service Desk On-Demand.
4. Enter the Project ID. This is the Key of the particular project noted from the ticketing tool.
5. Enter the type of issue. This has to be the same issue type that the project has been configured to hold.
7. Click the Test and Save button to establish communication and complete configuration.
For Zendesk
Note: Only users with Admin/Agent privilege can proceed with the configuration.
To configure EventLog Analyzer with Zendesk, you will need to retrieve some information from your Zendesk ticketing
tool:
1. After logging into your Zendesk account, click the tray icon in the top bar and click Admin Center.
2. In Admin Center, click Apps and integrations in the sidebar > select APIs > Zendesk API > OAuth Clients.
4. Enter the client name, description, and name of the company. Select a logo.
5. The value that appears corresponding to Unique Identifier needs to be saved in a separate document. This would be
needed while configuring Zendesk in EventLog Analyzer.
6. Once you click Save, a secret code will appear above the Save button. Click Copy and save it in a separate
document. This would also be needed while configuring Zendesk in EventLog Analyzer.
7. Click Close and open EventLog Analyzer to complete the configuration process.
1. Click the Admin icon in the sidebar, then select Channels → API.
2. Click the Settings tab, and make sure Token Access is enabled.
4. Optionally, enter a description under API Token Description. The token is generated, and displayed.
5. Copy the token, and paste it somewhere secure. Once you close this window, the full token will never be displayed
again.
6. Click Save to return to the API page. A truncated version of the token is displayed.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From
the Ticketing Tool drop-down list, select Zendesk.
3. If you choose OneAuth under Authentication, follow the steps given below.
Enter the Client ID in the corresponding field. This is value of the Unique Identifier noted from the ticketing
tool.
Enter the Client Secret ID in the corresponding field. This is the value of the secret code obtained from the
ticketing tool.
4. If you choose Basic API under Authentication, follow the steps given below:
Click on Steps to Generate API Key for steps to generate an API key.
Follow the given steps to generate the API key. After generation, provide the API key in the corresponding
field.
6. Click the Test and Save button to establish communication and complete configuration.
For Kayako
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From the
Ticketing Tool drop-down list, select Kayako.
2. Enter the emailId and password of a valid user in the ticketing tool.
3. Enter the Subject and the Message for the alert. You can select them from a predefined list available under Macros
or type your own.
4. Click the Test and Save button to establish communication and complete configuration.
For FreshService
Note: Only users with either of the following privileges can proceed with the configuration:
Permissions to create, reply, edit, and delete tickets.
Or
To configure EventLog Analyzer with FreshService, you need to first get some details from your FreshService ticketing
tool. Go to the official Freshservice Doc to get the API Token.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From the
Ticketing Tool drop-down list, select Freshservice.
4. Enter the Summary and the Description for the alert. You can select them from the predefined list available under
Macros or type your own.
5. Click the Test and Save button to establish communication and complete configuration.
Note: Only users with permissions to view, add, edit, and delete requests can proceed with the configuration.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From the
Ticketing Tool drop-down list, select ManageEngine ServiceDesk Plus.
4. Enter the Integration Key in the appropriate column. If you do not have an API key click on Steps to Generate API Key
for instructions on generating an API key in ServiceDesk Plus.
5. Enter the Subject and the Message for the alert. You can choose them from a predefined list available under Macros
or type your own.
Note: Only users with permissions to view, add, edit, and delete requests can proceed with the configuration.
In EventLog Analyzer, navigate to the Alerts tab and click Ticketing Tool Integration under Alert Configuration. From the
Ticketing Tool drop-down list, select ManageEngine ServiceDesk Plus MSP.
4. Enter the API key in the appropriate column. If you do not have an API key, click Steps to Generate API Key for
instructions on generating an API key in ServiceDesk Plus MSP.
5. Enter the Subject and the Message for the alert. You can choose them from the predefined list available under
Macros or type your own.
1. After logging into your Jira Service Desk account, click the settings icon on the top right corner and select Projects.
2. In the project list, note down the Key corresponding to the project in which you want your tickets to be raised.
3. Navigate to the Issues tab and reenter your username and password when prompted.
4. Note down the type of issues that the particular project can hold. The issues raised from EventLog Analyzer should
have the same type for a ticket to be successfully raised in Jira Service Desk.
5. Close Jira Service Desk and open EventLog Analyzer to complete the configuration process.
4. Enter the login name and password of the account having admin privileges.
5. Enter the project ID. This is the Key of the particular project noted from the ticketing tool.
6. Enter the type of issue. This needs to be same as the issue type that the project has been configured to hold.
7. Enter the Summary and the Description for the alert. You can select them from a predefined list available under
Macros or type your own.
8. Click the Test and Save button to establish communication and complete configuration.
4. Enter the login name and password of the account having admin privileges.
5. Enter the Description for the alert. You can choose it from a predefined list available under Macros or type your own.
6. Click the Test and Save button to establish communication and complete the configuration.
In the Manage Profiles tab, you can add, enable, disable, export, and import alert profiles.
Here, you can also filter a specific category of alert profile by selecting the required option from the drop-down.
Select the file from which you wish to import the alert profiles by clicking on Browse.
In case an imported alert profile is similar to an existing alert profile, you will get the message below. To overwrite an
existing profile with an imported profile, select the required profile and click on Import.
EventLog Analyzer allows you to import these rules in the Alerts tab.
From Alerts:
Navigate to the Alerts tab, and select Manage Profiles. Choose the Import option.
Click Save to finalize the import process. EventLog Analyzer will store the imported Sigma rule profile along with
its defined criteria.
To export alert profiles, select the required alert profiles and click on Export.
To filter alert profiles based on the number of alerts raised, click on the number of alerts under the No. of Alerts column.
3. Choose the delete option to remove specific alerts, or select the status option to change the status of alerts.
Note: Bulk modification queue will be paused when alerts unarchive process is running and resumes
automatically once the process is complete.
The incident page displays details such as the age of the incident, who created it, and when it was created. The Actors
widget contains the list of users, entities, services, and processes responsible for the incident to help the assignee
quickly investigate the incident and take remedial action.
In the Incident page, enter a name and description for your incident in the respective fields.
Select the assignee, severity, and status of your incident from the respective drop-down menus.
Click on Create.
You can view the incident creation event being logged in the Activity Logs pane.
You can also add an alert as evidence to an incident by selecting the alert, clicking on the +Add to Incident button, and
selecting the required incident from the list displayed. The alert can now be viewed under the Evidence tab of the
Navigate to the search tab and execute the required search query.
In the search results pane, click on the Incident button.
Now, select the search result(s) you want to add to an incident.
Click the +Add to Incident button and choose the incident to which you want to add the search result(s).
Alternatively, you can also create a new incident to map the selected search results by clicking the +Add New
Incident link.
If you're creating a new incident, enter a name and description for the incident. Select the assignee, status, and
severity from the respective drop-down menus.
Click Create.
You can now view the search results added as evidence under the Evidence tab of the incident.
Navigate to the Reports tab and click the report you want to add as an incident.
Click the Incident button and select the events of interest.
Click the +Add to Incident button and select the name of the incident to which you want to add the selected
events.
Alternatively, you can also create a new incident by clicking the +Add New Incident link.
If you're creating a new incident, enter a name and description for the incident. Select the assignee, status, and
severity from the respective drop-down menus.
Click Create.
You can now view the events of the report listed under the Evidence tab of the selected incidents.
Note: You can create up to 10 incident rules in your EventLog Analyzer instance. The solution is capable of
triggering up to fifty incidents per incident rule in a day.
Apply the filter and click the Save as View link to enter a name for the view and click Save. Custom views are personal to
the users who created them and can be viewed only by them. You can edit and delete the custom view by hovering your
mouse pointer over the created view in the Select View drop-down menu.
OnDemand Workflows
To run a workflow for an incident,
Select a workflow from the drop down menu and click Run.
The status of the workflow will be displayed under Remediation Taken in the top-right corner. The same will be
recorded in the exported report.
Note: Users can also run multiple workflows for a single alert or incident.
The list of workflow blocks and the details to be specified while configuring workflows using them are given
below:
Logic actions
Decision
Allows you to branch the workflow based on the
status of the previous action.
Time Delay
Allows you to introduce a time delay in the The time delay in minutes.
execution of the workflow.
Network actions
Process actions
Service actions
Windows actions
Linux actions
Notification actions
Disable User
The name of the user account you want to disable.
Allows you to disable a user's account.
Delete User
The name of the user account you want to delete.
Allows you to delete a user account.
Firewall Actions
Miscellaneous actions
Note: To utilize the Endpoint Central actions, please configure data enrichment for ManageEngine Endpoint
Central. Click here to know how.
7. You can enter a brief description for each logic block to record its purpose in the workflow. This makes it easier for
you to understand and edit the workflow later.
To edit an existing workflow you can click on the edit icon present against the workflow name in the Manage Workflow
page.
NOTE:
List of devices supported:
Managing workflows
You can view and edit existing workflows in EventLog Analyzer by navigating to the Alerts tab and clicking on Workflow
from the More tools icon. The Manage Workflows page displays the list of workflows, their descriptions, the number of
alert profiles associated with each workflow, and their histories. You can enable or disable, delete, edit, and copy the
workflows by clicking on the respective icons.
Click on the Workflow Credentials link present in the Manage Workflow page.
Select credential type as Linux Devices.
Enter the username, password, and port number.
Click on Update to store and use these credentials to execute workflows in all Linux devices.
You can configure a set of common credentials for executing workflows in all Cisco devices using EventLog Analyzer by
following the steps given below:
Click on the Workflow Credentials link present in the Manage Workflow page.
Select credential type as Cisco Devices.
Enter the username and password.
Click on Update to store and use these credentials to execute workflows in all Cisco devices.
If the common credentials do not work for certain Cisco Devices, you need to configure the credentials for those devices
by following the steps given below:
Navigate to System from the sections listed on the left in the dashboard.
Click on the Admin Profiles under the System section.
Click the Create icon to start creating a new admin profile.
You will see the New Admin Profile window open up.
Enter an appropriate name for your admin profile.
Select access control permissions for different functionalities between None, Read, Read/Write or Custom.
Select Read/Write for both Policy and Address options under Firewall Option.
Click OK to create your new admin profile
Navigate to System from the sections listed on the left in the dashboard.
Select Administrators under System section.
Click on the Create New icon.
Select REST API Admin option.
You will see the New REST API Admin window open up.
Enter an appropriate username for your REST API admin profile.
Select your previously created Administrator Profile from the drop down menu.
Click on OK to confirm your New REST API Admin.
Note: In case you lose your newly generated API key, you can go back to the Administrator section and click on the
Regenerate icon.
After this process, You can configure a set of common credentials for executing workflows in all Fortigate devices using
EventLog Analyzer by following the steps given below:
Click on the Workflow Credentials present on the top-right corner of the Manage Workflow page.
Select credential type as Fortigate Devices.
Enter the generated API key along with the Username in the workflow credentials page.
Click on Update to store and use these credentials to execute workflows in all Fortigate devices.
Configuration
Operational Requests
Commit
You can configure a set of common credentials for executing workflows in all PaloAlto devices by following the steps
given below:
Click on Workflow Credentials on the top-right corner of the Manage Workflow page.
Select credential type as PaloAlto Devices.
Enter the created administrator Username/Password.
After generating the encrypted password, you can configure a set of common credentials for executing workflows in all
SophosXG devices by following the steps given below:
Click on the Workflow Credentials present on the top-right corner of the Manage Workflow page.
Select credential type as SophosXG Devices.
Enter the encrypted password along with the Username in the workflow credentials page.
Click on Update to store and use these credentials to execute workflows in all SophosXG devices.
After finishing the process, you can configure a set of common credentials for executing workflows in all Barracuda
CloudGen devices by following the steps given below:
Click on the Workflow Credentials present on the top-right corner of the Manage Workflow page.
Select credential type as Barracuda CloudGen Devices
Enter the generated Access Token along with the Username in the workflow credentials page.
Click on Update to store and use these credentials to execute workflows in all Barracuda CloudGen devices.
Only after the integration is complete, can any of these actions be carried out.
You can set up an integration in EventLog Analyzer to execute actions via ADManager Plus. Here are the steps:
1. Click on Workflow Credentials at the top-right corner of the Manage Workflow page.
2. Select credential type as ADManager Plus
3. Fill in the required details about the Host, Protocol, Port and Auth Token.
5. If the SOAR Workflow in ADManager Plus is not enabled, integration failure will occur.
6. After a successful integration, the user can begin constructing the workflow.
Note:
Event Log Analyzer version above 12430 and ADManager Plus version above 7224 are required for this
integration.
Integration must also be enabled for EventLog Analyzer in the ADManager Plus integration configuration
page.
One help desk technician (HDT) license can only be used to perform a maximum of 50 actions per day. To
perform more actions, ensure you have additional HDT licenses purchased in ADManager Plus.
The default admin account will not be considered as a HDT account.
4. Enable SOAR workflow by checking the Allow LOG360 SIEM to execute AD Management actions box.
5. Click the Test Connection and Save button.
6. This will enable SOAR workflow in ADManager Plus to execute workflow actions from EventLog Analyzer.
Navigate to the Manage Workflow page and click on the Workflow Credentials link.
Choose SNMP Trap as the credential type.
Enter the SNMP credential.
Note: Refer to the port management page for details on how to update credentials.
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Various attack techniques such as account manipulation, access token manipulation, and brute force to name a few are
associated with the tactics to help identify adverse events and anomalies. The framework is adopted globally to
facilitate easier communication among cyber security enthusiasts about the latest attack patterns.
Account Logon
Account Management
Directory Service Access
Logon/Logoff Events
Object Access
Policy Change
Privilege Use
Detailed Tracking
System Events
App Locker Auditing
Windows Defender Attack Surface Reduction
16.1. Configurations
Carry out the necessary configurations required for EventLog Analyzer functioning. You can carry out the following
configurations:
Manage Devices
Manage Device Groups
Applications
Database Audit
File Integrity Monitoring
Threat Management
Threat whitelisting
Threat Import
Switching threat stores
Manage Threat Source
VM Management
Manage Vulnerability Data
Log Forwarder
Manage Cloud Sources
Note: When you rename an AD device in domain, the device name automatically gets renamed in device
management too.
In this page, you can find three tabs: Windows Devices, Syslog Devices and Other Devices. Under Windows Devices,
you can use the Select Category drop-down menu to select a domain or workgroup.
1. Devices are displayed with the following icons: Search, Enable, Disable, Filter Change Monitor time interval, and
Delete. The Filter option lets you choose the devices for reports by their status (enabled/disabled), state
(active/inactive/decommissioned) and device group.
Quick Links
Configuring Auto Log Forward for Unix machines
Configure domains and workgroups
Manage Device Groups
Manage Devices
How to add a device?
Refer to Add Device.
Note: You can select multiple devices and configure them for either
Real-time log collection or Scheduled collection with a specific monitoring interval.
Log360 Cloud\EventLog Analyzer lets you collect logs from up to 25 devices in real-time per agent.
Note: The Log Collection Mode can be configured either for real-time log collection or for scheduled
collection with monitoring interval.
6. Click AD details to view object GUID - The unique identifier for a Domain object.
7. Click Advanced to edit Encoding Type and Time zone.
8. Click Update.
Note: Auto IP updation schedule will be disabled for devices which have manual IP selected.
2. Enable/Disable button: When 'Enable IP address automatically' is checked, automatic IP refresh will be enabled for
the devices. If it is unchecked, automatic IP refresh will be disabled.
3. Enable/Disable button will not show the status of automatic IP refresh of selected device.
4. By switching to Enable option and clicking on the save button, IP refresh will be performed on selected devices.
Important Note:
1. It is recommended that FIM be implemented for strictly necessary files and folders so as to avoid disk space
issues that may rise due to the high volume of generated logs.
2. In Windows FIM module, both Windows server and Windows file server license are required for monitoring.
Linux:
The following packages should be installed on the agent machine
openssh-server [For UI related operations]
auditd
acl
Ensure that,
SSH Port (default port 22) is reachable from the server.
ELA Server Port (default port 8400) is reachable from the agent machine.
To verify if a port is reachable, you can use the below commands:
> echo > /dev/tcp/[Server Machine HostName/IP]/[Server Port] && echo "Port is
Reachable"
(or)
Configuring FIM for Linux audits the following actions on Linux files:
Read
Write
Execute
Attribute change
Since auditd requires root or sudo privileges, if the user does not have the privileges, please follow the privileges steps.
To run AgentManager with sudo privileges for the Non-Sudo User, please follow the below instructions:
Example:
1. visudo -f /etc/sudoers.d/testuser
2. testuser ALL=NOPASSWD: /opt/ManageEngine/EventLogAnalyzer_Agent/bin/AgentManager *
Note: Ensure that AgentManager is added to the sudoers file prior to installation. To verify, follow the below
command.
cat /etc/sudoers.d/<username>
Create a directory:
Note: For Linux devices, in addition to entering the details mentioned above, you will also be prompted to enter the
SSH port number.
Click Configure.
Note: For Linux devices, in addition to entering the details mentioned above, you will also be prompted to enter the
SSH port number.
Click Configure.
Notes:
If an agent is already installed in the device whose files you want to monitor, file monitoring will
automatically be enabled in the agent.
If no agent is installed in the device for which you want to monitor the files, then an agent will be installed
and file monitoring will be enabled in the agent.
Please note that the volume of logs generated for each change occurring on the folders can affect the
performance of the file server. It is a recommended practice to limit file/folder monitoring to the required
files/folders.
Navigate to Settings > Configurations > Manage File Integrity Monitoring > FIM Templates.
Depending on which device the files and folders that you wish to monitor are located in, click on either the
Windows or Linux tab.
Click Add FIM.
Enter a name for the template and select the locations of the files and folders.
Alternatively, you can enter the location of the files/folders.
The Exclude Filter gives you an option to exclude
a. Certain file types.
b. Certain sub-locations within the main location.
c. All sub-locations within the main location.
If you want to know who has made the change to the file or folder, check the Audit Username checkbox.
Click Configure.
All the created templates are listed in a tabular column with an option to edit / delete them.
This dashboard lets you manage all security applications monitored by EventLog Analyzer.
Settings > Log Source Configuration > Applications > Security Applications
By default, the default threat server is disabled when Advanced Threat Analytics (ATA) is enabled as ATA has a much
larger and more accurate threat data set. If required, you can override this by enabling the default threat server again.
