www.manageengine.com
Open in
urlscan Pro
185.20.209.211
Public Scan
URL:
https://www.manageengine.com/products/eventlog/?utm_source=mailer&utm_medium=tool&utm_campaign=promo&utm_term=ld_allprod_ad360
Submission Tags: falconsandbox
Submission: On September 10 via api from US — Scanned from NL
Submission Tags: falconsandbox
Submission: On September 10 via api from US — Scanned from NL
Form analysis
1 forms found in the DOMName: form-hockey_v1 — https://www.manageengine.com/search-results.html
<form id="cse-search-box" action="https://www.manageengine.com/search-results.html" name="form-hockey_v1"> <input id="hockey_v1-query" type="text" placeholder="Search..." value="" class="newsearchbox fl" name="query"></form>
Text Content
Support Support Get Quote * Products * IDENTITY AND ACCESS MANAGEMENT * UNIFIED SERVICE MANAGEMENT * UNIFIED ENDPOINT MANAGEMENT AND SECURITY * IT OPERATIONS MANAGEMENT * SECURITY INFORMATION AND EVENT MANAGEMENT * ADVANCED IT ANALYTICS * LOW-CODE APP DEVELOPMENT * CLOUD SOLUTIONS FOR ENTERPRISE IT * IT MANAGEMENT FOR MSPS ACTIVE DIRECTORY MANAGEMENT MANAGE, TRACK, AND SECURE ACTIVE DIRECTORY. IDENTITY GOVERNANCE AND ADMINISTRATIONORCHESTRATE USER IDENTITY MANAGEMENT AND ACCESS CONTROLS FOR ZERO TRUST. PRIVILEGED ACCESS MANAGEMENTCONTROL AND SECURE PRIVILEGED ACCESS TO CRITICAL ENTERPRISE SYSTEMS. * ADManager Plus Active Directory, Microsoft 365, and Exchange management and reporting * ADAudit Plus Real-time Active Directory, file, and Windows server change auditing * ADSelfService Plus Identity security with adaptive MFA, SSPR, and SSO * Exchange Reporter Plus Reporting, auditing, and monitoring for hybrid Exchange and Skype * RecoveryManager Plus Active Directory, Microsoft 365, and Exchange backup and recovery * AD360 Workforce identity and access management for hybrid ecosystems * Identity360 A cloud-native identity platform for workforce IAM * M365 Manager Plus Microsoft 365 management, reporting, and auditing * PAM360 Complete privileged access security for enterprises * Password Manager Pro Privileged password management * Access Manager Plus Secure remote access and privileged session management * Key Manager Plus SSH key and SSL/TLS certificate management Related free tools Hybrid AD management toolsActive Directory Academy ENTERPRISE AND IT SERVICE MANAGEMENTDELIVER A CONSISTENT EMPLOYEE EXPERIENCE ACROSS BUSINESS FUNCTIONS. CUSTOMER SERVICE MANAGEMENTBUILD A ONE-STOP PORTAL FOR CUSTOMERS WITH EFFICIENT ACCOUNT MANAGEMENT. IT ASSET MANAGEMENTCENTRALIZE AND AUTOMATE THE COMPLETE IT ASSET LIFE CYCLE. * ServiceDesk Plus Full-stack service management for enterprises * SupportCenter Plus Customer support with built-in billing for businesses * AssetExplorer IT asset management with an integrated CMDB SIEM SPOT, INVESTIGATE, AND NEUTRALIZE SECURITY THREATS. LOG AND COMPLIANCE MANAGEMENTGAIN DEEPER VISIBILITY INTO SECURITY EVENTS AND ENSURE COMPLIANCE. SECURITY AUDITINGAUDIT ACTIVE DIRECTORY, CLOUD PLATFORMS AND FILES TO ENHANCE YOUR SECURITY POSTURE. * Log360 Unified SIEM solution with integrated DLP and CASB capabilities * EventLog Analyzer Comprehensive log and IT compliance management * Firewall Analyzer Firewall rule, configuration, and log management * ADAudit Plus Real-time Active Directory, file, and Windows server change auditing * SharePoint Manager Plus SharePoint reporting and auditing * M365 Security Plus Microsoft 365 security * Cloud Security Plus Cloud security monitoring and analytics * DataSecurity Plus File auditing, data leak prevention, and data risk assessment * FileAnalysis File security and storage analysis SIEM Hubspot ENDPOINT MANAGEMENT AND PROTECTION PLATFORM (UEM AND EPP)SECURE AND MANAGE ENDPOINTS TO PROTECT YOUR IT ASSETS EFFECTIVELY. ENDPOINT MANAGEMENTACHIEVE INTELLIGENT IT DEVICE MANAGEMENT WITH ZERO USER INTERVENTION. ENDPOINT SECURITYDEFEND AGAINST THREAT ACTORS WITH PROACTIVE AND REACTIVE MEASURES. * Endpoint Central Integrated endpoint management and protection platform * Patch Manager Plus Automated patching across multiple OSs and over 850+ third-party apps * Patch Connect Plus Simplified third-party patch deployment via ConfigMgr and Intune * Mobile Device Manager Plus Seamless mobile device management from onboarding to retirement * Remote Access Plus Remote troubleshooting with integrated chat, voice, and video * OS Deployer Automated OS image creation and seamless role-based deployment * Vulnerability Manager Plus Prioritization-focused enterprise vulnerability management * Application Control Plus App control and endpoint privilege management software * Device Control Plus Data theft prevention with strict peripheral device control * Browser Security Plus Browser security with isolation, lockdown, and activity