Support
 
Support Get Quote
 
 
 
 

Read Me

Table of Contents

  1. About EventLog Analyzer
  2. Release Overview

    1. 12.5.2 (GA)
    2. 12.5.0 (GA)
    3. 12.4.7 (GA)
    4. 12.4.6 (GA)
    5. 12.4.3 (GA)
    6. 12.4.2 (GA)
    7. 12.4.1 (GA)
    8. 12.4.0 (GA)
    9. 12.3.3 (GA)
    10. 12.3.2 (GA)
    11. 12.3.0 (GA)
    12. 12.2.9 (GA)
    13. 12.2.8 (GA)
    14. 12.2.7 (GA)
    15. 12.2.6 (GA)
    16. 12.2.5 (GA)
    17. 12.2.4 (GA)
    18. 12.2.3 (GA)
    19. 12.2.2 (GA)
    20. 12.2.1 (GA)
    21. 12.2.0 (GA)
    22. 12.1.6 (GA)
    23. 12.1.5 (GA)
    24. 12.1.4 (GA)
    25. 12.1.3 (GA)
    26. 12.1.2 (GA)
    27. 12.1.1 (GA)
    28. 12.1.0 Build 12100
    29. 12.0.6 Build 12060
    30. 12.0.5 Build 12050
    31. 12.0.4 (GA)
    32. 12.0.3 Build 12030
    33. 12.0.2 Build 12020
    34. 12.0.1 (GA)
    35. 12.0.0 Build 12000 (GA)
    36. 11.21 (GA)
    37. 11.20 (GA)
    38. 11.14 Build 11140 (GA)
    39. 11.13 (GA)
    40. 11.12 (GA)
    41. 11.11 Build 11110 (GA)
    42. 11.10 (GA)
    43. 11.9 Build 11090 (GA)
    44. 11.8 - Build 11080 (GA)
    45. 11.7 (GA)
    46. 11.6 (GA)
    47. 11.5 (GA)
    48. 11.4 (GA)
    49. 11.3 - Build 11030 (GA)
    50. 11.2 (GA)
    51. 11.1 (GA)
    52. 11.0 (GA)
    53. 10.8 - Build 10080 / Service Pack Build 10081 (GA)
    54. 10.7 (GA)
    55. 10.6 - Build 10060 (GA)
    56. 10.0 - Build 10000 (GA)
    57. 9.0 - Build 9000 (GA)
    58. 8.6 - Build 8060 (GA)
    59. 8.5 - Build 8050 (GA)
    60. 8.2 - Build 8020 (GA)
    61. 7.2 - Build 7020 (GA)
    62. 7.0 - Build 7000 (GA)
    63. 6.2 - Build 6020 (GA)
    64. 6.1 - Build 6010 (GA)
    65. 6.0 - Build 6002 (GA)
    66. 6.0 - Build 6000 (GA)
  3. System Requirements

    The minimum system requirements for installing and working with EventLog Analyzer are given below.

    1. Hardware Requirements
    2. Software Requirements
  4. Installation

    This section explains the key steps for installing the new EventLog Analyzer program. Refer to the User Guide for detailed EventLog Analyzer installation information.

    1. How to install?
    2. How to uninstall?
  5. Starting and Shutting Down

    Once you have successfully installed EventLog Analyzer, start the EventLog Analyzer server by following the steps below.

    1. How to start EventLog Analyzer Server/Service
    2. How to shut down EventLog Analyzer Server/Service
    3. How to restart EventLog Analyzer Server/Service
  6. Known Issues and Limitations
  7. Document Set
  8. Contact Information
  9. About ZOHO Corp.
  10. License Agreement

Top 5 critical alerts banner

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management