When default threat server is enabled, if a particular threat source is not flagged by ATA, EventLog Analyzer will check in
default threat server's threat database and flag the threat source accordingly.
Choose a Quick Deploy Server from the options presented in the drop down box.
4. In the Poll From section, specify the start date from when the feeds should be collected.
5. In the Schedule drop down list, select the schedule frequency and the time for syncing data from the TAXII server.
6. To save the server configuration, click Add Server.
The edit option is present under the Actions column for each server.
3. You can make the required changes such as the schedule to sync data from the TAXII server.
The delete option is present under the Actions column for each server.
3. Click Yes in the delete confirmation pop up box.
The Manage Feeds option can be found within the dedicated column for each server.
AlienVault OTX
Learn more about Alienvault OTX API. Sign up to receive API key.
IBM X-Force
Learn more about IBM X-Force Integration. To purchase, please click here.
Default integration from Log360 Cloud suite. This can be accesed once the add-on is purchased.
VirusTotal
Third-party threat feed integration. This follows the Bring Your Own Key(BYOK) model. If you have bought
VirusTotal access separately, you can use your API key and get the threat analytics information in EventLog
Analyzer.
2. Access
Investigation: The Threat Analytics information can be accessed through the External Threat report and the
Incident Workbench for investigations.
Detection: The Default Threat alert criteria detects interaction with external threat sources. Once the
Advanced Threat Analytics add-on is applied, the alerts will be accurately fine tuned to reduces false
positives.
Navigation: EventLog Analyzer home > Reports > Select Threats from the drop-down in the top left corner > Threat
Analytics > External Threat
The External Threat report contains the information on the source of the threat, severity, reputation score, and more.
View reports of Top Attacked Hosts and Threats by Category for the selected period.
Click on URLs and IPs in the Threat Source column and select Go To Incident Workbench to get contextual risk
data from the integrated threat feeds
Configuration
1. Get the Access Key
Navigate to https://log360feeds.manageengine.com/
Copy the Advanced Threat Analytics Feed Server access key.
Note: For users who do not have a feeds account, please create an account to sign in and obtain the Threat
Analytics Feed Server access key.
Analysis
The Log360 Cloud Threat Analytics is available in the Incident Workbench. Learn how to invoke the Incident Workbench
from different dashboards of EventLog Analyzer.
Info
This section contains the Reputation Score of the Threat Source on a scale of 0-100.
You can also view the Reputation Score Trend chart, Status of the Threat Source( whether it's actively part of the
threat list), Category, Number of occurences on threat list, and when the source has been released from the
threat list.
The Geo Info contains location mapping details of the Threat Source such as city, state, region and the Whois
information of the domain.
This section contains the risk profile of the related indicators of IPs, URLs and Domains.
IP:
hosted_urls
asn
hosted_files
hosted_apps
URL/ Domain:
virtuallyhosted
sub_domains
hosted_files
hosted_apps
hosting_ips
Note: VirusTotal is one of the largest live threat feeds that consolidates risk scores of IPs, URLs, Domains, and files
from a wide range of security vendors. This integration in EventLog Analyzer follows the Bring Your Own Key(BYOK)
model. If you have bought VirusTotal access separately, you can use your API key and analyze threat sources in
EventLog Analyzer.
Configuration
Once you have purchased the Advanced Threat Analytics add-on and applied the license, head to the Advanced Threat
Analytics page.
Navigation: Settings → Admin Settings → Management→ Threat Feeds→ Advanced Threat Analytics →
VirusTotal → Integrate
4. Paste the API key and click on Connect to finish configuring VirusTotal.
Analysis
In EventLog Analyzer, users can access the data from VirusTotal through the Incident Workbech. Learn how to invoke the
Incident Workbench from different dashboards of EventLog Analyzer.
VirusTotal Info
This section contains the Detection Score of the Threat Source, which is the number of security vendors who
have flagged the source as risky out of all the security vendors. Along with this, the basic details and the geo info
of the Threat Source are also available.
Malicious
Suspicious
Harmless
Undetected
Timeout
This section contains the Whois information of the threat source domain.
SSL Certificate
This section contains details of the SSL certificate issued to the Threat Source and who issued it.
This section maps the relationship of the files to the IP address in following ways:
This section is the past and current IP resolutions for a particular domain.
Navigation: Settings → Admin Settings → Management → Threat Feeds → Advanced Threat Analytics → Log360
Cloud Threat Analytics → Integrate
To get the access key, please follow the steps (Until step 2) in this help document.
After pasting the access key in the Access Key box, Malicious Threat Feeds will be enabled automatically. To
enable dark web threat feeds, switch to Dark Web Threat Feeds and click the Configure button.
Upon clicking Configure, a pop-up requesting an email domain to monitor for dark web exposure will be
displayed. After entering the domain, you will be asked to provide a valid email address from that domain for
verification.
Analysis
EventLog Analyzer provides both email and domain analysis for configured domains. Users will be able to send emails
from the Incident Workbench to notify individuals whose data has been breached.
EventLog Analyzer provides an alert profile for supply chain breaches. A supply chain breach refers to the breach where
the email domain and the domain where the user's data was breached are different.
Troubleshooting tips:
Ensure that L3C Feeds Server is reachable from ELA machine.
Try reconfiguring Dark Web monitoring with your domain
Ensure that the licensed domain and configured domain are the same.
For further information regarding configuring non-licensed domains, please contact [email protected]
Navigate to Settings > Admin Settings > Threat Feeds > Whitelisted Sources.
Click the Whitelist Source option. (top right corner of Threat Feeds page).
IP Details
The value(s) entered should either be an IP address, CIDR, or an IP Range.
IP Range can be entered by mentioning the Start and End IPs. For instance, 192-198-111-0 should be the Start IP
and 192-198-111-220 should be the End IP, if you want the IPs in-between the range to be whitelisted.
Domain
A domain can be whitelisted by mentioning the domain address. For instance, 'mydomain'.
Import CSV
To import an existing CSV file containing the source(s) to be whitelisted, click the Import CSV option on the top-
right corner of the pop-up window.
Threat Alerting
Threat Whitelisting has been integrated with Advanced Threat Analytics with the aim of reducing false positive alerts.
To whitelist a particular source, select the desired source from the list (using checkbox) and click on the ellipsis
(three dots stacked vertically) and select the Whitelist Source option.
Click the Whitelist button. Click the Yes button in the confirmation box that appears.
Note: The whitelisted sources will be excluded from threat alerts and external threat reports.
Note: The CSV files should contain the list of threat sources in the first column. Download sample CSV file.
If you need to add Threat Sources for threat alerting, place the files in the <Dir>\EventLog
Analyzer\data\za\threatfeeds\ThreatImport\Import folder.
Files in the ThreatImport directory will be deleted once it is processed. If any files are not deleted, this may
indicate that an exception has occurred. Check the log file for details and contact support at eventloganalyzer-
[email protected] for further assistance.
Note: If you need to remove any Threat Sources from flagging threat alerts, place the file containing the Threat
Feeds to be removed in <Dir>\EventLog Analyzer\data\za\threatfeeds\ThreatImport\Delete folder.
Scheduling helps users import Threat data from files at the specified location automatically on a daily basis.
This ensures that threat feeds are consistently updated and stay current. A threat Import schedule can be
enabled by changing the dae.threat.import.schedule.enable property in <dir>\EventLog
Analyzer\conf\EventLogAnalyzer\threat folder\threatstore.properties file from "false" to "true".
A schedule will run everyday at 8:00 AM to process the files placed under respective ThreatImport folder.
Users can disable the threat schedule by changing the value of dae.threat.import.schedule.enable property
key from <dir>\EventLog Analyzer\conf\EventLogAnalyzer\threat folder\threatstore.properties file back to
"false".
If the dae.threat.import.schedule.enable property key value changes from "false" to "true", the product must be
restarted.
Restarting the product will trigger the threat import operation immediately instead of waiting for the 8.00 AM
schedule.
You can find entries related to the threat Import feature in the product log file by searching for FileImportTask.
Note:
In-memory threat store requirements: The in-memory threat storage requires a minimum of 2 GB RAM to
be allocated to EventLog Analyzer; of which at least 512 MB should be available for use.
Switching to in-memory threat storage is not possible in 32-bit systems.
2. Under Threat Feeds sub section, click on Settings icon on the top right corner.
By clicking on the number under the Number of Devices link, you can view all the devices present in the device group.
Update Credentials
vCenter servers can be added and deleted. All the vCenter servers that are being monitored can also be viewed.
View vCenter
After you have added a vCenter server, you can view the added vCenter servers along with vCenter IP, log collection
status, last message time, and next scan time.
You can modify the Device type, Protocol, Device name, port number, and more.
10. Under Select Devices, add the source devices from which logs have to be fetched.
11. Select the required Criteria.
All logs - It forwards all incoming logs.
Note: EventLog Analyzer supports all AWS regions, except the AWS China (Beijing) region.
You can find the inline policy in the highlighted section of the image below.
S3 bucket: (accountnumber)-cloudtraillogs-(region)
SNS topic: cloudtrailtopic
SQS queue: cloudtrailqueue
CloudTrail: cloudtrail
Manual configuration: Click Connect an existing CloudTrail and follow the steps given in the Logging
setup for AWS CloudTrail.
To setup logging for your AWS environment, refer S3 server access logging and ELB access logging.
CloudTrail can also be configured to publish a notification for every log file that is delivered, allowing users to take action
upon log file delivery.
Create an SNS topic. Select the following options: Apply trail to all regions → Yes Create a new S3 bucket → Yes S3
bucket → Provide a new name Log file prefix → Provide the prefix Encrypt log fies → No Enable log file validation → Yes
Send SMS notification for every log file delivery → Yes Create a new SNS topic → Yes New SNS topic → Name the topic
Select → Create
(III) Create an SQS queue and subscribe to the SNS topic created in Step II
(IV) Add the created SQS queue as a data source in EventLog Analyzer
Requests to access S3 bucket can be tracked via access logging. Each access log record provides details about a
single access request, such as the requester, bucket name, request time, request action, response status, and error
code, if any. This access log information can be useful in identifying the nature of traffic.
Follow the below given steps to add Amazon S3 server access logs as a data source in EventLog Analyzer.
Go to Settings > Configuration > Manage Cloud Sources and click on Add Data Source.
Select S3 Server Access Logs from the Data source drop-down menu.
Follow the below given steps to add Amazon ELB access logs as a data source in EventLog Analyzer
Select ELB Access Logs from the Data source drop-down menu.
Select the Region and Load Balancer for which you want to enable access logging.
Note: Currently EventLog Analyzer only supports classic load balancers. Network and application load balancers
are not supported.
Click the icon located under the Actions column for the data source you want to enable.
Click the delete icon located under the Actions column for that particular data source.
Salesforce
EventLog Analyzer helps you analyze Salesforce user activity within the wider context of your overall security posture. By
monitoring Salesforce activities, you will be able to spot suspicious login attempts, track privileged user activity, and
identify unauthorized access attempts or data modification.
Ensure that you enable the below permissions in case of using a non-admin user :
Permissions required:
Click Save.
https://login.testingtech-ap48.my.salesforce.com.
You may carry out the following operations using the admin settings tab:
Agent Administration
Archive Settings
Technicians and Roles
Logon Settings
Security Hardening
Reset Account Settings
Domain and Accounts
Log Collection Filter
Working Hour Settings
Product Settings
API Settings
Retention Settings
Log Collection Alerts
Report Profiles
Custom Log Parser
Tags
Profiles
1. Go to Settings > Admin Settings > uncheck on the "Enable password protection option for redistributed
and exported reports" checkbox.
2. Click on Save.
1. Go to Settings > Admin Settings > check or uncheck the Allow EvenLog Analyzer to collect your product
usage statistics checkbox and click on Save.
Linux:
Linux RedHat RHEL
Linux SuSE
Linux Fedora
Linux CentOS
Linux Ubuntu
Linux Debian
Note: For additional information on what is needed in order for Windows agent to operate properly, click here.
The following are the different ways in which you can deploy the EventLog Analyzer agent in devices:
Note: If multiple devices are selected, ensure that the credentials are valid for all the devices.
Right-click Startup and in the dialog box that appears, click Add.
Example:
/MSIPATH:"\\192.168.1.5\elaagent\EventLogAgent.msi" /SERVERNAME:"DC01" /SERVERIPADDRESS:"192.168.1.5"
/SERVERPORT:"8400" /SERVERPROTOCOL:"http"
Click OK to return to the Startup Properties dialog box.
Click Apply and then OK.
Step 3: Configuring Administrative Template Settings
In the left pane of the Group Policy Management Editor, navigate to Computer Configuration → Administrator
Templates → System.
Under System, select Scripts.
In the right pane of the GPO Editor, double-click Run logon scripts synchronously and enable it.
Click Apply and then OK.
Tip: For installing the agent on multiple computers at one go, create an AD group and add all the computers on
which the agent needs to be installed to the group. Then, apply the GPO to that group.
On the left pane of the Group Policy Management Editor, right-click the GPO you are working on and
select Properties.
Navigate to the Security tab and unselect the Apply Group Policy permissions for Authenticated Users.
Click Add and in the dialog box that appears, click Object Types.
If you want to apply the GPO to computers directly, ensure Computers is selected and then click OK. For applying it
to a group, ensure Groups is selected and then click OK.
In the Security tab, apply the following permissions to the selected group(s) and/or computer(s):
(i) Read > Allow
(ii) Apply Group Policy > Allow
Restart the computers to complete applying the GPO and wait for the reset password / unlock account link to
appear on the Windows logon screen.
Example:
msiexec.exe /i "EventLogAgent.msi" /qn /norestart /L*v "Agent_Install.log" SERVERNAME="me-eventlog"
SERVERIPADDRESS="10.51.241.163" SERVERPORT="8400" SERVERPROTOCOL="http" ENABLESILENT=yes
ALLUSERS=1
Note: EventLog Analyzer provides .msi files for Windows and .bin files for Linux systems.
Example:
Manual installation:
For Windows devices:
On the machine where the agent is installed, open a browser and paste the following command into the
browser's URL
> <eventlog_server>:<eventlog_server_port>/event/downloadMsi.nms?platform=windows
Here:
<eventlog_server> = Name of the server on which EventLog Analyzer is installed
<eventlog_server_port> = Web server port used by EventLog Analyzer (By default Eventlog Analyzer uses web
server port 8400 for HTTP)
For example: localhost:8400/event/downloadMsi.nms?platform=windows
The agent has to be configured in Manage File Integrity Monitoring page of EventLog Analyzer. Refer Configuring File
Integrity Monitoring to configure the agent in Linux devices. If installation fails due to permission denial, you can
manually install it by executing the following command.
Installation Command:
HTTP Command:
HTTPS Command:
Example:
Sudo User:
Non-Sudo User:
Make sure to include the prefix "sudo -s" before running the installation command.
Note: For non-sudo user, ensure that you are logged in as the auditing user. This is important because the agent
will automatically consider the current user as the auditing user. If you are not logged in as the auditing user,
please refer to the troubleshooting tips for setting privileges for agent folder.
Another method to uninstall the EventLog Analyzer from device(s) is by using add or remove programs,
Navigate to Windows start menu > Add or remove programs in your desktop.
Select the "ManageEngine EventLog Analyzer Agent".
Click Uninstall.
Default
Configuration Description
Value
Archiving interval
Type of logs that need to be archived
Storage location of the archived files
Retention period
The archived files can be encrypted and time-stamped to make them secure and tamper-proof.
Device - List of devices from which the logs are being collected
Format - Device type
From and To - The time frame denotes the time period during which the logs were collected and archived by
EventLog Analyzer.
Size - Size of the archived log data collected from each device.
Integrity - The integrity of the archived files, whether they are intact or have been tampered with, is denoted by
the following states:
a. Verified - Archived logs are intact.
b. Archive file is missing - When the flat file is not found during the compression/zipping process.
c. Archive file not found - When an archived file is not available in the location where it was originally stored
in the DB.
Note: In case a file has been deleted or tampered with, an email notification will be sent immediately
containing the message "Archive file is tampered".
e. Archive file available - When the archive integrity check is disabled, both the verified and tampered files
will carry this status.
f. Archive file not available - When the archive integrity check is disabled and the archive file is either
missing or not found in the original location, this status will be shown.
g. Access Denied - When the remote location can't be accessed where the archives are stored
h. Connectivity failed - When the Amazon S3 bucket is not accessible due to network connectivity where
archives are stored
The status of the archival is indicated by the following four different states:
a. Loaded - The archived files are already loaded to the database. Click View to view the file
b. Data already available - If the archive file is in Elastic Search database
c. Data partially available - If some of the archive data is in ElasticSearch database
d. Not Loaded - If the archive file is not in ElasticSearch database.
e. File yet to be uploaded - If the archive file is not transferred to the specified zip location
Note: Archives stored in shared storage and S3 buckets will be downloaded to local storage and loading will be
initiated.
Note: If the status of the file says Data partially available and if you proceed to load the archive, there could be a
duplication of the data.
Note:
Deleting a host from the manage device page removes corresponding archive entries from the UI, but the physical
files remain stored if you need to retrieve them in the future. If these archives are no longer needed, ensure to
delete the files manually to free up space.
Archives that are in yet-to-be-uploaded status can also be deleted. It will delete the file which is stored in the local
temp location
Configure the archive interval, retention period, encryption, time-stamp of the archive files, location to save the archive
files and the index files.
Note: The archive and database storage are asynchronus operations. These operations are unrelated.
1. Ensure that archiving is enabled. By default, it is enabled.Use the toggle button to disable archiving.
2. Enter the Archive retention period for the archived files. The default period is forever.
3. Logs can be archived in two formats - Raw Logs with Parsed Fields and Raw Logs. Logs will be stored with
metadata on selecting the former, and without metadata for the latter.
Note: The storage space for Raw Logs will be lesser but only basic reports can be generated using this data.
4. Enter the storage location for Flat file location in the Temp File Location field.Click on Verify to validate the location.
5. Enter the storage location for the archived files in the Archive Zip Location field.
a. Local - To store archives in a local location, choose local from the dropdown and enter the storage location
b. Shared - To store archives in a shared location, select 'Shared' from the dropdown menu and enter the storage
location.
i. By clicking on the authentication check box, you will need to enter the credentials to access the shared
location. Unchecking it would make the path accessible to everyone with share access.
ii. Ensure that the remote machine is available and it has sufficient read and write permissions for the
share.
c. S3 Bucket - To store archives in S3 Bucket, choose S3 Bucket from the dropdown and enter the folder name.