tracking * Endpoint DLP Plus Sensitive data protection and compliance for endpoint devices Free Windows admin tools Free system tools NETWORK AND SERVER PERFORMANCE MONITORINGMANAGE AND OPTIMIZE NETWORK, SERVER, AND APPLICATION PERFORMANCE. APPLICATION PERFORMANCE MONITORINGMONITOR, MANAGE, AND TROUBLESHOOT APPLICATION PERFORMANCE. IT INCIDENT MANAGEMENT GET INSTANT ALERTS FOR CRITICAL INCIDENTS AND PROVIDE REAL-TIME STATUS UPDATES. * OpManager Plus Unified network, server, and application management * OpManager Network performance monitoring * NetFlow Analyzer Bandwidth monitoring and traffic analysis * Network Configuration Manager Network change and configuration management * Firewall Analyzer Firewall rule, configuration, and log management * OpUtils IP address and switch port management * Applications Manager Server and application performance monitoring * Site24x7 Full-stack monitoring for IT admins, DevOps, and SREs DNS AND DHCP MANAGEMENTOPTIMIZED IP ADDRESS CONFIGURATION AND DOMAIN MANAGEMENT. * CloudDNS An all-in-one DNS management service to keep your business online * DDI Central Unified DNS, DHCP, and IP address manager * AlarmsOne Centralized IT alert management * Site24x7 StatusIQ Status pages for real-time status and incident communication Related free tools IT ANALYTICSCONNECT TO YOUR IT APPLICATIONS AND VISUALIZE ALL FACETS OF YOUR IT. * Analytics Plus AI-powered unified analytics platform to correlate all IT data * CloudSpend Cloud cost management for modern software teams * SaaS Manager Plus SaaS management platform to maximize ROI CLOUD-NATIVE SOLUTIONS FOR IT MANAGEMENTMONITOR, MANAGE, AUDIT, AND SECURE YOUR MULTI-CLOUD AND HYBRID INFRASTRUCTURE. BUSINESS APPLICATIONS FOR ITBOOST PRODUCTIVITY AND IMPROVE TEAM COLLABORATION. * Identity360 A cloud-native identity platform for workforce IAM * ServiceDesk Plus Full-stack service management for enterprises * Endpoint Central Unified endpoint management and security * Mobile Device Manager Plus Comprehensive mobile device management * Remote Access Plus Enterprise remote access * Patch Manager Plus Automated multi-OS patch management * Site24x7 Full-stack monitoring for IT admins, DevOps, and SREs * Site24x7 StatusIQ Status pages for real-time status and incident communication * CloudSpend Cloud cost management for modern software teams * SaaS Manager Plus SaaS management platform to maximize ROI * AlarmsOne Centralized IT alert management * Log360 Cloud Secure your IT infrastructure and prove compliance from the cloud * Analytics Plus AI-powered unified analytics platform to correlate all IT data * CloudDNS An all-in-one DNS management service to keep your business online * Zoho Creator Low-code application development platform * Zoho Assist Remote support software * Zoho Projects Collaborative project management * Zoho Sprints Agile project management * Zoho Workplace All-in-one collaboration tool for unified communication * Zoho Mail Secure email hosting solution for businesses * Zoho Meeting All-in-one video conferencing solution for remote business meetings * Zoho Lens All-in-one AR remote assistance software solution for remote collaboration. Our DatacentersAWS marketplace Azure marketplace CUSTOM SOLUTION BUILDERBUILD TAILOR-MADE APPS TO AUTOMATE OPERATIONS AT YOUR ORGANIZATION. * AppCreator Advanced low-code platform for building powerful applications SOLUTIONS FOR MSPSGROW YOUR MSP BUSINESS WITH SCALABLE AND SECURE IT MANAGEMENT SOLUTIONS. * RMM Central Unified network monitoring and endpoint management for MSPs * ADManager Plus MSP Unified Active Directory management and reporting solution for MSPs * Log360 MSSP Unified SIEM solution for MSSPs * EventLog Analyzer MSSP Log management and advanced threat intelligence for MSSPs * PAM360 Complete privileged access security for enterprises * Password Manager Pro Privileged password management * ServiceDesk Plus MSP Full-stack service management for enterprises * Endpoint Central MSP Unified endpoint management and security * Mobile Device Manager Plus MSP Comprehensive mobile device management * OpManager MSP Network performance monitoring * Site24x7 Remote monitoring for MSPs and CSPs View all products * Store * Partners * Affiliate * Support * Support enquiries * Evaluators * Training and certification * Service packs * Downloads and signups * Product updates * Security Response Center * Follow us: * System requirements * Product documentation * Knowledge base * White papers * Forums * Blogs * Toll Free * US Sales: +1 888 720 9500 * US Support: +1 844 649 7766 * US Sales: +1 833-420-0996 * CA Sales: +1 833-416-0441 * Aus: 1800 631 268 * UK: 0800 028 6590 * IN: 1800 572 6673 * Tel * Intl: +1 925 924 9500 * CN: +86 400 660 8680 * Tel: +1 408 352 9254 * Direct Inward