Log management

The deployment of a log management architecture generally starts with defining the requirement and goals. Needs can be security log analysis, custom application problem analysis or reporting for the purposes of regulatory compliance. LOGalyze 4 was designed to fulfill main log management requirements including:

  • The ability to collect any type of log data from any source with or without installing an agent on the source device
  • Normalize the log data for more effective reporting and analysis
  • Search across all collected data, from supported and custom applications
  • Provide out-of-the-box reporting

Supported log sources

  • Windows System, Security, Application event logs
  • Firewall logs
  • Linux standard events
  • OS Audit Subsystem logs (Linux Audit Subsystem, AIX audit log, Solaris audit log)
  • Network devices (Cisco, Juniper, etc.)
  • Oracle audit trail
  • System software logs (Apache, Postfix, Sendmail, Squid, etc.)
  • Ability to parse custom business and homegrown application logs

Compliance and Security

LOGalyze provides an internal audit trail that allows organizations to prove that logs are being reviewed. User actions and configuration changes are logged. These internal synthetic events and audit logs can be analyzed and reported.

LOGalyze on Twitter