By default the folder name will be "AwsArchive"
i. Cloud account - Displays the configured cloud accounts.Select the respective cloud account from the
dropdown. To configure the cloud account, click on "Configure Cloud Account" - This will configure AWS
cloud account without a cloud trial. To configure the cloud account with cloud trial refer this document.
Note: Cloud accounts configured through Domain and Accounts or from Archives can only be
listed here
ii. Buckets - Displays the configured buckets associated with the respective cloud account. Select the
respective bucket from the dropdown. Ensure that your bucket has the sufficient permissions. To create a
new bucket,enter the bucket name in the input field and click on the "+" icon. By default, the bucket type is
General Purpose, and it is in home region. Ensure that bucketname follows this naming convention rules,
If the archives stored in these buckets are to be encrypted, Ensure that the buckets have " Bucket Key
Enabled " permission. By default, KMS keys will be disabled when creating a bucket. To provide the
permissions , navigate to Amazon S3 → Buckets → (Bucketname) → Properties → Default Encryption →
Bucket Key
i. To list the configured kms keys for your cloud account , provide ''kms:ListKeys" policy permission
to your IAM user.
ii. To encrypt the archives using KMS key , provide "kms:GenerateDataKey" policy permission to
your kms key (key ARN) . Refer this document for KMS key permissions
Pricing :
There are no additional charges for using default encryption for S3 buckets
For SSE-KMS and DSSE-KMS, AWS KMS charges apply and are listed at AWS KMS pricing.
6. To secure the archival logs, enable flat file encryption. By default, it will be disabled.
7. Enter the log retention period for the loaded archive files. The default period is 7 days.
8. Click on Advanced and fill in the following fields:
a. Choose the time interval for file creation. The logs will be written to flat files at the specified time period.
b. Choose the required time interval for creating a zip file. The flat files will be compressed (40:1 ratio) and zip
files are created at the specified time period.
9. Save the settings and close the window. For instant archiving, click the Zip Now button next to Zip Creational
Interval.
Note: Files will be zipped locally and will be transferred to the destination location, so additional disk space
will be required. Ensure that you have sufficient storage in the system(Size).To know about the disk space
required in the local storage, calculate using the tuning guide
Configure multiple archive settings by clicking on Create New Policy in the top right corner.
Additional configuration - Select the devices/groups for which the policy will be applied.
Note: If a device/group has been added under multiple policies, the archive settings of the policy with the highest
priority will be applied to that particular device/group.
Device - Shows the list of devices that are added in one or more policies
Effective Policy Applied - Shows the policy which is applied to that particular device.
Location - Shows the zip location of the policy.
Total size - Shows the total size of archives for that particular device.
Size in location - Shows the size of the device archives collected under that specific policy.
1. Update path
Goto Settings > Admin Settings > Data Storage > Archives > More in the top right corner > Update path
Select the old archive location in the dropdown and enter the new location where archives are moved or
present in Archives moved location and click on Update.
Note: Update path is only applicable for local and shared locations
The File not Found status will change to Verified, if the file is present in the directory as specified in DB. This will
also change the status from Tampered Files to Verified.
Integrity Status like Access denied and Connectivity failed will be updated to Verified, if the file is present in the
respective location
3. To add archives in DB
Goto Settings > Admin Settings > Data Storage > Archives > More > Add Archive Entries.
Note: Add Archive Entry is only applicable for local and shared locations
Centralized Archiving:
If centralized archiving is enabled in the Admin Server. In that case, the S3 bucket option will not be displayed for new
You can either add a user from AD or add a local technician in EventLog Analyzer.
1. To monitor the users of EventLog Analyzer, click on the User Audit icon. This will give you the report of all EventLog
Analyzer user activity. You can view the user audit data for the required username, type of user(administrator,
operator, guest), resource and action. The report can be extracted into PDF/CSV format.
2. Delete, enable or disable users by selecting the users and clicking on the respective icons.
3. Click on the edit icon to update the technician details such as the roles assigned, device groups, email and
password.
6. You will see multiple tabs such as Home, Reports, Compliance, Correlation, Alerts, Settings, and Others. You
can click on the checkbox provided for each of these tabs to allow the role to have all the permissions associated
with the selected tabs. You can also navigate to each of these tabs individually and select the required
permissions.
Under the Home tab, you can see two sections: Dashboard and View the Log Sources. In the Dashboard
section, you can allow users to view, and create and manage the dashboard. In the View the Log Source
section, you can assign permissions to view device, application, and file integrity monitoring logs. You can
also click on the checkboxes next to the Dashboard and View the Log Sources section to select all the
Under the Others section, you can specify if the user can view product support related information,
supported log sources, and notifications.
7. After choosing all the required permissions, click on Create to create the custom user role.
General: Learn how to configure CAPTCHA and block users after a certain number of invalid login attempts.
Password policy: Learn how to customize password policy for all technicians logging into EventLog Analyzer.
Two-factor Authentication: Learn how to enable two-factor authentication for users logging into EventLog
Analyzer.
Smartcard Authentication: Learn how to configure EventLog Analyzer to authenticate users through smart
cards, bypassing other first-factor authentication methods.
External Authentication: Learn how to configure EventLog Analyzer to authenticate users through Active
Directory and RADIUS server.
Allow/restrict IPs: Learn how to allow or restrict access to EventLog Analyzer based on the users’ IP address.
General
Under the General tab of Logon Settings, you can configure the following.
CAPTCHA Settings
Block User Settings
CAPTCHA Settings
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. Login CAPTCHA
serves as a security measure against bot-based brute force attacks. Enabling this setting will display a CAPTCHA image
on the login page. End-users must enter the characters shown in the CAPTCHA image to log into the EventLog Analyzer
web portal.
You can configure whether to show CAPTCHA always or after a certain number of invalid login attempts. Apart from the
CAPTCHA image, you can also enable Audio CAPTCHA.
Password Policy
3. Enforce password change for new users at their first login - This parameter makes it mandatory for new users to
change their password when they login for the first time. If this parameter has been enabled, when new users try to
login, they will be redirected to the following page to set up a new password.
After configuring the parameters, click Save Settings to save the updates.
Two-Factor Authentication
To strengthen logon security, EventLog Analyzer supports two-factor authentication (TFA).
If TFA is enabled, EventLog Analyzer will require its users to authenticate using one of the following authentication
mechanisms in addition to Active Directory or RADIUS authentication.
Note: As a preventive measure against lockout, it has been made possible for an administrator to skip two-factor
authentication during logon.
Click on the authentication mechanism of your choice and enter the necessary details.
Note: If multiple authentication options are enabled, the user will be asked to choose one at the time of logging in.
Email Verification
When email verification is enabled, EventLog Analyzer sends a verification code to the configured email address. That
verification code would need to be entered to successfully login.
Enter the subject and body of the email containing the verification code.
Click the Macros button at the bottom to include them in the email.
SMS Verification
When SMS verification is enabled, EventLog Analyzer sends a verification code via SMS to the configured mobile
number. That verification code would need to be entered to successfully login.
Click the Macros button at the bottom to include them in the SMS.
Note: Ensure that the client time and device (mobile) time are syncronized.
RSA SecurID
In the EventLog Analyzer two-factor authentication menu, select the Enable RSA SecurID check box.
Click Browse and select the sdconf.rec file.
Click Save to save the configuration.
Duo Security
If your organization uses Duo Security for two-factor authentication, it can be integrated with Eventlog Analyzer to secure
logins. Users can approve or deny the Eventlog Analyzer login requests using a push notification or by entering the six-
digit security code generated by the Duo mobile app. Authentication via Duo Security can be configured in two ways in
Eventlog Analyzer: Web v2 SDK and Web v4 SDK.
Web v2 SDK uses a traditional Duo prompt which will be displayed in an iframe in Eventlog Analyzer, whereas Web v4
SDK uses Duo's OIDC-based universal prompt with a redesigned UI that redirects users to Duo for authentication.
Duo Security has phased out Web v2 SDK, so it is recommended to switch to Web v4 SDK, which features the new
Universal Prompt.
Prerequisites
Add the API hostname and admin console (e.g., https://admin-325d33c0.duosecurity.com) as a trusted site or
intranet site in the users' machine if they are using older versions of Internet Explorer.
Note: It is required to have a secure connection to set up the Web v4 SDK authentication. Please make sure that
you have enabled HTTPS connection.
1. Log in to your Duo Security account (e.g., https://admin-325d33c0.duosecurity.com) or sign up for a new account
and log in.
2. Go to Applications and click Protect an Application.
4. Copy the Client ID, Client secret, and API hostname values.
7. Paste the Client ID, Client secret, and API hostname obtained from the Duo Admin Panel in the respective fields.
8. Enter the same username pattern used in Duo Security in the Username Pattern field.
9. Click Save.
Steps to migrate to the new Universal Prompt
1. In the Duo Admin Panel, select the Web SDK application, which was previously configured for Eventlog Analyzer,
and copy the Integration key, Secret key and API hostname values.
2. Scroll down to the Universal Prompt section. The App Update Ready message will be displayed, indicating that
Universal Prompt can now be activated for Eventlog Analyzer.
6. Select Show new Universal Prompt to activate the universal prompt for Eventlog Analyzer.
To allow users to login using backup verification codes, enable the Backup Verification Code check box.
This feature provides an additional authentication option for EventLog Analyzer login by enabling the use of smart
cards/PKI/certificates to grant access to the tool. Smart card authentication strengthens the security further because
getting access to EventLog Analyzer shall then require the user to possess the smart card and know the personal
identification number (PIN) as well.
Note: Only internal CA certificates are supported. Third-party certificates are not supported.
In the Settings tab, navigate to Admin Settings > Logon Settings > Smart Card Authentication.
Click the Edit icon located in the Action column of the particular smart card.
Modify the settings you wish to change.
Click Save.
In the Settings tab, navigate to Admin Settings > Logon Settings > Smart Card Authentication.
To enable/disable a configured smart card, click on the Enable/Disable icon located in the Action column of
the particular smart card.
In the Settings tab, navigate to Admin Settings > Logon Settings > Smart Card Authentication.
Click the corresponding Delete icon corresponding to the smart card which you wish to delete.
Click Yes to confirm the deletion.
Allow/restrict IP addresses
One way to secure EventLog Analyzer is by allowing or restricting inbound connections to specific IPs or IP ranges. This
adds an additional layer of security by allowing connection from only trusted sources and blocking unwanted and
malicious traffic.
The IP restriction can be applied for the entire product, specific URLs within the product, or APIs.
4. In the textbox that appears, check the Enable API/URL Access for Selected IPs box.
Note:
Use * as a wildcard character to restrict access to a broader range of APIs or URLs. For example, use
/RestAPI/WC/* to restrict all API calls that start with /RestAPI/WC/.
The API/URL path should start with /. For example, /Admin.do and /RestAPI/WC/.
Enter only the path of the API or URL. For example, if the entire product URL is
https:testserver:8400/Admin.do, then enter only /Admin.do.
Only alphanumeric characters (A-Z, a-z, 0-9) and the following special characters are allowed: period
(.), forward slash (/), and asterisk (*).
7. Enter the IP addresses as per your requirement. Click [] icon if you want to allow access to multiple IP address
ranges.
8. Finally, click Save to save the settings.
9. If any changes are made to 3rd party reverse proxy for EventLog Analyzer, or any of its integrated components,
then:
Add the following line to the server.xml file (default location: <InstallationDirectory>/conf/server.xml).
10. <Valve className="org.apache.catalina.valves.RemoteIpValve"
internalProxies="192\.168\.0\.10|192\.168\.0\.11"
trustedProxies="172\.168\.0\.10|176\.168\.0\.11" />
Note:
The purpose of configuring InternalProxies and TrustedProxies is to determine which IP addresses are
regarded as internal or trusted. By configuring these settings, organizations can improve their network
security by controlling the access and use of IP addresses within their network.
InternalProxies are IP addresses that are trusted and from within the organization network. These IP
addresses are typically used by internal services, such as printers and servers.
TrustedProxies are IP addresses that are external to the network but still maintain a high level of trust and
reliability. These IP addresses are typically associated with external services like websites and databases.
Managing IP restriction
You can also make the following changes to this setting:
Disable/enable IP-based restriction: Use the Checkbox under the Allow/Restrict IPs to enable or disable IP-
based restriction.
Edit IP-based restriction settings: Use the Allowed/Restricted IP Range textbox to add, delete, or edit the IP
ranges and individual IP addresses.
Appendix
Use * as wildcard character: Individual IP addresses can include wildcard characters, so that all addresses
within a certain class of address will be restricted. For example, denying access to address 192.168.2.* denies
access to all addresses for that subnet.
You can also enter hostname instead of IP addresses.
You can allow or restrict only IPv4 addresses. IPv6 is not supported.
The IP addresses corresponding to the following servers cannot be restricted in EventLog Analyzer.
Remote Integrated Child/Parent Components server
Admin server
Managed server
The implementation of IP restriction for forward proxy is not supported.
After initially configuring IP Restriction or Reverse Proxy in the parent product, you need to manually restart
EventLog Analyzer.
If EventLog Analyzer is installed remotely and the Reverse Proxy is configured in the parent product, add the
parent product server's IP as an internal proxy in EventLog Analyzer. Following this, manually restart EventLog
Analyzer.
The dashboard lists the available security settings with a corresponding security score that is calculated based on the
importance of the enabled configuration(s).
To manage individual settings, click the option against the target security setting and make the required changes. Once
the process is complete, the option will have a green tick next to it, as shown in the image above.
To ensure that you don't miss configuring any important security settings, EventLog Analyzer sends the following alerts:
Licensed users will receive a popup after every successful login to complete the mandatory security
configurations.
Note: The security settings alerts will also be included under the License tab and will be emailed to you along with
product downtime and start-up emails.
For Windows -
Navigate to <EventLog Analyzer>/troubleshooting folder.
Execute the resetPwd.bat file.
The admin password will be reset to the default password - admin.
For Linux -
Open a terminal.
Navigate to the <EventLog Analyzer>/troubleshooting folder.
Execute the resetPwd.sh file to reset the admin password to the default password.
You can access the account by using admin as the password.
For Windows -
Navigate to <EventLog Analyzer>/bin/adsf folder.
Find and run the unblockAccount.bat file to complete the process.
For Linux -
Open a terminal.
Go to the <EventLog Analyzer>/bin/adsf folder.
Execute the unblockAccount.sh file to unblock the account.
For Windows -
Go to the <EventLog Analyzer>/bin/adsf folder.
Execute the resetAdminTFAEnrollment.bat file.
Login to the EventLog Analyzer application and register for the two-factor authentication to match your
preference.
For Linux -
Open a terminal.
1. Click the Discover link to automatically discover the domain controllers. Alternatively, you may also key in the
domain controllers' names in the Domain Controllers field, separated by commas.
2. Modify the authentication credentials. Note that the machine login credentials are used when no authentication
credentials are provided.
3. Click the Update button.
1. Modify the authentication credentials. Note that the machine login credentials are used when no authentication
credentials are provided.
2. Click the Update button.
Cloud accounts
1. Add a cloud account
2. Update a cloud account
3. Delete a cloud account
Open EventLog Analyzer and select the Settings tab. Then, navigate to Domain and Accounts under Admin
Settings.
Open EventLog Analyzer and select the Settings tab. Then, navigate to Domain and accounts under Admin
Settings.
Enter the new credentials for the cloud account such as the Access Key ID and Secret Access Key and click
Save.
Open EventLog Analyzer and select the Settings tab. Then, navigate to Domain and accounts under Admin
Settings.
Select Yes in the dialogue box that prompts you to confirm the action.
Configure your organization's working hours by selecting appropriate From and To values.
To configure multiple time ranges, click the + icon and select the next working hour range.
Once the necessary working hours have been selected, click Save.
Note: If two working hour ranges with overlapping hours are configured, EventLog Analyzer will set the working
hours to be the entire range, from the least to the highest value. For example, if the configured time ranges are 8 to
12 and 5 to 11, EventLog Analyzer's working hours will be set as 5 to 12.
Product Configurations
To configure settings such as views per page, number of rows displayed in reports, and so on in EventLog Analyzer,
navigate to Settings > Admin Settings > General > Product Settings > Product Configurations.
Default
Configurations Description
Values
Rows in Top N Set the number of rows to be displayed for reports under the Top
10
Reports N Reports section.
Report Time Out 25 mins Set the maximum time allowed to generate a report.
Product Notifications
To configure the scenarios for which you want to receive notifications from EventLog Analyzer, navigate to Settings >
Admin Settings > General > Product Settings > Product Notifications.
The different scenarios for which you have the option of enabling or disabling alerts have been listed below:
You will be notified when the free space available in the disk on
which EventLog Analyzer is installed goes below a certain value.
Low Disk Space
You can set the limit in terms of GB of free disk space and give a
suitable subject for the email which will get triggered.
You will be notified when the archive files are deleted or tampered
Archive integrity
via an email notification.
Note: In a new installation of EventLog Analyzer, notifications will be turned on by default for License Expiry,
EventLog Analyzer Down, EventLog Analyzer Upgrade, and Unprocessed Log Files.
After configuring the necessary notification settings, select if those notification emails need to be sent to all
EventLog Analyzer Admins or only to specific email addresses -- which you can enter in the corresponding text
box.
Then, click Save to complete configuration.
Prerequisites:
Internet connection should be available
Zoho creator website should be whitelisted as the patches will download from here.
In the EventLog Analyzer console, go to Settings > Product Settings > Enable Security Patch Update > Save.
Note: Tokens have admin access and can access all device data without any limitations.
API Function
Get log
To get the list of log sources available in EventLog Analyzer.
sources
Get log fields To get the list of parsed log fields from the processed logs.
Get log types To get the list of all log types available in EventLog Analyzer.
Asynchronous The Search is performed in the background and the user is provided with a request ID. The status
search of the request can be monitored using the Jobs endpoint.
To fetch or delete the status of all the running, failed or completed Asynchronous search, alert
Jobs endpoint
tasks.
Jobs Result
To fetch the search, alert results of the completed Asynchronous search tasks.
endpoint
Get alert
To get the list of all alert profiles available in EventLog Analyzer.
profiles
Asynchronous The alert data retrieval is performed in the background and the user is provided with a request ID.
alerts The status of the request can be monitored using the Jobs endpoint.
Request URL
GET http://hostname:8400/RestAPI/v1/meta/log_sources?from=1&to=10
Request Header
Header
Value Mandatory Description
name
Request Parameter
Response
The response will be a JSON object which will contain the list of devices.
