Support
 
Support Get Quote
 
 
 
 

Importing log files

Importing log files in EventLog Analyzer

Real-time log analysis helps administrators collect usage and performance statistics as well as identify threat patterns, anomalous behaviors, and vulnerabilities in their network. However, past log data can help uncover even more vital information using forensic analysis. EventLog Analyzer comes with advanced import functionalities that allow users to easily analyze saved syslog and event log files.

Advanced import options

With EventLog Analyzer, it's easy to import multiple files at once. Users can select multiple log files and import them in a single import configuration. When needed, they can also select all files from any folder using the "Select Folder Option" from the file browser. The "Quick Import" option lets users quickly import files without having to mention the log type, as it’ll be automatically identified by EventLog Analyzer. If the log type is not automatically identified, a new format is created and the default parser rules are applied to the imported files.

Multiple supported protocols

Users can import log files to the EventLog Analyzer server from their local host machine or any remote machine as well. EventLog Analyzer allows users to import log files using several protocols such as FTP, SFTP, SCP, SMB, HTTP, HTTPS, FILE, and UNC paths. Users can also import log files that are stored online by providing a URL.

Advanced scheduling options

EventLog Analyzer goes one step ahead and provides options to automate log importing. With advanced scheduling, users can pick any date, month, and time of the day—including the millisecond—and build a profile to periodically import files. This completely automates the log import process, saving users from having to do this mundane task.

Dynamic filename patterns

While creating profiles to import logs, users can enter the filename pattern manually or select it from a list of predefined patterns. EventLog Analyzer also features dynamic filename patterning, so users can create custom patterns if they come across unique log filenames. Filename patterns can contain numbers and dates, including the day, hour, minute, or even millisecond.

Real-time progress

User can use the progress bar to track the log import process. With the advanced summary report page, users can view a quick synopsis of which logs have been imported and the time of creation as well.

Have tons of log files sitting around? Analyze them right away.

Get Your Free Trial

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management