- Free Edition
- What's New?
- Key Highlights
- Suggested Reading
- All Capabilities
-
Log Management
- Event Log Management
- Syslog Management
- Log Collection
- Agent-less Log Collection
- Agent Based Log collection
- Windows Log Analysis
- Event Log Auditing
- Remote Log Management
- Cloud Log Management
- Security Log Management
- Server Log Management
- Linux Auditing and Reporting
- Auditing Syslog Devices
- Windows Registry Auditing
- Privileged User Activity Auditing
-
Application Log Management
- Application Log Monitoring
- Web Server Auditing
- Database Activity Monitoring
- Database Auditing
- IIS Log Analyzer
- Apache Log Analyzer
- SQL Database Auditing
- VMware Log Analyzer
- Hyper V Event Log Auditing
- MySQL Log Analyzer
- DHCP Server Auditing
- Oracle Database Auditing
- SQL Database Auditing
- IIS FTP Log Analyzer
- IIS Web Log Analyzer
- IIS Viewer
- IIS Log Parser
- Apache Log Viewer
- Apache Log Parser
- Oracle Database Auditing
-
IT Compliance Auditing
- ISO 27001 Compliance
- HIPAA Compliance
- PCI DSS Compliance
- SOX Compliance
- GDPR Compliance
- FISMA Compliance Audit
- GLBA Compliance Audit
- CCPA Compliance Audit
- Cyber Essentials Compliance Audit
- GPG Compliance Audit
- ISLP Compliance Audit
- FERPA Compliance Audit
- NERC Compliance Audit Reports
- PDPA Compliance Audit reports
- CMMC Compliance Audit
- Reports for New Regulatory Compliance
- Customizing Compliance Reports
-
Security Monitoring
- Threat Intelligence
- STIX/TAXII Feed Processor
- Threat Whitelisting
- Real-Time Event Correlation
- Log Forensics
- Incident Management System
- Automated Incident Response
- Linux File Integrity Monitoring
- Detecting Threats in Windows
- External Threat Mitigation
- Malwarebytes Threat Reports
- FireEye Threat Intelligence
- Application Log Management
- Security Information and Event Management (SIEM)
- Real-Time Event Alerts
- Privileged User Activity Auditing
-
Network Device Monitoring
- Network Device Monitoring
- Router Log Auditing
- Switch Log Monitoring
- Firewall Log Analyzer
- Cisco Logs Analyzer
- VPN Log Analyzer
- IDS/IPS Log Monitoring
- Solaris Device Auditing
- Monitoring User Activity in Routers
- Monitoring Router Traffic
- Arista Switch Log Monitoring
- Firewall Traffic Monitoring
- Windows Firewall Auditing
- SonicWall Log Analyzer
- H3C Firewall Auditing
- Barracuda Device Auditing
- Palo Alto Networks Firewall Auditing
- Juniper Device Auditing
- Fortinet Device Auditing
- pfSense Firewall Log Analyzer
- NetScreen Log Analysis
- WatchGuard Traffic Monitoring
- Check Point Device Auditing
- Sophos Log Monitoring
- Huawei Device Monitoring
- HP Log Analysis
- F5 Logs Monitoring
- Fortinet Log Analyzer
- Endpoint Log Management
- System and User Monitoring Reports
-
Log Management
- Product Resources
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
By auditing Solaris devices, you can get a record of security-related system events, which can be used to assign technicians the responsibility of looking into potentially problematic actions that take place on Solaris devices.
This audit data can also help you:
- Detect misuse or unauthorized activity.
- Review patterns of access and the access histories of users and objects.
- Identify attempts to sidestep protection mechanisms.
Solaris auditing reports in EventLog Analyzer
EventLog Analyzer is a log management tool which collects and analyzes logs generated by Solaris devices to detect potential security threats and report on activities.
Solaris logon and logoff reports: Track all logons and logoffs, including individual methods for logging on such as su command, Secure Shell, and File Transfer Protocol (FTP) logons.
Solaris failed logon reports: View a list of all failed logons, and identify users with multiple consecutive authentication failures as well as remote devices generating the highest number of failed logon attempts.
Solaris user account management: Discover all user accounts and groups that have been added, removed, or renamed. Also, identify failed password changes and newly added users.
Solaris removable disk auditing: Audit the use of removable devices on your Solaris devices, and get information each time a removable device is plugged into or taken out of the device.
Sudo commands: View details of all successful and failed sudo command executions, and identify the most frequently attempted sudo commands.
Solaris mail server reports
Mail server reports offer the following insights:
- An overview of the email server usage pattern and trends associated with sent and received emails.
- The users and remote devices sending and receiving the most email.
- The domains that send, receive, or reject the most email.
- Errors such as unavailable mailboxes, insufficient storage, bad sequences of commands, and more.
- Errors that occur most frequently.
Solaris errors and threats: Discover potential security concerns so you can proactively respond to them.
Solaris Network File System (NFS) events: Obtain details for all successful and denied NFS mounts, and identify the users and remote devices with the highest number of denied NFS mounts.
Solaris FTP Server reports: Obtain details for all file downloads and uploads. View details for timeouts that occur during logons, data transfers, idle sessions, and connections. Identify users and remote devices that perform the highest number of FTP operations.
Solaris system events: Track important system events such as the stopping or restarting of syslog services, low disk space, and executions of the yum command.
Solaris severity reports: View events logged at each severity level.
Solaris critical reports: View critical events based on the event and device responsible for report generation.
Reports on other Solaris events:
- Obtain details on all cron jobs.
- Identify services that have been deactivated.
- View details of sessions that have been connected and disconnected.
- Stay aware of any timeouts during the logging process.
- Track mismatched errors in device names or addresses.