Sample response:
Request URL
GET http://hostname:8400/RestAPI/v1/meta/log_fields
Request Header
Header
Value Mandatory Description
name
Response
The response will be a JSON object which will contain the list of fields.
Sample response:
> { "fields": [ { "description": "Severity", "id": "SEVERITY" }, { "description": "Facility", "id": "FACILITY" },
{ "description": "Source", "id": "SOURCE" }, { "description": "Event Name", "id": "IENAME" }, {
"description": "Username", "id": "USERNAME" } ] }
Request URL
GET http://hostname:8400/RestAPI/v1/meta/log_types
Request Header
Header
Value Mandatory Description
name
Response
The response will be a JSON object which will contain the list of fields.
Sample response:
> { "log_types": [ { "description": "Windows", "id": "Windows" }, { "description": "Unix", "id": "Unix" }, {
"description": "Hypervisor/ESXi", "id": "Hypervisor" }, { "description": "Cisco Device", "id": "Cisco
Device" } ] }
When you perform a search with the synchronous search method, your query is sent to the EventLog Analyzer server,
which will obtain all the results before returning it to you. The time taken for the process depends on the number of
search results obtained.
Request URL
POST http://hostname:8400/RestAPI/v1/search
Request Header
Header
Value Mandatory Description
name
Request Parameters
The request needs to be sent in the body of the request using JSON format. And should contain following key/value
parameters
Note:
1. When the cursor is passed, the other parameters are not required.
2. Quotes i.e ( " ") in query string should to be escaped. If query in EventLog Analyzer's search page is
REMOTE_INTERFACE = "switch 1", then for Rest Api the query parameter should be written as
"REMOTE_INTERFACE = \"switch 1\""
Response
The response will be a JSON object which will contain the following key/value pairs
Sample response:
Sample response:
Sample response
You can make a search request with a set of required metadata and asynchronous parameters.
The server will respond with a request ID and execute the search in background thread.
You can check the status of the request through the Jobs endpoint.
Once the job is done, you can fetch the results using the jobs/results endpoint.
The search results will be available in EventLog Analyzer for 24 hours after which they are deleted by the cleanup
thread.
Request URL
POST http://hostname:8400/RestAPI/v1/search/async
Request Header
Header
Value Mandatory Description
name
Request Parameters
The request needs to be sent in the body of the request using JSON format. And should contain following key/value
parameters
Parameter
Default value Mandatory Type Description
name
Response
The response will be a JSON object which will contain the following key/value pairs
Sample response:
GET http://localhost:8400/RestAPI/v1/jobs
Request Header
Request Parameters
Response
The response will be a JSON object which will contain the following key/value pairs
Parameter
Description
name
DELETE http://localhost:8400/RestAPI/v1/jobs
Request Header
Request Parameters
Response
The response will be a JSON object which will contain a message field
Sample response:
Request URL
GET http://localhost:8400/RestAPI/v1/jobs/results
Request Header
Request Parameters
request_id Yes String request_id of the async search task returned by async endpoint
Response
The response will be a JSON object which will contain the following key/value pairs
Sample response:
Request URL
POST http://hostname:8400/RestAPI/v1/meta/alert_profiles
Request Header
Header
Value Mandatory Description
name
Request Parameters
The request needs to be sent in the body of the request using JSON format. And should contain following key/value
parameters
Response
The response will be a JSON object which will contain the list of fields.
Sample response:
> { "Number of Records": 4, "Profile Based Alerts": [ { "Alert Id": 1001, "Alert profile name": "Alert
Profile 1", "Type": "Predefined", "Status": "enabled", "Severity": "critical", "Notifications": ["SMS"] }, {
"Alert Id": 1003, "Alert Profile Name": "Alert Profile 2", "Type": "Custom", "Status": "enabled",
"Severity": "critical", "Notifications": ["Email"] }], "Correlation Alert Profiles": [ { "Alert profile name":
"Rule 1", "Alert Id": 1234, "Type": "Correlation", "Status": "enabled", "Severity": "critical",
"Notifications": [] }, { "Alert profile name": "Rule 2", "Alert Id": 1235, "Type": "Correlation Profile",
"Status": "enabled", "Severity": "critical", "Notifications": [] } ... ] }
When you perform an api call with the synchronous alert method, your query will be sent to the EventLog Analyzer server,
which will obtain all the results before returning it to you. The total time taken for the process depends on the number of
search results obtained.
Request URL
POST http://hostname:8400/RestAPI/v1/alerts
Request Header
Header
Value Mandatory Description
name
Request Parameters
The request needs to be sent in the body of the request using JSON format. And should contain following key/value
parameters
Note:
1. When the cursor is passed, the other parameters are not required.
2. Quotes i.e ( " ") in query string should to be escaped. If query in EventLog Analyzer's search page is
REMOTE_INTERFACE = "switch 1", then for Rest Api the query parameter should be written as
"REMOTE_INTERFACE = \"switch 1\""
Response
The response will be a JSON object which will contain the following key/value pairs
Sample response:
Sample response:
Sample response
You can make a request with a set of required metadata and asynchronous parameters.
The server will respond with a request ID and the search is performed in background thread.
You can check the status of the request through the Jobs endpoint.
Once the job is done, you can fetch the results using the jobs/results endpoint.
The search results will be available in EventLog Analyzer for 24 hours after which they are deleted by the cleanup
thread.
It retrieves data within the retention period. It retrieves large amount of data based on the given criteria.
The response time taken is based on data The response will be a request ID and the search is performed in
fetched. background thread
In order to acquire the next set of results, Once the job is done, in order to acquire the next result page, search
keep requesting with the next cursor. with the next page_no using the job results endpoint.
Response is valid only for 5 minutes. Response will be valid upto 24 hours.
Request URL
POST http://hostname:8400/RestAPI/v1/alerts/async
Request Header
Header
Value Mandatory Description
name
Request Parameters
The request needs to be sent in the body of the request using JSON format. And should contain following key/value
parameters
Note:
1. Quotes i.e ( " ") in query string should to be escaped. If query in EventLog Analyzer's search page is
REMOTE_INTERFACE = "switch 1", then for Rest Api the query parameter should be written as
"REMOTE_INTERFACE = \"switch 1\""
Response
The response will be a JSON object which will contain the following key/value pairs
Sample response:
Note: The archive and database storage are asynchronous operations i.e. they are unrelated.
In the Settings tab, navigate to Admin Settings > Data Storage > Retention Settings.
In the Current Storage Size box, enter the number of days for which the raw logs need to be retained in the
database. The default value is 32 days.
In the Correlation Retention Period box, enter the number of days for which the formatted logs need to be
retained in the database. The default value is 90 days.
In the Alert Retention Period box enter the number of days for which the alerts need to be retained in the
database. The default value is 90 days.
In the Audit Retention Period box enter the number of days for which Audit data for External APIs and
technicians will be retained in the database. The default value is 90 days.
After having entered all the values, click Update to save settings.
6. In the Select Device pop-up menu, you can either search and select particular devices in your network to apply the
filter to or select entire device groups by selecting the respective check boxes on the left pane and clicking on Add.
7. In the Filter Criteria box, you will see the Exclude and Collect Only drop-down menus to configure a filter to
perform either of the following actions:
Exclude all the logs that satisfy the specified filter criteria.
Collect only the logs that satisfy the specified filter criteria.
Note: You can configure a filter to perform only one action. You need to create separate filters to collect and
exclude logs for the same set of devices or device groups.
You can see the list of devices associated with a particular filter by hovering your mouse pointer over the
Device(s)/Group(s) Configured section. The More Actions drop-down menu allows you to select and enable, disable,
export, and import multiple filter profiles.
Device Down
To configure alerts to notify users about devices not sending logs,
In the Settings tab, navigate to Admin Settings → Log Collection Failure Alerts → Device Down Alert.
If the alert is not enabled by default, click the toggle button to enable it.
Select the device(s) or device group(s) for which alerts are to be generated when the device goes down.
Select the time interval (minutes, hours, days) at which you want to be notified via email.
In the Subject box, enter the subject of the email that will be sent to users.
In the Email Address box, enter the email IDs of users to whom the alert emails should be sent.
Settings tab > Admin Settings > Management > Report Profiles
To create a report profile refer to the procedure given in the ‘How to create custom reports’ section.
The newly created "Syslog" based format can be assigned to any syslog devices. This can be done by
navigating to Settings > Devices > Syslog devices > Update > Device Type and update to newly created format.
The newly created "File import" based format can be assigned during file import.
There are two methods available to extract the field: Regex and Delimiter.
Paste the log, click Save Changes, and select the field values to be extracted.
Provide a rule name and field name for the parser rule.
Verify whether the generated pattern is extracting the field correctly by clicking Validate this pattern.
Clicking Validate this pattern opens a new window to verify the generated pattern with the recently collected
50 logs, matching it. If the pattern does not match, the logs will be categorized as unmatched. If the pattern
proves ineffective, select a different pattern by clicking Choose another pattern and attempt to validate the
pattern.
View the fields and open attributes associated with a specific parser rule, along with the option to disable or
enable that rule. Edit the parser rule as needed and delete it if necessary.
To add a parser rule for the predefined format, navigate to Settings > Custom Log Format > Predefined log
format.
The details of the log are displayed, and then select Extract Additional Fields.
The created parser rule can be viewed from the settings page.
To view, create, edit, or delete profiles, navigate to Settings > Admin Settings > General > Profiles. You can see a list of
existing profiles.
Enter a name for the profile and select the groups that should constitute it. To know how to add a new device
group, click here.
If you want to set that as the default profile, check the Set this view as default profile box.
Finally, click Add.
Editing profile
Click the edit icon corresponding to the profile you want to edit.
Update the necessary details and click Update.
Deleting profiles
Click the delete icon corresponding to the profile you want to delete.
In the pop-up box that appears, click Yes.
icon.
3. Select whether you want to schedule the backup daily, weekly, or monthly and at what time from the Backup
Frequency drop-down.
4. Enter the Backup Storage Path. You can either choose a local folder or shared folder to store the backups.
5. If the shared folder you’ve chosen needs permission to store the backups, then select the check against the
Authentication Required box, and enter the necessary credentials.
6. Set a retention period for the backup files from the Maintain Backup Files drop-down.
7. Click Save.
3. To edit the backup schedule for a particular component, click on the icon located in the action column of the
component.
4. Use the Backup Now option to initiate a backup instantly.
5. Use the Recent Backups icon in the status column to view all available backups.
MSSQL Backup
Automatic backups cannot be deleted directly from EventLog Analyzer since they are stored on the MSSQL server path.
To manage backup files, adjustments must be made within the MSSQL application settings.
Troubleshooting tips
1. If you get an error while backing up the database, please check whether:
The database server is running.
There is sufficient space in the backup storage location.
https://www.microsoft.com/en-
https://www.microsoft.com/en-
2008 SqlCmdLnUtils.msi in/download/details.aspx? sqlncli.msi Not Needed Not Needed
in/download/details.aspx?id=44272
id=44272
64 bit:
http://go.microsoft.com/fwlink/?
LinkID=239650&clcid=0x409
32 bit:
The previous column https://www.microsoft.com/en-
http://go.microsoft.com/fwlink/?
2012 contains the in/download/details.aspx? sqlncli.msi Not Needed Not Needed
LinkID=239649&clcid=0x409
download link. id=50402
Ref:
https://www.microsoft.com/en-
us/download/details.aspx?
id=29065
64 bit: 64 bit:
https://go.microsoft.com/fwlink/? https://go.microsoft.com/fwlink/?
linkid=2230791 Not linkid=2223304
2019 MsSqlCmdLnUtils.msi Not Needed msodbcsql.msi
Needed
32 bit: 32 bit:
https://go.microsoft.com/fwlink/? https://go.microsoft.com/fwlink/?
linkid=2231320 linkid=2223303
64 bit:
https://go.microsoft.com/fwlink/?
https://www.microsoft.com/en- Not linkid=2249006
2022 MsSqlCmdLnUtils.msi Not Needed msodbcsql.msi
us/download/details.aspx?id=53591 Needed
32 bit:
https://go.microsoft.com/fwlink/?
linkid=2249005
If firewall is enabled in the MS SQL Server machine, the TCP and UDP ports must be opened.
If the MS SQL server you wish to migrate to has Force encryption enabled, follow the steps mentioned below.
Convert your certificate to .cer format.
Open IIS Manager.
In the middle pane, click Server Certificates.
Open the certificate you want to use, and click the Details tab.
Click Copy to file.
Click Next in the Certificate Export Wizard that appears.
On the Export Private Key screen, select No, do not export the private key, and click Next.
On the Export File Format screen, select either DER encoded binary X.509 (.CER) or Base-64
encoded X.509 (.CER), and click Next.
Repeat the steps 1 to 3 from above whenever you update the PostgreSQL server.
Note: Take a Backup/Snapshot of EventLog Analyzer before proceeding with the steps (Important)
1. Open the Command Prompt and navigate to <EventLog Analyzer home\bin> (Here, EventLog Analyzer home is the
location where EventLog Analyzer is installed).
2. Stop EventLog Analyzer by running shutdown.bat.
3. Run the tools/ChangeDBServer.bat.
4. From the Server Type menu, select the database server you plan to switch to.
5. If you select PostgreSQL Server, then:
In the Host Name and Port field, enter the host name or IP address and the port number of the PostgreSQL
database server.
Enter the username and password of a user with the necessary permissions to create a new database.
7. If you want to use Windows authentication, select Windows Authentication, and enter the username and password
of a Windows domain user account.
8. Check the box next to Migrate Existing Data to copy the data from your old database to the new database.
IMPORTANT: Leave this box unchecked only if you are changing the database of a fresh installation of
EventLog Analyzer.
9. If the MS SQL server you wish to migrate to has Force encryption enabled, check the box next to SSL connection.
10. Click Test Connection and wait for the connection to be established.
11. Once Test Connection has been established successfully, click Configure DB to initiate migration.
12. Click the OK button to initiate the migration process. During the migration, you have the option to cancel if
necessary.
Notification Settings
Manage Account TFA
Install EventLog Analyzer as a service
Connection Settings
Rebranding
System Diagnostics
Database Access
Log Level Settings
Port Management
The email and SMS settings can be configured according to your environment's requirements.
Email Settings
To configure or change email settings,
Navigate to Settings > System Settings > Notification Settings > Mail Settings.
SMTP
API
SMTP
Note: To learn how to find your Azure Tenant ID, Client ID, and Client Secret, click here.
API
This method allows you to create and authenticate a mail server via your mail provider’s API.
Note: To learn how to find your Google Tenant ID, Client ID, and Client Secret, click here.
If your mail provider is Google, upload the JSON private key file.
Note: To learn how to get your JSON private key file, click here.
Steps to find your Azure Tenant ID, Client ID, and Client Secret for SMTP mail server configuration
Log in to portal.azure.com.
Under Azure services, click App registrations → New registration.
Provide a Name of your choice and select the Supported account types. (Leave it as default).
In the Redirect URI field, select web & paste the following OAuth link:
https://identitymanager.manageengine.com/api/public/v1/oauth/redirect (or) You can also add the localhost
redirect API in the following syntax.
Steps to find your Google Workspace Client ID, and Client Secret for SMTP mail server configuration
Log in to console.developers.google.com.
In the dashboard, click Create to create a new project if there is no existing project or select any existing project
and click New Project.
Enter the Project Name. In the Location field, click Browse and select the parent organization. Click Create.
In the left pane of the displayed project details page, click APIs & Services → Library.
From the available list of APIs, select Gmail API and click Enable. You can use the search option to find the API
quickly.
In the left pane, click OAuth consent screen and choose the User Type. If you don't have a Google workspace
account, choose External User.
Provide the Application Name, Application Logo, and the support email of your help desk, developer
information, and click Save & continue.
Click Add or Remove Scopes, choose Gmail API (https://mail.google.com/), and click Update. Then, click
Save & Continue.
Add a test user and click Save & continue.
In the left pane, click Credentials → Create Credentials → OAuth Client ID.
Select the application type as Web Application. Provide a name of your choice.
In the Authorized Redirect URIs, paste the following OAuth link:
https://identitymanager.manageengine.com/api/public/v1/oauth/redirect (or) You can also add localhost
redirect API in the following pattern.
Steps to find your Azure Tenant ID, Client ID, and Client Secret for API mail server configuration
Log in to portal.azure.com.
Under Azure services, click App registrations → New registration.
Enter a Name of your choice and choose the Supported account types. (If you’re unsure about the supported
account types, select Accounts in the organizational directory only).
In the left pane, click API Permission → Add a permission.
Steps to download JSON private key for API mail server configuration
Log in to console.developers.google.com.
Open the Service accounts page.
Click Create Project. Enter the project name, organization and location. Click Create.
Click + Create service account button from the top row.
Under Service account details, type a name, ID, and description for the service account, then click Create and
continue.
If required, you can also select the IAM roles to be granted to the service account using the Grant this service
account access to project option.
Click Continue
If required, you can add the users or groups that are allowed to use and manage the service account.
Click Done.
Click the email address for the service account you created.
Click the Keys tab.
In the Add key dropdown list, select Create new key.
Select key type as JSON.
Click Create.
Your new public/private key pair will be generated and downloaded to your machine. Please keep the private key safe
as this will be the only copy, and you cannot generate the same private key again.
Once you have downloaded the JSON private key, you’ll have to enable Gmail API service and provide domain-wide
authority to the service account.
Your application now has the authority to make API calls as users in your domain (to "impersonate" users). When you
prepare to make authorized API calls, specify the user to impersonate as.
SMS Settings
To configure or change SMS settings,
Navigate to Settings > System Settings > Notification Settings > SMS Settings.
For sending SMS alerts, you can configure EventLog Analyzer to use a GSM modem or a custom SMS gateway
of your own.
where,
userName = the parameter which is used to denote the API authentication username
xxx = API authentication username
password = the parameter which is used to denote the API authentication password
yyy = API authentication password
mobileNumber = recipient parameter
%mobNo% = this macro denotes the user's mobile number
message = message parameter
%message% = this macro denotes the SMS message content
More HTTP Parameters - If you SMS provider requires more parameters like unicode and apiID, include them as well
using the '&' sign
Specify the response you get from your provider to determine the success of sending the SMS.
Click Advanced Settings and enter the HTTP request headers specific to your SMS provider.
Select the check box Convert Message into Unicode to send SMS in Unicode format.