Dialing * Tel: +1 408 352 9254 * Login | Register * Desktop Management | On-premises | Active Directory Management and Reporting | Remote Access Software | Asset Management | Customer Support Software | Help Desk Software | Remote Support Software | OS Deployment | Active Directory Auditing | Identity Password Management & IT Self-Service | Exchange Server Auditing & Reporting | Active Directory Backup & Recovery Tool | SharePoint Reporting & Auditing | File server auditing & data discovery | Active Directory Identity Management (AD360) | Application Performance Monitoring (APM) | Website Monitoring & Server Monitoring (Cloud) | Network Monitoring Software | Bandwidth Monitoring & Traffic Analysis | Microsoft 365 Management and Reporting| Mobile device management | Browser security & management | Privileged Access Management | Log Management & IT Compliance Tool | Unified SIEM Tool & SOAR solution * * CLOUD EDITION FOR EVENTLOG ANALYZER Fulfil your logging needs and perform compliance management in the cloud. Check out our cloud edition. Sign up for free Download * Overview * Email Download Link * Features * Demo * Get Quote * Resources * Support * Customers Email Download Link LOG MANAGEMENT, AUDITING, AND IT COMPLIANCE MANAGEMENT MADE EASY. Collect, monitor, and analyze logs, and comply with regulatory mandates. Sign up Download EVENTLOG ANALYZER IS TRUSTED BY OVER 8100 CUSTOMERS LOG MANAGEMENT AND BEYOND * Security log management * Network device auditing * Application log analysis * Server log management * Security event management * Web server log management * All features SECURITY LOG MANAGEMENT: LEAVE NO LOG UNTURNED Collect, manage, analyze, correlate, and search through log data from over 750 sources right out of the box using agentless log collection, agent-based log collection, and log importing. Further, analyze any human-readable log format with EventLog Analyzer's custom log parser, which automatically reads and extracts fields and allows you to mark additional fields for better analysis of unsupported or third-party application log formats. EventLog Analyzer's built-in syslog server automatically configures and collects syslogs from network devices, allows you to perform syslog analysis and provides in-depth insights into security events. Learn more NETWORK DEVICE MONITORING: START WITH PERIMETER SECURITY Guard your network perimeter from intrusions by auditing log data from perimeter devices, including routers, switches, firewall, and IDSs and IPSs. Gain valuable insights on firewall security policy and rule changes, admin user logons and logoffs (including failed logons) on critical perimeter devices, changes to critical user accounts, and more. Spot inbound and outbound traffic from malicious sources and block it in real time with predefined workflows. Learn more APPLICATION LOG ANALYSIS: PROTECT WHAT MATTERS Monitor critical changes, detect data theft, identify attacks, and track downtime in your business-critical applications, such as databases and web servers, through application log auditing. EventLog Analyzer is a database activity monitoring tool that helps ensure the confidentiality and integrity of your database. * SQL database auditing: Track DML and DDL activities, audit user account changes and SQL server activities, spot attacks such as SQL injection, view account lockouts, and more. * Oracle database auditing: Monitor user accesses and activities, audit admin account changes and critical activities on servers, and more. Learn more SERVER LOG MANAGEMENT: ENSURE COMPLETE SERVER SECURITY Monitor your servers and track critical changes to them in real time. Manage server logs for your SQL servers, terminals, Oracle servers, print servers, and other web servers. With EventLog Analyzer's threat detection mechanisms, it is easier to detect server-related security threats, including port-scan attacks, unauthorized access on accounts holding sensitive corporate data, and suspicious activities on devices. You can also monitor server performance and resolve operational issues. Learn more SECURITY EVENT MANAGEMENT: MONITOR SECURITY EVENTS IN YOUR NETWORK Collect, track, monitor, and report security-related events across your network. EventLog Analyzer is security event management software that analyzes insights from detected security events and provides sophisticated threat response techniques with automated workflows. You can also demonstrate compliance with audit-ready templates for regulations such as HIPAA, GDPR, PCI-DSS, SOX, and more. Learn more WEB SERVER LOG MANAGEMENT AUDIT, MANAGE, AND TRACK WEB SERVER LOGS EventLog Analyzer is a log analyzer tool that doubles as a(n): * IIS log analyzer: Audit Microsoft Internet Information Services (IIS) web server