- Free Edition
- What's New?
- Quick Links
- Log Management
- Application Log Management
- Application log monitoring
- IIS log analyzer
- IIS web log analyzer
- IIS FTP log analyzer
- IIS log parser
- VMware log analyzer
- Hyper V event log auditing
- SQL database auditing
- SQL server auditing
- MySQL log analyzer
- Apache log analyzer
- DHCP server auditing
- Database activity monitoring
- Database auditing
- Oracle database auditing More..
- IT Compliance Auditing
- IT Compliance Auditing
- SOX Compliance Audit
- GDPR Compliance Audit
- ISO 27001 Compliance Audit
- HIPAA Compliance Audit
- PCI Compliance Audit
- FISMA Compliance Audit
- GLBA Compliance Audit
- GPG Compliance Audit
- ISLP Compliance Audit
- FERPA Compliance Audit
- CCPA Compliance Reports
- CCPA Compliance Software
- NERC Compliance Audit Reports
- Cyber Essentials Compliance Reports
- Reports for New Regulatory Compliance
- Customizing Compliance Reports
- PDPA compliance audit reports
- CMMC Compliance Audit More..
- SIEM
- Security Information and Event Management (SIEM)
- Threat Intelligence
- STIX/TAXII feed processor
- Server Log Management
- Event Log Monitoring
- File Integrity Monitoring
- Linux File Integrity Monitoring
- Threat Whitelisting
- Advanced Threat Analytics
- Security Log Management
- Log Forensics
- Incident Management System
- Application log management
- Real-Time Event Correlation
- Detecting Threats in Windows
- External Threat Mitigation
- Malwarebytes Threat Reports
- FireEye Threat Intelligence
- Linux Log Analyzer More..
- Network Device Monitoring
- Network Device Monitoring
- Router Log Auditing
- Cisco Logs Analyzer
- VPN log analyzer
- IDS/IPS log monitoring
- Solaris Device Auditing
- Monitoring user activity in routers
- Monitoring Router Traffic
- Switch Log Monitoring
- Arista Switch Log Monitoring
- Firewall Log Analyzer
- Firewall Traffic Monitoring
- Windows Firewall Auditing
- SonicWall Log Analyzer
- H3C Firewall Auditing
- Barracuda Device Auditing
- Palo Alto Networks Firewall Auditing
- Juniper Device Auditing
- Fortinet Device Auditing
- pfSense Firewall Log Analyzer
- NetScreen Log Analysis
- WatchGuard Traffic Monitoring
- Check Point Device Auditing
- Sophos Log Monitoring
- Huawei Device Monitoring
- HP Log Analysis
- F5 Logs Monitoring
- Fortinet log analyzer More..
- Endpoint Log Management
- System and User Monitoring Reports
- More Features
- Resources
- Product Info
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
NetScreen's firewall generates terabytes of logs that can be used to audit, manage, and secure your network, but first you have to collect, analyze, correlate, search though, report on, and archive them. Doing all of this manually would be a superhuman task, but luckily EventLog Analyzer acts as a NetScreen firewall log analyzer and provides end-to-end log management for NetScreen devices. EventLog Analyzer supports NetScreen devices with both agent and agentless log collection, custom log parsing, complete log analysis with reports and alerts, a powerful log search engine, and flexible log archiving options. Read more
EventLog Analyzer has extensive out-of-box reports exclusively for NetScreen devices, including:
Allowed Traffic reports: These reports contain detailed information on all the connections that pass through the NetScreen firewall into your network. These reports also identify traffic patterns and trends, helping you monitor and compare authorized traffic versus non-authorized traffic flowing across the network boundary.
Denied Traffic Connections reports: Similar to Allowed Traffic reports, these reports detail all the connections that are denied access to your network and provide NetScreen traffic patterns and trends as well. This information helps you monitor suspicious network traffic that crosses the network boundary.
Firewall User Logon reports: These reports list all the successful logons to the NetScreen firewall as well as the hosts and users with the most logons. There is also a report for identifying logon trends, helping you monitor user access to the system and track down privilege abuse.
Failed Logons reports: Similar to logon reports mentioned above, these reports list all the unsuccessful logons to the firewall. These reports detail the hosts and users with the most failed logons and identify failed logon trends, helping you identify suspicious activity occurring across internal network boundaries.
Firewall Account Management reports: These reports list all the changes made to admin accounts. The three categories of these reports—Admin Added, Admin Deleted, and Admin Modified—help you monitor admin activity and prevent possible privilege abuse.
Firewall Policy Management reports: These reports give a comprehensive list of all changes made to policies. This comprehensive list helps you identify suspicious activity occurring across internal network boundaries from either internal or external agents.
Firewall Intrusion Detection System reports: These reports list potential and past attacks, and identify the source and destination devices most frequently involved in attack attempts. This information helps you form a comprehensive analysis of all the NetScreen security breaches and vulnerabilities that happen within your network.
Firewall Security reports: These reports help you track changes made to firewall rules, and there are specific reports that detail your network policies, anti-spam, anti-virus, and web filters.
System Event reports: These reports identify your system's battery status, power supply, fan status, license status, and system temperature, helping you monitor and maintain most of the physical and electrical functionalities of your system.
You can also generate custom reports based on NetScreen log messages, unique identifiers, NetScreen VPN logs, and other information. Read more about NetScreen firewall-based traffic reports.
Why should you choose EventLog Analyzer for auditing NetScreen firewall logs?
- A user-friendly interface with an intuitive dashboard.
- Easily customizable report templates to meet internal policy needs.
- Custom compliance reports to fulfill growing compliance standards.
- Real-time email and SMS alerts on NetScreen configuration changes and events of interest.
- Secure, tamper-free log archiving.
- Powerful log forensics that enable robust searches, with many flexible options.
EventLog Analyzer lets you create device groups to collect and report on logs from NetScreen devices. This is useful when tracking event behavior and system performance for a select group of critical servers. Create different user profiles for accessing event logs and generating reports: Admin users have access to all features, while Guest users can only generate reports and retrieve archived event logs.