Click Save Settings to complete configuration.
To manage the two-factor authentication settings of the logged in user account, click the profile icon on the top right
corner and select My Account.
You get a screen with three tabs: Personalize, Two-factor Authentication, and Change Password.
Personalize
In this tab, you change the email ID of your account and the language of the product.
From this tab, you can also manage trusted browsers and manage backup authentication codes.
To view the already-generated backup verification codes or to generate new ones, click Manage Backup Verification
Codes.
In the pop-up box that appears, you can see a list of backup verification codes. If all of the previously generated codes
have been used up, you can generate a new set by clicking Generate New Codes. Once new codes have been
generated, it is advisable to back them up by downloading the list, printing it, or emailing it.
Change Password
In this tab, you can change the password of your account.
Windows:
1. Establish a remote connection with the server where EventLog Analyzer is installed.
2. Open the command prompt with Admin privileges.
3. Navigate to <Eventlog Analyzer>\bin
4. Execute the following commands sequentially to ensure that the instance is not running:
shutdown.bat
stopDB.bat
stopSEC.bat
5. Execute the following command to install EventLog Analyzer as a service.
service.bat -i
6. Go to services.msc and start the ManageEngine EventLog Analyzer service.
Linux:
1. Establish a remote connection with the server where EventLog Analyzer is installed.
2. Navigate to <Eventlog>\bin
3. Execute the following commands sequentially with Admin privileges to ensure that the instance is not running:
sudo sh shutdown.sh
sudo sh stopDB.sh
sudo sh stopSEC.sh
4. Execute the command "sudo sh ConfigureAsService.sh -i"
5. Execute the command "service eventloganalyzer status" to verify the service installation.
Note: The http and https port numbers should be different from each other.
3. Keystore Password: If you require the keystore password to be encrypted, enable this option and provide
the required password.
4. Session Expiry Time: Mention the maximum duration for which a session of EventLog Analyzer can stay
idle, following which it expires.
Advanced Settings
5. TLS: Configure the required TLS protocol to bound with Eventlog Analyzer Server
6. Ciphers: Select the respective cipher suites compatible with the Above selected TLS version
The list of default ciphers supported in ELA are:
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
Navigate to Settings tab > System Settings > Connection Settings → SSL Certification Tool.
If you don’t have a SSL certificate, select the Generate Certificate option and follow the steps here.
If you already have a SSL certificate, select the Apply Certificate option and follow the steps here.
Apply Certificate
If you already have a SSL certificate, follow the steps listed below to apply it.
In the Apply Certificate to drop-down, select the component for which you want to apply the SSL certificate.
Choose an Upload Option based on the certificate file type.
ZIP upload:
Note: Only Triple DES encrypted private keys are currently supported.
Click Apply.
Finally, restart EventLog Analyzer.
Generate Certificate
Note: When no value is entered, the certificate will be considered to be valid for 90 days.
In the Public Key Length (In Bits) field, specify the size of the public key.
Note: The default value is 2048 bits and its value can only be incremented in multiples of 64.
After all values have been entered, you can select either of these two options:
Generate CSR
This method allows you to generate the CSR file and submit it to your CA. Using this file, your CA will
generate a custom certificate for your server.
1. Click Download CSR or manually get it by going to the <Install_dir>\Certificates folder.
2. Once you have received the certificate files from your CA, follow the steps listed under Apply
Certificate to apply the SSL certificate.
Apply Self-signed Certificate
This option allows you to create a self-signed certificate and apply it instantly in the product. However,
self-signed SSL certificates come with a drawback. Anyone accessing the product secured with a self-
signed SSL certificate will be shown a warning telling them that the website is not trusted, which may
cause concern.
Customize Images
Replace the default images with your company/enterprise images
Client Logs & Images Where it is used Image Size & Thumbnail New Image
Client Logs & Images Where it is used Existing String/Link New String/Link
Note:
You can customize ZohoCorp/ManageEngine image/links as per your requirement.
Customization takes effect only for the changed image/links, else default images/links are retained.
Size of new image should be of same size as the default image.
Images with the following file extensions are only permitted: .jpg, .jpeg and .png
JVM Information - The information about the ELA JVM and ES JVM are listed.
System Information - Crucial system details like device name, OS type, and timezone are listed. It also includes the
product build number, EventLog Analyzer's working directory, and ES Data Path for comprehensive system insight.
Active Features Information: This section lists active/enabled product configurations, including the number of alert
profiles, correlation rules, scheduled reports/imports, and retention details, providing a concise overview of operational
settings.
General Build Information: A text file containing all details available on this page.
Server Logs: Including ELA and ES logs.
Utilize the Auto option to compress and upload logs directly to the support server.
Provide the necessary details, such as mail-id and ticket-id.
Upon uploading, an acknowledgment mail will be sent.
The details of Disk Usage, Log Flow, CPU Usage, and RAM Usage of ManageEngine EventLog Analyzer will be
displayed here.
Recommendations
Here are some actions you can take if any module's disk space is low:
Log Flow shows three different categories, namely Windows, Syslogs and Other logs.
It displays the incoming log flow of all the devices based on log type.
This dashboard allows you to monitor the log flow rate for the different types of logs and manage your resources
accordingly. You can also check the Trends tab to get a better idea of the log flow rates in the recent past.
Recommendations
Here are some actions that you can take to optimize the usage of resources:
CPU Usage
Increase the number of CPU cores available.
Check if there are any Cached Records being processed from (ELA-HOME)/ES/CachedRecord.
Check if there is an Alert Dump in (ELA-HOME)/data/AlertDump.
If the CPU usage is still high, contact Eventlog Analyzer support with the above details.
RAM Usage
Increase the amount of RAM available.
If the RAM usage is still high, contact EventLog Analyzer support.
Trends
EventLog Analyzer allows you to view the trends of the resources being utilized over a period of time. The Trends tab
contains the data for each day the product is up and running, and can be viewed in three different formats:
Last 7 days
Last 14 days
Last 30 days
Settings tab > System Settings > System Diagnostics > Database Access
Note:
Only 'read queries' can be executed.
Create, Alter, Insert queries cannot be executed.
Table and Column names are case sensitive.
Note: The recommendation is based on trend data; it's advisable to run the product for at least 7 days to obtain
more accurate recommendations.
Modify log flow and retention values by clicking on "edit" to tailor your configurations according to your needs.
You can calculate the Windows Log flow rate for the configured domains.
Clicking the Device count of each domain enables viewing the EPS of individual devices within the domain.
If the recommended value for Index Disk Space exceeds 1.5TB, the ES - Node Recommendation will be displayed.
In the Settings tab, navigate to System Settings > System Diagnostics > Log Level Settings.
Note that
Syslog Ports
1. Go to Settings > System Settings > Listener Ports.
6. To disable a Syslog port, click corresponding to the port you want to disable.
7. To enable a Syslog port, click corresponding to the port you want to enable.
TCP and TLS protocols cannot share the same port number.Syslog Ports.
2. In the pop-up box that appears, enter the desired port number.
3. Click Update.
9. Enter the desired port number. This port will only be used by the workflow and syslog device discovery modules.
10. The SNMP V1/V2C will use community string for SNMP Trap and Discovery.
12. Enter the Engine ID. This will be used for trap collection and sending traps in workflows.
13. Select SNMPV3 Credential's Authentication Level.
14. Enter the Authentication Phrase for SNMPv3 Credential.
15. Select SNMPV3 Credential's Privacy Level.
16. Enter Privacy Phrase for SNMPv3 Credential.
The log files are located in the <EventLogAnalyzer_Home>logs directory. Typically when you run into a problem,
you will be asked to send the serverout.txt file from this directory to EventLog Analyzer Support.
The log files are located in the <EventLogAnalyzer_Home>server/default/log directory. Typically when you run into
a problem, you will be asked to send the serverout.txt file from this directory to EventLog Analyzer Support.
I find that EventLog Analyzer keeps crashing or all of a sudden stops collecting logs. What could be the
reason?
The inbuilt PostgreSQL/MySQL database of EventLog Analyzer could get corrupted if other processes are
accessing these directories at the same time. So exclude ManageEngine installation folder from
Anti-virus scans
Automatic backup softwares
Snapshots in case of VMware installation
Ensure that no snap shots are taken if the product is running on a VM.
The SIF will help us to analyze the issue you have come across and propose a solution for the same.
If you are unable to create a SIF from the Web client UI,
You can zip the files under 'logs' folder, located in C:/ManageEngine/Eventlog/logs (default path) and upload the
zip file to the following ftp link: http://bonitas.zohocorp.com/upload/index.jsp?to=eventloganalyzer-
[email protected]
You can zip the files under 'log' folder, located in C:/ManageEngineEventlog/server/default/log (default path) and
upload the zip file to the following ftp link: http://bonitas.zohocorp.com/upload/index.jsp?to=eventloganalyzer-
[email protected]
How to register dll when message files for event sources are unavailable?
To register dll, follow the procedure given in the link below: http://ss64.com/nt/regsvr32.html
Stop the EventLog Analyzer service/server and start it after the registered DB service is started.
Should you no longer wish to be in charge of the database, you may opt to unregister, which will cause the
product to start and stop the database, along with its own start and stop.
Case 1: Your system date is set to a future or past date. In this case, uninstall EventLog Analyzer, reset the
system date to the current date and time, and re-install EventLog Analyzer.
Case 2: You may have provided an incorrect or corrupted license file. Verify that you have applied the license
file obtained from ZOHO Corp. If neither is the reason, or you are still getting this error, contact
[email protected]
To bind EventLog Analyzer server to a specific interface, follow the procedure given below:
to
to
to
to
> url=jdbc:postgresql://localdevice:33336/eventlog?stringtype=unspecified
to
url=jdbc:postgresql://<binding IP address>:33336/eventlog?stringtype=unspecified
> #------------------------------------------------------------------------------
# CONNECTIONS AND AUTHENTICATION
#------------------------------------------------------------------------------
# - Connection Settings -
to
#------------------------------------------------------------------------------
# CONNECTIONS AND AUTHENTICATION
#------------------------------------------------------------------------------
# - Connection Settings -
Open the pg_hba.conf file which is under <EventLog Analyzer Home>pgsqldata directory and add the line
to
Before proceeding further, stop the EventLog Analyzer service and make sure that 'SysEvtCol.exe','Postgres.exe'
and 'java.exe' are not running.
Assume xxx.xxx.xxx.xxx is the IP address you wish to bind with EventLog Analyzer.
File 1)
<ELA home>\bin\setCommonEnv.bat
<ELA home>\bin\runSEC.bat
File 3)
<ELA home>\server\conf\wrapper.conf
wrapper.app.parameter.1=com.adventnet.mfw.Starter
#wrapper.app.parameter.2=-L../lib/AdventNetDeploymentSystem.jar
wrapper.app.parameter.2=-b xxx.xxx.xxx.xxx
wrapper.app.parameter.3=-Dspecific.bind.address= xxx.xxx.xxx.xxx
File 4)
<ELA home>\conf\server.xml
File 5)
<ELA home>\conf\database_params.conf
File 6)
<ELA home>\pgsql\data\postgresql.conf
File 7)
<ELA home>\pgsql\data\pg_hba.conf
We need to replicate the host all all 127.0.0.1/32 trust line with the new IP address in place of 127.0.0.1 and add
it after that line. For replication, please copy this line itself and paste it in next line and then edit out the IP address.
Start EventLog Analyzer and check <ELA home>\logs\wrapper.log for the current status.
ELA employs the Dejavu-seriff font, which is preinstalled on Windows OS, when exporting reports. However, this
font is not preinstalled for some Linux distributions. An error occurs in these cases.
In such cases, install the font manually based on the distribution. The command required is listed below:
Case 1 : RHEL/CentOS
Case 2 : Ubuntu/Debian
Case 3 : SLES
Solution: Shut down all instances of MySQL and then start the EventLog Analyzer server.
Solution: Kill the other application running on port 33335. If you cannot free this port, then change the MySQL port
used in EventLog Analyzer.
EventLog Analyzer displays "Port 8400 needed by EventLog Analyzer is being used by another
application. Please free the port and restart EventLog Analyzer" when trying to start the server
Probable cause: The default web server port used by EventLog Analyzer is not free.
Solution: Kill the other application running on port 8400. Carry out the following steps.
wrapper.java.additional.21=-Djava.net.preferIPv4Stack=true
Before adding:
wrapper.java.additional.20=-Dorg.tanukisoftware.wrapper.WrapperManager.mbean=false
After adding:
wrapper.java.additional.20=-Dorg.tanukisoftware.wrapper.WrapperManager.mbean=false
wrapper.java.additional.21=-Djava.net.preferIPv4Stack=true
If you cannot free this port, then change the web server port used in EventLog Analyzer.
EventLog Analyzer displays "Can't Bind to Port <Port Number>" when logging into the UI.
Probable cause:The syslog listener port of EventLog Analyzer is not free. Solution:
Check for the process that is occupying the syslog listener port, using netstat -anp -pudp . And if possible, try
to free up this port.
If you have started the server in UNIX machines, please ensure that you start the server as a root user.
or, configure EventLog Analyzer to listen to a different syslog listener port and ensure that all your configured
devices send their syslog to the newly configured syslog listener port of EventLog Analyzer
Solution:
Download the "Automated.zip" and extract the files "startELAservice.bat"and "stopELAservice.bat" to <ELA
home>//bin/ folder.
Create a Windows schedule as per your requirement and ensure that the path should be <ELA Home>//bin
folder.
If you would like to have the files to a different folder, you need to edit the downloaded files and give the
absolute path as below: < eg. is the application is installed on e:\ >
e:\ManageEngine\EventLog\bin\wrapper.exe -p ..\server\conf\wrapper.conf ---> to stop the EventLog
Analyzer service.
e:\ManageEngine\EventLog\bin\wrapper.exe -t ..\server\conf\wrapper.conf ---> to start the EventLog
Analyzer service.
Solution: To disable requiretty, please replace requiretty with !requiretty in the etc/sudoers file.
Note:Elasticsearch uses multiple thread pools for different types of operations. It is important for new threads to
be created whenever necessary. Please make sure that the number of threads that an elasticsearch user can
create is at least 4096 by setting ulimit -u 4096 as root before starting Elasticsearch or by adding elasticsearch -
nproc 4096 in /etc/security/limits.conf.
Navigate to <PRODUCT_HOME>\bin and invoke StartDB.bat as administrator. If you see access denied error,
Execute setAppPermission.bat and wait for its completion.
Note: EventLog Analyzer directory permissions will be modified on executing the setAppPermission.bat as
mentioned in this document here.
Note: Backup will be done only for the instances with PGSQL or MSSQL database. PPM backup feature is not
available for MySQL database.
If the database size exceeds 10GB, the auto-backup won't work and the user will be notified to backup
manually before proceeding with the upgrade.
For PGSQL database, backup will be done only if there is enough free space available in the EventLog
Analyzer installed drive. Incase of MSSQL database, the backed up data will be stored in the default backup
folder configured for MSSQL. The availability of free space will be checked before backup operation and if
enough space is not available, the user will be notified. Users can either clear-up enough space for auto-
backup or they can proceed to back up manually.
For PGSQL database, only two PPM backups will be maintained and older backups will be deleted upon
rotation.
For MSSQL database, backups won't be deleted automatically. Users will have to manually clear them.
Incase of upgrade failure, the backups can be used to restore the last known working state of the instance.
Please contact support for the restoration process.
The probable reason and the remedial action is: Probable cause: The device machine RPC (Remote Procedure
Call) port is blocked by any other Firewall. Solution: Unblock the RPC ports in the Firewall.
While adding device for monitoring, the 'Verify Login' action throws 'Access Denied' error.
Probable cause: The device machine is not reachable from EventLog Analyzer machine.
Solution: Check the network connectivity between device machine and EventLog Analyzer machine, by using
PING command.
Probable cause: The device machine running a System Firewall and REMOTEADMIN service is disabled.
Solution: Check whether System Firewall is running in the device. If System Firewall is running, execute the
following command in the command prompt window of the device machine:
netsh firewall set service type=REMOTEADMIN mode=ENABLE profile=all
When WBEM test is carried out. it fails and shows error message with code 80041010 in Windows Server
2003.
Probable cause: By default, WMI component is not installed in Windows 2003 Server
Solution: Win32_Product class is not installed by default on Windows Server 2003. To add the class, follow the
procedure given below:
2. In the Windows Components Wizard, select Management and Monitoring Tools, then click Details.
3. In the Management and Monitoring Tools dialog box, select WMI Windows Installer Provider and then click
OK.
4. Click Next.
Probable cause: The object access log is not enabled in Linux OS.
server_args = -i -o -L
What are commands to start and stop Syslog Deamon in Solaris 10?
Solution: In Solaris 10, the commands to stop and start the syslogd daemon are:
In Solaris 10, to restart the syslogd daemon and force it to reread /etc/syslog.conf:
(or)
# svcadm -v restart svc:/system/system-log:default
This error can occur if the ticketing tool server's HTTPS certificate is not included in EventLog Analyzer's JRE
certificate store. To import the certificate to EventLog Analyzer's JRE certificate store, follow the steps below:
1. Place the server's certificate in your browser's certificate store by allowing trust when your browser throws up
the error saying that the certificate is not trusted.
2. Export the certificate as a binary DER file from your browser.
3. For Firefox, you can do this by following the steps below:
Click the lock symbol next to the URL and click More Information.
Select the Security tab, click View certificate, and click the Details tab.
Select the certificate and click Export. Select a location in your local machine and save the certificate.
4. For IE, Internet Options > Content > Certificates > Personal > Export
5. For Chrome, Settings > Show Advanced Settings > Manage Certificates
6. Use the keytool utility to import the certificate into EventLog Analyzer's JRE certificate store. The command
should be executed from <Eventlog Analyzer Home>/jre/bin.
7. Enter the keystore password. Note that the default password is changeit.
If you are facing problems while configuring EventLog Analyzer with JIRA On-Premise even after entering the valid
credentials, please follow the steps below:
The following are some of the common errors, its causes and the possible solution to resolve the condition. Feel
free to contact our support team for any information.
Cause: Cannot use the specified port because it is already used by some other application.
Solution: This can be solved either by changing the port in the specified application or by using a new port.
If you use a new port, make sure to change the ports in the forwarding device either manually or using auto log
forwarding configuration.
Solution: Configure the server to use either a self-signed certificate or a valid PFX certificate.
Solution 2: If valid KeyStore certificate is used, execute the following command in the <EventLog Analyzer
home>/jre/bin terminal.
External error
Windows:
Linux:
Problem statement:
Some Windows devices appear duplicated due to a user interface issue identified as ELA 12260.
Action taken:
Local collector association:
Duplicated devices with the oldest log collection timestamps will be deleted if they are linked to a local collector.
The difference between the current date and the last message time is less than the retention period.
The difference between the current date and the last message time exceeds the retention period.
Profile remapping:
If any of the deleted or disabled devices were previously configured under the following profiles: Application,
Import, Alert, Report, Log Collection Filter, Syslog Forwarder, Agent, they will be remapped to ensure continued
functionality.
1. Issue: When SELinux (Security Enhancement) is enabled, some default policies prevent audit logs from Red
Hat Linux systems from being read during the forwarding process.
2. Solution: The audit logs can be forwarded by adding "active=yes" in etc/audisp/plugins.d/syslog.conf or
create the file in etc/audit/plugins.d/syslog.conf for CentOS/RHEL v8 and later with the below entries:
path = builtin_syslog
type = builtin
args = LOG_INFO
format = string
Note: This will forward the audit logs to the syslog service. Log Forwarding via Syslog Service should be
enabled to receive the logs in EventLog Analyzer server.
Causes
Solutions
Cause
The audit daemon service is not present in the selected Linux device.
Solution
Cause
Solutions
Causes
Solutions
Causes
Solutions
Causes
The agent is installed on a host which has neither a Linux nor a Windows OS.
Solutions
Supported Linux distributions are CentOS, Debian, Fedora, openSUSE, Red Hat, and Ubuntu.
Windows versions greater than 5.2 (Windows Server 2003) are supported.
Cause:
Solution:
Causes:
Due to the missing SSH Algorithm.
Insufficient privileges for the "/opt/ManageEngine"
Solutions:
Ensure that any of the SSH Algorithms are present in the "/etc/ssh/sshd_config" file.
Setting privilege for the " /opt/ManageEngine "
Execute the following command to verify that the immutable rule is enabled:
> auditctl -s
If "enabled 2" is present in the configuration, it indicates that the immutable rule is active. This setting will prevent
the Linux agent from applying any newly configured audit rules to monitor the locations specified in EventLog
Analyzer.
Solution:
and comment out or remove the configuration from the relevant file.
Reboot the machine to apply the updated configuration.
To confirm that the immutable rule is no longer active, run the below command and check that "enabled 1" is
present in the configuration.
> auditctl -s
Causes:
Solutions:
Probable cause: The device machine is not reachable from the EventLog Analyzer server machine
Solution: Check if the device machine responds to a ping command. If it does not, then the machine is not
reachable. The device machine has to be reachable from the EventLog Analyzer server in order to collect event
logs.
Probable cause: You do not have administrative rights on the device machine
Solution: Edit the device's details, and enter the Administrator login credentials of the device machine. Click
Verify Login to see if the login was successful.
Probable cause: The device was added when importing application logs associated with it. In this case, only the
specified application logs are collected from the device, and the device type is listed as unknown.
Solution:
I get an Access Denied error for a device when I click on "Verify Login" but I have given the correct login
credentials
Probable cause: There may be other reasons for the Access Denied error.
Solution: Refer the Cause and Solution for the Error Code you got during Verify login.
Scanning of the Windows workstation failed due to one of the following reasons:
1. The login name and password provided for scanning is invalid in the workstation. Solution: Check if the
login name and password are entered correctly.
2. Remote DCOM option is disabled in the remote workstation Solution:
Check if Remote DCOM is enabled in the remote workstation. If not enabled, then enable the same in the
following way:
Check if the user account is valid in the target machine by opening a command prompt and executing the
following commands:
If these commands show any errors, the provided user account is not valid on the target machine.
The user name provided for scanning does not have sufficient access privileges to perform the scanning
operation. This user may not belong to the Administrator group for this device machine.
Solution: Move the user to the Administrator Group of the workstation or scan the machine using an administrator
(preferably a Domain Administrator) account.
A firewall is configured on the remote computer. Such exceptions mostly occur in Windows XP (SP 2), when the
default Windows firewall is enabled.
Solution:
Click OK
2. If the firewall cannot be disabled, launch Remote Administration for administrators on the remote machine
by executing the following command:
After scanning, you can disable Remote Administration using the following command:
Solution: Register the WMI DLL files by executing the following command in the command prompt:
winmgmt /RegServer
There is some internal execution failure in the WMI service (winmgmt.exe) running in the device machine. The last
update of the WMI Repository in that workstation could have failed.
Solution:
Probable cause: The device machine RPC (Remote Procedure Call) port is blocked by another firewall.
For any other error codes, refer the MSDN knowledge base.
I have added an Custom alert profile and enabled it. But the alert is not generated in EventLog Analyzer
even though the event has occured in the device machine
Probable cause: The alert criteria have not been defined properly
Solution: Please ensure that the required fields in the Add Alert Profile screen have been given properly.Check if
the e-mail address provided is correct. Ensure that the Mail server has been configured correctly.
When I create a Custom Report, I am not getting the report with the configured message in the Message
Filter
Probable cause: The message filters have not been defined properly
Solution:When you are entering the string in the Message Filters for matching with the log message, ensure you
copy/enter the exact string as shown in the Windows Event Viewer.
e.g., Logon Name:John
Stop the Eventlog Analyzer Server/Service (Check the Eventlog Analyzer server machine's Task Manager to
ensure that the processes 'SysEvtCol.exe', 'Java.exe' are not running).
Connect MS SQL client (using Microsoft SQL Server Management Studio) and execute the below query:
sp_dboption 'eventlog', 'trunc. log on chkpt.', 'true'
To execute the query, select and highlight the above command and press F5 key.
After executing the above command, select and highlight the below command and press F5 key to execute it.
DBCC SHRINKDATABASE (eventlog)
Note: This process will take some time, based on the EventLog Analyzer database size.
Start the Eventlog Analyzer.
If Oracle device is Windows, open Event viewer in that machine and check for Oracle source logs under
Application type. If Linux, check the appropriate log file to which you are writing Oracle logs. If the Oracle logs are
available in the specified file, still EventLog Analyzer is not collecting the logs, contact EventLog Analyzer Support.
The user name provided for scanning does not have sufficient access privileges to perform the scanning
operation. Probably, this user does not belong to the Administrator group for this device machine
Check EventLog Analyzer's live Syslog Viewer for incoming Syslog packets.
If you are able to view the logs, it means that the packets are reaching the machine, but not to EventLog Analyzer.
You need to check your Windows firewall or Linux IP tables.
If you are not able to view the logs in the Syslog viewer, then check if the EventLog Analyzer server is reachable.
This can be done in the following ways:
If reachable, it means there was some issue with the configuration. If not reachable, then you are facing a network
issue.
If an agent is installed manually without credentials or if the agent credentials are updated incorrectly, it leads to
the "Agent not reachable from server" status (see screenshot below).
In such a state, the following actions performed on the agent will not reflect immediately.
Note: This icon does not hinder the log collection process, logs will be collected regardless of the presence
of this icon.
Furthermore, actions such as starting and uninstalling the agent must be manually executed, as they cannot be
performed through the UI due to invalid credentials.
If the cloud icon, indicating that the agent is unreachable from the server, is to be hidden or if real-time actions
are required, please make sure to update the credentials accurately.
"Agent not communicating" is the agent status that appears if there has been a prolonged time of no
communication between the agent and the server.
Ensure the EventLog Analyzer server is accessible from the agent device.
Verify if the latest server details are updated in the registry
[Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ZOHO Corp\EventLogAnalyzer\ServerInfo]
Check if any antivirus or firewall is blocking the communication between the server and agent. If so, provide
an exclusion for EventLog Analyzer agent from AntiVirus.
Ensure the EventLog Analyzer Agent service is running, and start it if necessary.
Note: Contact support if the issue persists even after following the above steps.
1. Check if other applications are blocking the CPU cycle for EventLog Analyzer.
2. If a virtual machine is used, check for over provisioning or if snapshots are affecting the performance.
3. If the log flow rate is high, please check our tuning guide.
This error message pops up when the feature you tried to use is not available in the online demo version of
EventLog Analyzer. To try out that feature, download the free version of EventLog Analyzer.
This error message can be caused because of different reasons. It might be due to network issues, proxy related
issues, bad requests in the network, or if the URL is unable to locate a STIX/TAXII server.
Authorization failed.
This error message signifies that the credentials entered are wrong.
Description:
This error occurs when the common name of the SSL Certificate doesn't exactly match the hostname of the server
in which the EventLog Analyzer is installed.
Solution:
Please get a new SSL certificate for the current hostname of the server in which EventLog Analyzer is installed.
Invalid Certificate
Description:
This error occurs when the SSL certificate you have configured with EventLog Analyzer is invalid. A certificate can
become invalid if it has expired or other reasons.
Solution:
SMS Settings
Description:
This exception occurs when you configure a SMTP mail server or a web server with SSL in EventLog Analyzer, and
the server uses a self-signed certificate. The Java Runtime Environment used in EventLog Analyzer will not trust
self-signed certificates unless it is explicitly imported.
Solution:
You need to import the self-signed certificates used by the server in the JRE package used by EventLog Analyzer.
Follow the steps given below:
Note:
To download the certificate used by SMTP server, you must have OpenSSL installed. You can download
it from here.
Open the command prompt and change to the bin folder in the OpenSSL installed location.
Now run the following command,
For example, openssl.exe s_client -connect smtp.gmail.com:587 -starttls smtp > gmailcert.cer
Open a command prompt and change to the \jre\bin folder. For example:
C:\ManageEngine\EventLogAnalyzer\jre\bin.
Run the following command,
For example: Keytool -importcert -alias myprivateroot -keystore ..\lib\security\cacerts -file C:\smtpcert.cer
Enter changeit when prompted for a password.
Enter y when prompted Yes or No.
Close the command prompt and restart EventLog Analyzer.
This may happen when the product is shutdowns while the data store is updating and there is no backup
available.
Troubleshooting steps:
This is a rare scenario and it happens only when the product shuts down abruptly during the first ever
download of IP geolocation data.
There is no need for a troubleshoot as EventLog Analyzer will automatically download the data in the next
schedule. Please note that the IP geolocation data gets automatically updated daily at 21:00 hours.
This occurs when there is no internet connection on EventLog Analyzer server or if the server is unreachable.
Troubleshooting steps:
https://creator.zoho.com/
https://creatorapp.zohopublic.com/
This may happen when the product is unable to connect to the Log360 Cloud feeds server.
Probable cause: The access to Log360 Cloud feeds server may be blocked under the firewall.
Solution:
1. Review the firewall settings and look for any rules that might block the access.
2. If you find any blocking rules, create a new rule that allows the traffic to the Log360Cloud feeds server.
3. Save the new rule and update the firewall with the new settings.
Probable cause: The machine could not resolve the domain using its DNS resolver.
Solution:
1. Check the DNS settings on the machine on which the product is running. Ensure that the DNS server settings
are correct and that the machine is able to communicate with the DNS server.
2. Try to resolve the domain name using a command line tool such as nslookup or dig to confirm that the DNS
resolution is failing.
3. Check if there are any firewalls or security settings that may be blocking DNS traffic.
4. If using a proxy server resolves the DNS of the host involved, configure the proxy server in the product
connection settings.
If none of the above works and the issue persists, contact our Technical Support team.
If the license file cannot be accessed in the following page https://licensing.manageengine.com , kindly contact
[email protected]
1. Login to https://log360feeds.manageengine.com/
2. Click on Regenerate Key.
3. In the product, go to Settings > Admin Settings > Threat Feeds > Advanced Threat Analytics > Log360 Cloud
Threat Analytics and add the new key.
This happens when you exceed one of your quotas (per minute, per day or per month). Daily quotas are reset
every day at 00:00 UTC.
Troubleshooting steps:
The request has been submitted to VirusTotal and there are server-side internal issues.
The request has been submitted to Log360 Cloud Threat Analytics, and there are server-side internal issues.
Customers are advised to retry in a while, and if the same error is encountered, kindly contact " eventlog-
[email protected] "
This occurs when EventLog Analyzer server faces network connectivity issues.
Troubleshooting steps:
https://creator.zoho.com/
https://creatorapp.zohopublic.com/
This occurs, when the JRE present in the product is not updated of the changes.
Note:
Incase customer environment is restricted from Online access follow 6.1 and 6.2.
6.1: please select the latest time zone updater link from https://data.iana.org/time-zones/releases/ and
download the latest timezone zip in tar.gz format.
For example
Elasticsearch writes the data you index to indices, and data streams to a data directory which is available in
elasticsearch.yml. Search and indexing will not work if the data path is not accessible.
If the data path is not accessible to write, the following notification will be shown.
Troubleshooting steps
1. Open elasticsearch.yml file,search for path.data and find its value. elasticsearch.yml file can be found in
<Installation Dir>/EventLog Analyzer/ES/config/elasticsearch.yml
2. Make sure that both read and write permissions are enabled for the service account running EventLog
Analyzer.
3. If the path is a network location, then ensure connectivity and that the network path is accessible from the
machine running EventLog Analyzer. Verify that there are no latency issues between the server and remote
data path.
If there is a need to change the data path of Elasticsearch, kindly follow this guide.
The Free Edition of EventLog Analyzer is limited to handling event logs from a maximum of five devices, whereas
the Professional Edition can handle event logs from an unlimited number of devices. There is no other difference
between the two editions, with respect to features or functionality.
Yes, a 30-day free trial version can be downloaded here. At the end of 30 days it automatically becomes a Free
Edition, unless a new license is applied.
The trial version is a fully functional version of EventLog Analyzer Premium Edition. When the trial period expires,
EventLog Analyzer automatically reverts to the Free Edition.
No, you do not have to reinstall or shut down the server. You just need to enter the new license file in the Upgrade
License box.
This depends on the platform on which EventLog Analyzer is installed. If installed on a Windows machine,
EventLog Analyzer can collect event logs or syslogs from Windows and Unix devices, Cisco Switches and
Routers, and other syslog devices . If installed on a Unix machine, EventLog Analyzer can collect syslogs only from
Unix devices, Cisco Switches and Routers, and other syslog devices.
This depends only on the capacity of the server on which EventLog Analyzer is installed. The EventLog Analyzer
license does not limit the number of users accessing the application at any time.
EventLog Analyzer runs in a web browser. Does that mean I can access it from anywhere?
Yes. As long as the web browser can access the server on which EventLog Analyzer is running, you can work with
EventLog Analyzer from any location.
You can buy EventLog Analyzer directly from the ManageEngine Online Store, or from a reseller near your location.
No. EventLog Analyzer cannot work if DCOM is disabled on remote systems. You need to have DCOM enabled in
remote windows servers for the logs to get collected and shown in EventLog Analyzer.
To monitor Windows Events in ELA Linux installation, you need to convert Windows Event messages into Syslog
messages. To convert the message you have to use a separate tool.
What are the differences between ELA installed in Windows and Linux machines?
Most features from windows and linux are identical. Tight integration for windows machines are not available in
linux builds, Although there are manual steps available to achieve the missing windows functionality.
SQL Server as
6 back-end Available N/A N/A
database
It is recommended that you install EventLog Analyzer on a machine with the following configuration:
Look up System Requirements to see the minimum configuration required to install and run EventLog Analyzer.
EventLog Analyzer can be started as a root user, but all file permissions will be changed, and later you cannot start
the server as another user.
When I try to access the web client, another web server comes up. How is this possible?
The web server port you have selected during installation is possibly being used by another application.
Configure that application to use another port, or change the EventLog Analyzer web server port.
The archiving feature in EventLog Analyzer automatically stores all logs received in zipped flat files. You can
configure archiving settings to suit the needs of your enterprise. Apart from that, if you need to backup the
database, which contains processed data from event logs, you can run the database backup utility,
BackupDB.bat/.sh present in the <EventLog Analyzer Home>/troubleshooting directory.
To take a backup of the existing EventLog Analyzer PostgreSQL database, ensure that the EventLog Analyzer
server or service is stopped and create a ZIP file of the contents of <EventLog Analyzer Home>/pgsql directory and
save it.
MSSQL database
Find the current location of the data file and log file for the database eventlog by using the following commands:
sp_helpfile
go
sp_detach_db 'eventlog'
go
Backup the data file and log file from the current location (<MSSQL Home>dataeventlog.mdf and <MSSQL
Home>dataattention-grabbing) by zipping and saving the files.
To take a backup of the existing EventLog Analyzer MySQL database, ensure that the EventLog Analyzer server or
service is stopped and create a ZIP file of the contents of <EventLog Analyzer Home>/mysql directory and save it.
Normally, the EventLog Analyzer is installed as a service. If you have installed it as an application and not as a
service, you can configure it as a service any time later. The procedure to configure as service, start and stop the
service is given below.
> sh configureAsService.sh -i
Configuration
How do I add devices to EventLog Analyzer so that it can start collecting event logs?
For Windows devices, enter the device name and the authentication details, and then add the device. For Unix
devices, enter the device name and the port number of the syslog service, and then add the device. (Ensure that
the syslog service is running, and that it is using the same port number specified here.)
How do I see session information of all users registered to log in to EventLog Analyzer?
The session information for each user can be accessed from the User Management link. Click the View link under
Login Details against each user to view the active session information and session history for that user.
Please follow the below steps to move an existing EventLog Analyzer server to a new machine/server.
2. Ensure that the process 'java.exe', 'postgres.exe' and 'SysEvtCol.exe' are not running/present in the task
manager, kill these processes manually if some of them are still running
4. Please download and install in the new machine/server the latest build of Eventlog Analyzer from the
following link: https://www.manageengine.com/products/eventlog/download.html
6. In the newly installed EventLog Analyzer machine/server, rename the folder pgsql located under <EventLog
Analyzer Home> as old_pgsql.
7. Copy the pgsql folder (including the files and sub-folders), which is located under <EventLog Analyzer
Home> , from the old machine/server to the newly installed Eventlog Analyzer machine/server.
Note: Kindly take extra care that the EventLog Analyzer is not running on both the systems while performing
this operation.
8. Start the EventLog Analyzer on the new machine and check whether the data and configurations are intact.
MSSQL database
2. Download and install the latest build of Eventlog Analyzer in the new server using the following link:
https://www.manageengine.com/products/eventlog/download.html
3. Once you install the application in the new machine, kindly make sure that you do not start the application or
shutdown the Eventlog Analyzer if started.
4. Please configure the MSSQL server credentials of the earlier Eventlog Analyzer server installation as
explained in the Configuring MSSQL Database topic.
5. Start the Eventlog Analyzer server/service on the new machine and check whether the data and the
configurations are intact.
6. In-case of any issues while performing the above steps, please do not continue any further and contact
[email protected] to assist you better.
2. Ensure that the process 'java.exe', 'mysqld-nt.exe' and 'SysEvtCol.exe' are not running/present in the task
manager, kill these processes manually if some of them are still running
3. As a precautionary measure, copy the following complete folders (including the files and sub-folders) to
another drive or to a mapped network drive. This will help us to restore to the settings and data in-case of any
issue with the new machine installation.
4. Please download and install in the new machine/server the latest build of Eventlog Analyzer from the
following link: https://www.manageengine.com/products/eventlog/download.html
6. In the newly installed EventLog Analyzer machine/server, rename the folder MySQL located under <EventLog
Analyzer Home> as OldMySQL.
7. Copy the MySQL folder (including the files and sub-folders), which is located under <EventLog Analyzer
Home> , from the old machine/server to the newly installed Eventlog Analyzer machine/server.
Note: Kindly take extra care that the EventLog Analyzer is not running on both the systems while performing
this operation.
8. Start the EventLog Analyzer on the new machine and check whether the data and configurations are intact.
The DB Storage Options box in the Settings tab lets you configure the number of days after which the database
will be purged. The default value is set at 32 days. This means that after 32 days, only the top values in each report
are stored in the database, and the rest are discarded.
Graphs are empty if no data is available. If you have started the server for the first time, wait for at least one minute
for graphs to be populated.
Reports can be generated in HTML, CSV, and PDF formats. All reports are generally viewed as HTML in the web
browser, and then exported to CSV or PDF format. However, reports that are scheduled to run automatically, or be
emailed automatically, are generated only as PDF files.
Can't find an answer here? Check out the EventLog Analyzer user forum
License
The License page displays the existing license details such as the type of license, the number of days to expire, and the
number of device(s), and/or application(s) currently monitored. There is a link to upgrade the EventLog Analyzer
license. You can enter the name of the new license file in the text box provided, or use the Browse button to select the
license file, and apply it using the Upgradebutton.
Support
Support page displays all the information regarding the support channels available to solve any of the product issues.
About
The About page displays the knowledge information, about the product, such as the build version, build number,
service pack applied if any, database used, build date, type, installation language, support and sales email IDs.
User Guide
The User guide (this document) displays contextual help information for the particular product screen selected.
Feedback
At any time, you can click the Feedback link in the bottom right, to send any issues or comments to the EventLog
Analyzer Technical Support team.
System requirements
For optimal performance, 10ms or lower latency is recommended, and it should not exceed 100ms.
50% of the server's RAM should be kept free for off-heap utilization of Elasticsearch for optimal performance.
Examples:
Note: Here, only one Elasticsearch will be in use and it can be located in Log360 Admin > Administrator > Search
Engine Management. By clicking on Details, we can see that it is running from
<ManageEngine>\elasticsearch\ES folder. (Refer to Figure 1)
Here are the steps to migrate data for EventLog Analyzer bundled with Log360:
1. Shutdown EventLog Analyzer and Log360.
2. Shutdown common ES.
Open Command Prompt as the Administrator in <ManageEngine>\elasticsearch\ES\bin
Run stopES.bat
3. Copy the data directory from <ManageEngine>\elasticsearch\ES\data to the new location.
4. Navigate to <ManageEngine>\elasticsearch\ES\config\elasticsearch.yml, and update path.data to include the
new data location. (Refer to Figure 2)
5. Update path.repo in <ManageEngine>\elasticsearch\ES\config\elasticsearch.yml to the new repository location
(parallel to the new data path).
6. Start the Log360 application along with its EventLog Analyzer module.
Here are the steps to migrate data for standalone EventLog Analyzer:
1. Shutdown EventLog Analyzer.
2. Copy the data directory from <ManageEngine>\EventLog Analyzer\ES\data to the new location.
3. Create a folder with the name archive (parallel to the new data directory).
4. Move the files from <ManageEngine>\<EventLog Analyzer>\ES\archive folder to the new folder named archive.
5. Navigate to <ManageEngine>\<EventLog Analyzer>\ES\config\elasticsearch.yml, and update path.data to
include the new data location. (Refer to Figure 2)
6. Update path.repo in <ManageEngine>\<EventLog Analyzer>\ES\config\elasticsearch.yml to the new repository
location (parallel to the new data path).
7. Start EventLog Analyzer.
Here are the steps to migrate data for EventLog Analyzer integrated with Log360:
1. Shutdown EventLog Analyzer and Log360.
2. Shutdown common ES.
Open Command Prompt as the Administrator in <ManageEngine>\elasticsearch\ES\bin
Run stopES.bat
There are two running Elasticsearch nodes for which we need to migrate data:
Note: The path here should be different from the one given for common ES.
1. Copy the data directory from <ManageEngine>\EventLog Analyzer\ES\data to the new location.
2. Navigate to <ManageEngine>\<Eventlog>\ES\config\elasticsearch.yml, update path.data to include the new
location. (Refer to Figure 2)
3. Update path.repo in <ManageEngine>\<Eventlog home>\ES\config\elasticsearch.yml to the same repository
location as that of common ES.
4. Create a folder with the name archive (parallel to the new data directory).
5. Move the files from <ManageEngine>\<Eventlog>\ES\data to the new location.
Local system
Service user account
account
Should have
sufficient
Local Should have sufficient read and write
read and
drives permissions.
write Sufficient disk space should be provided
permissions. according to the archives size already
present.Refer to the System requirements
1. The network path should be and Tuning Guide document for disk
accessible from the EventLog Analyzer space.Exact disk space for the archives to
Local system
machine using the service user be stored once migrated can be calculated
Network account
account.2. Should have sufficient read only with the log flow.
drives cannot be
and write permissions for that service
used.
user account.3. No interruption in
connectivity to the network share.
S3
Refer to the document for configuration and pre-requisites.
Bucket
System requirements
Remote storage \ S3 bucket < 2ms > 20Mbps Refer to the System Requirements
Note: The values mentioned above are approximate and can vary depending on the size and flow of the logs.
Note: This is applicable for EventLog Analyzer build greater than 12330.
To configure HTTPS using the HTTPS configuration tool, refer to the connection settings page.
What is SSL?
Acronym for Secure Socket Layer, SSL is an encryption technology to secure the data exchange between a website and
its visitor's web browser. Normally, when a user communicates with a website, say submits his credit card information,
the data travels to the server as plain text, which is susceptible to data theft!
On the other hand if this data is encrypted, then no eavesdropper can read it! Thus, it's really very important to secure a
website with SSL!
Certifying Authority:
Regulatory organizations, who, with the help of standard policies, issue certificates to a domain, declaring them
trustworthy. Every certificate they generate is unique to the company they are certifying, which makes identification
easy.
CAs secure all necessary information about a company before issuing a certificate for it and also keep updating it in
their records, which adds to the trustworthiness.
Some of the popular CAs are Verisign, Comodo & GoDaddy etc.
Keystore
Keystore is specifically designed to store various kinds of encryption information.
CSR
In order for a CA to generate an SSL certificate for a company, it first collects the information about the company and
other identifiers such as public key (digital signature), and then binds them all with its certificate (which could be a
piece of encrypted token or something similar). In doing so, it generates a unique identifier for the company.
Thus every certificate issuance process begins with a "certificate request" from the company. CAs refer to this process
as "Certificate Signing Request". The CAs accept the company information and digital signatures in a special form of
file - the ".csr" file.
Note:
This procedure to configure MS SQL will clear all existing data.
Before making changes to the database with the changeDBServer.bat file, it's crucial to ensure that the product is
fully operational. Once confirmed, proceed to shut down the product. Once the product has successfully stopped,
run the changeDBServer.bat file.
Here's how you can configure and run the EventLog Analyzer with MS SQL as the database.
1. From the installed MS SQL server, copy the files bcp.exe and bcp.rll to <Eventlog Analyzer Home>\bin folder.
MSSQL 2012
https://www.microsoft.com/en-us/download/confirmation.aspx?id=50402
MSSQL 2014
https://www.microsoft.com/en-us/download/details.aspx?id=36434
MSSQL 2016
https://www.microsoft.com/en-us/download/details.aspx?id=50420
MSSQL 2017
https://www.microsoft.com/en-us/download/details.aspx?id=53339
MSSQL 2019
MSSQL 2022
After installing the required Native client/ODBC Driver, you can check if you've got the right version of
bcp.exe+bcp.rll files or the right version of the Native client/ODBC Driver by going to <EventLog Analyzer
Home>\bin folder, opening the command prompt with admin rights and executing the following command:-
bcp.exe -v
If you get an error, either your bcp files are wrong or your Native Client/ODBC Driver version in the EventLog
Analyzer machine is incorrect.
2. Invoke the <EventLog Analyzer Home>\tools\changeDBServer.bat, to configure MS SQL server credentials like
Server Name, Port, User Name and Password.
3. The Database Setup Wizard will appear.
4. In the wizard screen, choose the Server Type as SQL Server. Enter the Host Name and the port of the SQL Server.
Select the instance from the available SQL Server Instances.
5. Tips:
Note: Ensure that both EventLog Analyzer server and MS SQL server are in the same domain and logged in
with the same domain administrator credentials.
Windows Authentication
To use SQL Windows Authentication, enter the Domain Name, Username, and Password.
Start-
S.
up Required Permission(s) for Login Comments
no.
Type
8. Click the Test Connection button to verify the correctness of the credentials. If the test fails, recheck and enter the
correct credentials.
9. Click the Configure DB button to save the SQL Server configuration. Note that configuring the settings of the SQL
Server database may take a few minutes.
10. The product will start automatically after the configuration is complete.
If you are already using the EventLog Analyzer with PGSQL or MySQL and you want to change the database to MS SQL,
please refer the Migrating EventLog Analyzer Data from PGSQL to MS SQL Database page or Migrating EventLog
Analyzer Data from MySQL to MS SQL Database page respectively and follow the procedure given there.
This procedure is applicable only if you are already using the EventLog Analyzer with PGSQL and you want to change the
database to MS SQL.
Note: Before making changes to the database with the changeDBServer.bat file, it's crucial to ensure that the
product is fully operational. Once confirmed, proceed to shut down the product. Once the product has
successfully stopped, run the changeDBServer.bat file.
Note:
Re-registering the Managed Server after the database has been changed:
When the Managed Server is installed, it is registered with Admin Server as Managed Server with PGSQL.
If the database of the Managed Server is changed from PGSQL to MS SQL, the database of the Admin
server also needs to be changed from PGSQL to MS SQL.
Then, the managed server has to be re-registered with the Admin Server with the help of <EventLog
Analyzer Home>/troubleshooting/registerWithAdminServer.bat file (or registerWithAdminServer.sh file)
After changing the database, when the Managed Server is started as a service. There will not be any prompt to re-
register. The user has to ensure that the Managed Server is re-registered with the Admin Server.
If the user is migrating a distributed setup, the user needs to migrate the entire distributed setup to MSSQL. All
Managed servers along with the admin server should be migrated to MSSQL.
If you want to configure MS SQL for a fresh installation of the EventLog Analyzer server, please refer to the Configuring
MS SQL Database page and follow the procedure given there.
The steps to migrate and run the EventLog Analyzer server with SQL SERVER as the database is given below:
1. Stop the EventLog Analyzer Server/Service.
2. Invoke the <EventLog Analyzer Home>/tools/backUpDatabase.bat in command prompt to backup the data
available in the PGSQL database and wait till the data backup is completed. By default, the backup file will be
stored under <EventLog Analyzer Home>/backup directory with the file name
'backup_eventlog_<Build_Number>_database_MM_DD_YY_hh_mm.data'.
3. From the installed MS SQL SERVER, copy the files bcp.exe and bcp.rll to <EventLog Analyzer Home>/bin folder.
MSSQL 2012
https://www.microsoft.com/en-us/download/confirmation.aspx?id=50402
MSSQL 2014
https://www.microsoft.com/en-us/download/details.aspx?id=36434
MSSQL 2016
https://www.microsoft.com/en-us/download/details.aspx?id=50420
MSSQL 2017
https://www.microsoft.com/en-us/download/details.aspx?id=53339
MSSQL 2019
MSSQL 2022
4. Invoke the <EventLog Analyzer Home>/tools/changeDBServer.bat in command prompt to configure the MS SQL
SERVER credentials like ServerName, Port, User Name and Password.
5. Database Setup Wizard pops-up.
6. In the wizard screen, select Server Type as SQL Server. Available SQL Server Instances are listed in a combo box.
Enter the Device Name and Port of the SQL Server from the instances.
7. Select the authentication type using the "Connect Using:" option.
8. The options are:
Windows Authentication
SQL Server Authentication
Note: Ensure that both EventLog Analyzer Server and MS SQL Server are in the same domain and logged in
with the same Domain Administrator credentials.
This procedure is applicable only if you are already using EventLog Analyzer with MySQL and you want to change the
database to MS SQL.
Note: Before making changes to the database with the changeDBServer.bat file, it's crucial to ensure that the
product is fully operational. Once confirmed, proceed to shut down the product. Once the product has
successfully stopped, run the changeDBServer.bat file.
Note:
Re-registering the Managed Server after the database has been changed:
When the Managed Server is installed, it is registered with Admin Server as Managed Server with MySQL.
If the database of the Managed Server is changed from MySQL to MS SQL, the database of the Admin
server also needs to be changed from MySQL to MS SQL.
Then, the managed server has to be re-registered with Admin Server with the help of <EventLog Analyzer
Home>/troubleshooting/registerWithAdminServer.bat file (or registerWithAdminServer.sh file)
After changing the database, when the Managed Server is started as a service, there will not be any prompt to re-
register. The user has to ensure that the Managed Server is re-registered with the Admin Server.
If the user is migrating a distributed setup, the user needs to migrate the entire distributed setup to MSSQL. All
Managed servers along with the admin server should be migrated to MSSQL.
If you want to configure MS SQL for a fresh installation of EventLog Analyzer server, please refer the Configuring MS SQL
Database page and follow the procedure given there.
The steps to migrate and run the EventLog Analyzer server with SQL SERVER as the database is given below:
1. Stop the EventLog Analyzer Server/Service.
2. From the installed MS SQL SERVER, copy the files bcp.exe and bcp.rll to <EventLog Analyzer Home>/bin folder.
MSSQL 2012
https://www.microsoft.com/en-us/download/confirmation.aspx?id=50402
MSSQL 2014
https://www.microsoft.com/en-us/download/details.aspx?id=36434
MSSQL 2016
https://www.microsoft.com/en-us/download/details.aspx?id=50420
MSSQL 2017
https://www.microsoft.com/en-us/download/details.aspx?id=53339
MSSQL 2019
MSSQL 2022
3. Invoke the <EventLog Analyzer Home>/tools/changeDBServer.bat in command prompt to configure the MS SQL
SERVER credentials like ServerName, Port, User Name and Password.
4. Database Setup Wizard pops-up.
5. In the wizard screen, select Server Type as SQL Server. Available SQL Server Instances are listed in a combo box.
Enter the Device Name and Port of the SQL Server from the instances.
6. Select the authentication type using the "Connect Using:" option.
7. The options are:
Windows Authentication
SQL Server Authentication
Note: Ensure that both EventLog Analyzer Server and MS SQL Server are in the same domain and logged in
with the same Domain Administrator credentials.
5. Copy the data file and the log file from the current location (<MSSQL Home>\DATA\eventlog.mdf and <MSSQL
Home>\DATA\eventlog_log.ldf) to the new location (<New location>\eventlog.mdf and <New
Location>\eventlog_log.ldf).
6. Re-attach the database and point to the new location by using the following commands:
Note: For a Linux service, Execute the commands given below to stop the Linux service (sample outputs are
given):
2. Ensure that the processes java.exe, postgres.exe, and SysEvtCol.exe are not running in the task manager.
Note: For Linux, Ensure that the processes java, postgres, and SysEvtCol are not running.
3. Copy the entire <EventLog Analyzer Home> directory to the new server. It is strongly recommended that the new
location is on the same path as the previous one.
1. If EventLog Analyzer is integrated with Log360, and only EventLog Analyzer is being moved, then integration with
Log360 needs to be removed first. You can integrate EventLog Analyzer with Log360 again after moving it to a
different server).
2. After EventLog Analyzer is moved, if new path is not the same as the previous path, path.data & path.repo in
<EventLog Analyzer Home>\ES\config\elasticsearch.yml needs to be updated accordingly.
4. Since the service has not been installed in the new server, we have to install it manually. Open the Command
Prompt with administrator privileges. Navigate to <EventLog Analyzer Home >\bin and execute the following
command to install the EventLog Analyzer service.
> service.bat -i
sh configureAsService.sh -i
5. The service will now be installed. Try starting the service and open EventLog Analyzer with your browser to log in.
6. EventLog Analyzer archive path has to be modified. Settings → Admin Settings → Manage Archives → Settings
→ Archive Location.
Previously archived files cannot be loaded. The migration is now complete.
3. Open the command prompt with administrator privileges. Navigate to <EventLog Analyzer Home>\bin and
execute initPgsql.bat to set the permissions for the database.
4. Since the service has not been installed in the new server, we have to install it manually. Open the Command
Prompt with administrator privileges. Navigate to <EventLog Analyzer Home >\bin and execute the following
command to install the EventLog Analyzer service.
> service.bat -i
sh configureAsService.sh -i
5. The service will now be installed. Try starting the service and open EventLog Analyzer with your browser to log in.
6. EventLog Analyzer archive path has to be modified. Settings → Admin Settings → Manage Archives → Settings
→ Archive Location.
Previously archived files cannot be loaded. The migration is now complete.
3. Since the service has not been installed in the new server, we have to install it manually. Open the Command
Prompt with administrator privileges. Navigate to <EventLog Analyzer Home >\bin and execute the following
command to install the EventLog Analyzer service.
> service.bat -i
sh configureAsService.sh -i
4. The service will now be installed. Try starting the service and open EventLog Analyzer with your browser to log in.
5. EventLog Analyzer archive path has to be modified. Settings → Admin Settings → Manage Archives → Settings
→ Archive Location.
Previously archived files cannot be loaded. The migration is now complete.
Note:
If you have enabled log forwarding from any Linux, Unix, router, switch, firewall, or syslog devices to
EventLog Analyzer, you would need to re-point them to the new server.
If an agent has been configured for any device, check if it has been modified appropriately.
Do not delete the previous installation until you ensure the migration is successful. Verify the migration by
checking the log collection after 30 minutes.
If you are using MS SQL server as your database and if it is running on a remote computer, download and install the SQL
Native Client/ODBC Driver that is appropriate for the SQL Server version in the new Event Log Analyzer machine.
Note: For a Linux service, Execute the commands given below to stop the Linux service (sample outputs are
given):
2. Ensure that the processes java.exe, postgres.exe, and SysEvtCol.exe are not running in the task manager.
Note: For Linux, Ensure that the processes java, postgres, and SysEvtCol are not running.
3. Copy the entire <EventLog Analyzer Home> directory to the new server. It is strongly recommended that the new
location is on the same path as the previous one.
1. If EventLog Analyzer is integrated with Log360, and only EventLog Analyzer is being moved, then integration with
Log360 needs to be removed first. You can integrate EventLog Analyzer with Log360 again after moving it to a
different directory.
2. After EventLog Analyzer is moved, if new path is not the same as the previous path, path.data & path.repo in
<EventLog Analyzer Home>\ES\config\elasticsearch.yml needs to be updated accordingly.
4. Since the service has not been installed in the new server, we have to install it manually. Open the Command
Prompt with administrator privileges. Navigate to <EventLog Analyzer Home >\bin and execute the following
command to install the EventLog Analyzer service.
> service.bat -i
sh configureAsService.sh -i
5. The service will now be installed. Try starting the service and open EventLog Analyzer with your browser to log in.
6. EventLog Analyzer archive path has to be modified. Settings → Admin Settings → Manage Archives → Settings
→ Archive Location.
3. Open the command prompt with administrator privileges. Navigate to <EventLog Analyzer Home>\bin and
execute initPgsql.bat to set the permissions for the database.
4. Since the service has not been installed in the new server, we have to install it manually. Open the Command
Prompt with administrator privileges. Navigate to <EventLog Analyzer Home >\bin and execute the following
command to install the EventLog Analyzer service.
> service.bat -i
sh configureAsService.sh -i
5. The service will now be installed. Try starting the service and open EventLog Analyzer with your browser to log in.
6. EventLog Analyzer archive path has to be modified. Settings → Admin Settings → Manage Archives → Settings
→ Archive Location.
Previously archived files cannot be loaded. The migration is now complete.
3. Since the service has not been installed in the new server, we have to install it manually. Open the Command
Prompt with administrator privileges. Navigate to <EventLog Analyzer Home >\bin and execute the following
command to install the EventLog Analyzer service.
> service.bat -i
sh configureAsService.sh -i
4. The service will now be installed. Try starting the service and open EventLog Analyzer with your browser to log in.
5. EventLog Analyzer archive path has to be modified. Settings → Admin Settings → Manage Archives → Settings
→ Archive Location.
Previously archived files cannot be loaded. The migration is now complete.
Note:
If you have enabled log forwarding from any Linux, Unix, router, switch, firewall, or syslog devices to
EventLog Analyzer, you would need to re-point them to the new server.
If an agent has been configured for any device, check if it has been modified appropriately.
Do not delete the previous installation until you ensure the migration is successful. Verify the migration by
checking the log collection after 30 minutes.
If you are using MS SQL server as your database and if it is running on a remote computer, download and install the SQL
Native Client/ODBC Driver that is appropriate for the SQL Server version in the new Event Log Analyzer machine.
Steps for applying/changing the IP & Port details on the agent registry
1. If you are installing the agent for the first time, please follow the steps given here.
2. Kindly follow the steps given below to update the IP/Port details in the registry if you have already installed or are
running the EventLog Analyzer agent.
EventLog Analyzer monitors the data folder(s) of ElasticSearch for free disk space and will automatically stop indexing if
the drive where ES's data is stored has only 5GB of disk space left. When indexing is stopped, all the new processed
data will be stored in <EventlogAnalyzer>\ES\CachedRecord folder. These cached logs will automatically be processed
when the indexing restarts.
If any of the nodes are full, a mail will be sent with Disk full on search nodes as the subject line.
Once in 6 hours, a mail will be sent with the list of all the nodes that are still full.
If the indexing stops, the user will receive a mail with Indexing stopped in EventLog Analyzer as the subject
line. The user will also receive a notification on the EventLog Analyzer dashboard.
1. Indexing will not start until the disk space is increased on the data drive of ES. EventLog Analyzer will automatically
attempt to carry out the indexing process every 10 minutes. You can quickstart the process with the Restart
Indexer option.
5. A list of all the full search nodes will be displayed under the bell notification icon present in the EventLog Analyzer
console.
List of enabled TLS protocols, supported protocols with current JVM are
TLSv1.1, TLSv1.2
searchguard.ssl.transport.enabled_ciphers
List of enabled TLS cipher suites, supported ciphers with current JVM (1.8.0_282) are
We can add one of the following entries at the bottom of the elasticsearch.yml file
searchguard.ssl.transport.enabled_protocols: ["TLSv1.2"]
searchguard.ssl.transport.enabled_ciphers: ["TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"]
or
searchguard.ssl.transport.enabled_protocols:
- TLSv1.2
searchguard.ssl.transport.enabled_ciphers:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
or
Appendix:
Forward DNS lookup and reverse DNS lookup are two types of queries used in the Domain Name System (DNS) to
resolve domain names to IP addresses and vice versa.
1. DNS Forward Lookup - Translation of Domain Names to IP Addresses:
Translates human-readable domain names (e.g., www.domain.org ) into machine-readable IP addresses (e.g.,
192.0.2.1) that computers use to locate resources on the internet.
2. DNS Reverse Lookup - Translation of IP Addresses to Domain Names:
Translates IP addresses(e.g., 192.0.2.1) back into domain names(e.g., www.domain.org ), allowing users to
identify the domain associated with a particular IP address.
DNS Cache(Stored Locally) - Temporary Storage of DNS Records:
DNS cache temporarily stores recently resolved domain name-to-IP address mappings, reducing the time required to
resolve frequently accessed domain names by caching the results of previous lookups and DNS caches are stored
locally, to clear DNS caches we can use the command ipconfig /flushdns
Note: To install the distributed edition of EventLog Analyzer, you need to install the standard edition across your
organization's network and then convert the installations into an admin or a managed server. You can refer to the
steps given here.
If both the admin and managed servers are not in the same build, it can lead to sync issues.
One admin server is designed to manage up to 50 managed servers.
When the number of devices and applications managed by all the managed servers exceeds the number of licenses
purchased, a warning message appears in the admin server. To resolve this warning, you can:
Note: You need to back up the data of the standard edition to prevent data loss.
Converting the standard edition of EventLog Analyzer into an admin server will result in the deletion of data present in
the standard edition. You can follow the steps given below to convert the standard edition of EventLog Analyzer into an
admin server:
If your managed server is unable to reach the admin server, please ensure the following:
The admin server to which you want to link the new managed server is accessible on the given port using the
mentioned protocol.
If the admin server is using a proxy server, check whether the provided proxy server details are correct.
The Manage Server Settings offers the following information and options:
The total number of devices associated with the Managed Server, including disabled ones.
Last synced time, adjusted based on the specified time zone.
Display name with a hyperlink reference to the Managed Server.
Sync Now: Initiates a restart of data collection, syncing the managed server immediately.
Auto-upgrade managed server: Enables automatic upgrades for the managed server.
Upgrade now: When the Auto upgrade option is disabled, Individual upgrade for the managed server.
Note:
When the Managed Server protocol is changed, ensure corresponding changes in the Manage Server
Settings of the Admin Server.
You may use different Techincian credentials with admin privileges.
Sync now
The Sync now option initiates data collection, causing the data in the managed server to synchronize immediately with
the admin server and update the status.
Success Status:
In-Process Status:
Delete action is triggered. Please refresh after some time - Deleting request call sent to the managed server.
Requested action triggered. Please refresh after some time - Data request sent to the managed server.
Warning Status:
Failed Status:
Auto-Upgrade
When the " Auto-Upgrade Managed servers " toggle is enabled, the admin server will automatically upgrade the
managed servers once the PPM is applied to the admin server.
Continue without backup: Choosing this option will skip backup and proceed with the upgrade (not recommended).
Please make sure to take a backup of the managed server and upgrade.
Note: EventLog Analyzer does not support auto backup for MySQL database. We suggest taking a backup
manually before the upgrade.
Other possible reasons for upgrade failure include runtime errors, such as failure to compress the files, and read and
write errors.
There are two ways to achieve this: Case - I) Auto upgrading all managed servers through the Admin Server, and Case -
II) Manually upgrading managed servers.
Case - I: Auto upgrading all managed servers through the Admin Server
When the Admin server is upgraded through a service pack, all its managed servers will be automatically upgraded by
default.
Here are the steps for auto upgrading the managed servers:
In the event of a backup failure, due to insufficient storage or other reasons, users can choose to skip the backup
provided they have manually taken the backup of the managed servers as mentioned in Step B .
After ensuring that admin server is up and running, start all the managed servers one by one.
If your organization has multiple network devices, servers, applications, and databases spread across
geographical locations, using the distributed edition of EventLog Analyzer will help you unify all your logs and
gain actionable insights from a single console. The distributed edition is also useful for Managed Security Service
Providers (MSSPs).
The distributed setup of EventLog Analyzer consists of one admin server and one or more managed servers. The
managed servers can be installed at different geographical locations and must be connected to the admin
server. The admin server centralizes log management across all the managed servers. You can view and manage
all the managed servers from the admin server console.
Can I convert the existing standalone edition of EventLog Analyzer to the distributed edition?
Yes, you can. You need to install a new admin server and convert the existing installation to Managed Server.
Please refer to the steps given here. Ensure that the build number of your existing EventLog Analyzer installation is
6000 or above.
While converting the standard edition to an admin server, I'm prompted to specify the proxy server
details. Why should I configure it?
Configuring the proxy server is optional. You need to configure the proxy server details during admin server
conversion for the admin server needs to pass through a proxy server to contact the managed servers.
To add a managed server under the admin server again, follow the steps given below:
1. Register the managed server with the admin server by executing the registerWithAdminServer.bat/sh file
located in <EventLog Analyzer Home>/troubleshooting.
2. Restart the managed server.
Where are the collected logs stored? Is it in the managed server database or in both the managed server
and admin server databases?
The logs collected by the managed server are stored only in the managed server database. You can't store the
logs in the admin server. However, you can forward the logs to the admin server to archive them.
By default, the managed and admin server communicate using the HTTP. There is also an option to convert the
mode of communication to HTTPS. To modify the mode of communication, you can refer to the steps given here.
I have changed the managed server communication mode to HTTPS after installation. How to update
this change in the admin server?
In the Admin Server, click on Settings tab > Configurations> Managed Server Settings> Edit icon of specific
managed server. Select the required protocol to configure the web server port details.
EventLog Analyzer's Distributed Edition license will be applied to the admin server. The number of devices and
applications for which the license has been purchased can be utilized among the registered managed servers.
You can keep adding the devices and applications in various managed servers till the total number of licenses
purchased gets exhausted. You can view the number of devices and applications managed by each managed
server in the Managed Server Settings page.
If the number of devices and applications managed by all the managed servers exceeds the number of licenses
purchased, a warning message appears in the admin server. To resolve this warning, you can:
There is no option to apply the license in the managed servers. The license must be applied to the admin server
and it will be automatically propagated to all the managed servers.
Why do I encounter the "License Restricted" alert even after reconfiguring the managed servers?
The status of devices in the managed server synchronize with the admin server during the data collection cycle,
which happens at an interval of 5 minutes. Try to add other devices and applications in the managed server after
a few minutes.
The steps followed by EventLog Analyzer for log archival in the distributed set up are given below:
1. Logs are zipped at periodic intervals and the file to be archived is transported to the admin server using Secured
Shell (SSH).
2. The file will be received by the admin server and a confirmation message for the receipt of the file is sent by the
admin server to the respective managed server.
3. Managed server, upon receiving the confirmation message, deletes the archive file.
Setting Description
Configure the admin server's centralized archive location in this field. The location is set
Archive Location to <EventLog Analyzer Admin Server Home>/archive/<Individual Managed Server's
CollectorID>/ by default.
Configure the IP address of the server on which the SSH is running. It will be admin
Server IP/Name
server by default.
The default SSH port will be 22. You can configure any other port from 1024 to 65535.
Port You can click on the Availability link to check whether the port is free or occupied by
some other application.
Troubleshooting tips:
If the Centralized Archive is enabled, the SSH server will start with the configured values. If the SSH server fails to start,
the Centralized Archive Settings in EventLog Analyzer will display a Failed status.
If the SSH server is not getting started, it could be due to the following reasons:
The SSH server is not able to bind with the configured IP address. This is more likely to happen with a dual NIC
machine. Check and configure the IP address of the correct NIC.
The archive location configured could be invalid. Configure a valid location to archive the files.
From release 12040, EventLog Analyzer uses Elasticsearch version 5.6.4 to store all data. But soon this will be upgraded
to ES version 6.5.4. ES has backward compatibility but only by one version; so all EventLog Analyzer installations pre
Build 12040 need to be upgraded as they use ES version 2. This has raised a need to upgrade, or rather reindex, all
older versions.
Reindexing is the process of extracting data from the source index and feeding it into the destination index. Since ES 2
index is not compatible with ES 6.5.4, we are reindexing source index created in ES 2 (for versions before 12040) to
destination index ES 5.6.4, so that it is compatible with ES 6.5.4.
Note: All EventLog Analyzer installations post version 12040 needn't be reindexed as they already have the upgraded
version.
Prerequisites
At least 20GB of disk space or a minimum of [1x largest index size] or [3x largest archive size] and 5 GB on the
Elasticsearch node. Reindexing will fail if the disk space is lesser than the specs mentioned above and you will
receive a notification as mentioned here.
Automatic Reindexing
The Reindexing process will automatically be triggered based on non working hours. This will be will be
identified by EventLog Analyzer from Working Hour Setting set previously by the user.
User can force Reindexing by clicking on the Start Now link in the following notification. By doing this, the
Reindexing process will begin immediately.
Upgrade Status
COMPLETED
The COMPLETED indices count will be shown in the notifications tab as shown in the image below. Here, 64/66
indicates COMPLETED COUNT/TOTAL COUNT, which means a total of 64 indices out of 66 has been
successfully updated.
The index upgrade sometimes fails, and these indices will be shown as FAILED indices in the notifications tab.
These indices will automatically be updated after the current upgrading queue is completed. If not, it can also
be triggered manually by clicking on the Take Action notification as shown in the image below.
Sometimes, the failure can also be due to space constraints. If so, the following notification will pop up.
In case none of this works for you and you are concerned about data loss, reach out to EventLog Analyzer team at
[email protected].
Still finding trouble? Get in touch with our technical support team:
Send an email to [email protected]
Call toll free telephone number (+1 844 649 7766)
Ask for a meeting (Zoho Meeting) – web conference
3. To automatically create a SIF file, click on Auto and select Create Support Information File.
4. You will find a new link Created File which contains the SIF.
5. Clicking on this link allows you to either directly upload the SIF to ManageEngine's file upload server after providing
the required details or download the SIF by clicking on the Download link and sending it to eventlog-
[email protected]
Procedure to create SIF when the EventLog Analyzer server or web client
is not working (for Build 8000 or earlier)
If you are unable to create a SIF from the EventLog Analyzer UI, you can zip the files under 'log' folder, which is located in
<EventLog Analyzer Home>server/default/log (default path) and upload the ZIP file using the following link:
https://bonitas2.zohocorp.com/#[email protected]
To go to the Support page, click the Support tab on the menu bar. The different channels through which you can reach
out to us will be listed here. You can also click on the links below to reach our support team.
Click this link or click 'Mail Us' in the Support Page of EventLog Analyzer. Fill
Technical
Mail Us in the required fields with a detailed description of the problem that you
Assistance
encountered. Click on Submit.
EventLog Click this link or click 'Training & Certification' in the Support Page of
Technical
Analyzer EventLog Analyzer to take up a course and equip yourself with the
Assistance
Training knowledge required to work with EventLog Analyzer.
Online Store - Click this link or click 'Get Quote' under Online Store in the Support Page of
Get a Price Price Quote EventLog Analyzer to get a personalized quote that best suits your
Quote requirements.
New feature Feature If you'd like to see new features in the upcoming releases of EventLog
requests requests Analyzer, click this link to give us your suggestions.
Click this link or click 'How-Tos' under Watch Video in the support
Configuration page of EventLog Analyzer.
How-To-Videos
videos Under the 'How to' section, there are videos on configuring EventLog
Analyzer for different use cases.
Click this link or click 'How-Tos' under Watch Video in the support
page of EventLog Analyzer.
Feature videos Feature-Videos
Under the 'Features' section, there are videos on different features of
EventLog Analyzer.
Click this link or click 'Documents' under Knowledge Base in the Support
Knowledge
Documents Page of the EventLog Analyzer solution to understand how to deploy,
Base
configure, and generate reports using EventLog Analyzer.
Knowledge Click this link or click 'FAQ' under Knowledge Base in the support page of
FAQ
Base FAQ EventLog Analyzer to view answers to frequently asked questions.
Click this link or click 'Case Studies' under Knowledge Base in the
Knowledge support page of EventLog Analyzer.
Base Case Case Studies
Studies This page has case studies on how EventLog Analyzer has helped
customers fulfill their requirements under different circumstances.
Contact Us:
Toll Free Number:
Request a Click this link or click 'Personalized Demo' in the Support Page of
personalized Schedule Demo EventLog Analyzer to schedule a personalized demo.
Demo
Note: Personalized demos are available only during the free trial period.
Click the 'Events' Tab in the support page of EventLog Analyzer to sign up for
Free Online upcoming webinars, seminars and workshops. You can also watch videos
Training of completed webinars, seminars and workshops under 'Completed Events'
in the Events Tab.
Click this link or click 'View All' under 'Recent Forum Posts' in the Support
EventLog
Page of EventLog Analyzer. In this forum you can post your queries, interact
User Forums Analyzer User
with other EventLog Analyzer users and also get answers from out support
forums
team.
EventLog Click this link or click 'View All' under 'Announcements' in the support
Announcements Analyzer page of the EventLog Analyzer solution to go to the EventLog Analyzer user
Announcements forum announcements page for the latest announcements and updates.