events, security errors, configuration changes, and more. Learn more * Apache log analyzer: Monitor Apache web server events, security errors, insights into attacks, and more.Learn more * DHCP log analyzer: Track critical DHCP server events; audit granted, renewed, or denied leases; and much more.Learn more Learn more All features SUPPORTED LOG SOURCES Find out the 750 log sources that EventLog Analyzer supports. Learn more SECURITY ANALYTICS AND BEYOND * FIM * Correlation * Threat intelligence * Incident management * Search * Compliance * Threat investigation FILE INTEGRITY MONITORING ENSURE THE SECURITY OF SENSITIVE DATA Protect your organization's sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer's file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity. Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers. Learn more A REAL-TIME EVENT CORRELATION ENGINE: SECURELY CORRELATE DISPARATE EVENTS Detect attack attempts and trace potential security threats by correlating log data from devices across the network with predefined rules and a drag-and-drop custom correlation rule builder. Be alerted in real time about security threats, like brute-force attacks, data theft, SQL injection attacks, and suspicious software installation, by correlating data from different log sources. Gain insights into security events that triggered a correlation rule in the form of an incident timeline. Associate a correlation rule or action with workflow profiles to immediately neutralize the security threat. Learn more AUGMENTED THREAT INTELLIGENCE USE CONTEXTUAL THREAT FEEDS FOR BETTER SECURITY Identify malicious IP addresses, URLs, or domain interactions with your network in real time by automatically correlating log data from devices in your network with scrutinized threat feeds using our built-in global IP threat database and advanced threat analytics. EventLog Analyzer's threat intelligence platform is automatically updated on a daily basis to help you stay on top of threats and defend your network from the latest attacks. Get insights into the threat category, the reputation score of the malicious source, and more with the advanced threat analytics add-on. Learn more BUILT-IN INCIDENT MANAGEMENT EMPLOY AUTOMATION FOR THREAT RESOLUTION Efficiently manage security incidents and speed up the resolution process by automatically assigning tickets to your technicians or administrators using predefined rules. For every detected incident, raise tickets in centralized ITSM tools with the help desk software integrations. Expedite threat resolution by using automated incident workflows that mitigate security threats instantly. Learn more A POWERFUL SEARCH ENGINE USE FORENSIC ANALYSIS TO UNEARTH SECURITY GAPS Drill down through terabytes of raw log data and find exactly what you're looking for with EventLog Analyzer's log search functionality. Conduct basic search using wild cards, phrases, and boolean operators along with grouped searches and range searches. Use the advanced query builder to automatically construct complex queries using interactive click-based search options and more. Save search results as incident reports and save queries as Alert Profiles to effectively conduct root cause analysis and prevent attacks of the same kind from reoccurring. Learn more INTEGRATED COMPLIANCE MANAGEMENT MEET COMPLIANCE DEMANDS EASILY Simplify your IT compliance auditing with predefined report templates for various regulatory mandates, including PCI DSS, HIPAA, FISMA, GDPR, SOX, and ISO 27001. Export comprehensive compliance reports in any format, tweak the existing compliance auditing report templates, or create custom compliance reports to meet the demands of future IT regulations. Archive log data for custom time periods to meet crucial log archival requirements. Learn more UNIFIED CYBER INVESTIGATION CONSOLE INVESTIGATE AND PROACTIVELY HUNT FOR THREATS WITH THE INCIDENT WORKBENCH Enhance efficiency in validating security incidents and conducting thorough threat investigations by leveraging EventLog Analyzer's Incident Workbench. This specialized analytical platform focuses on core digital entities like users, processes, and external threat sources, offering additional contextual data and risk assement. Users can simply point and probe these entities, and add them to the analytical console as they traverse through different dashboards of EventLog Analyzer. The Incident Workbench incorporates the following integrations: * UEBA for user analytics (Log360 integration is required) * Advanced Threat Analytics with external threat feeds such as VirusTotal * Process hunting trees Add multiple analytical profiles, and save the instance as evidence to the incident management console. Learn more LOOKING FOR A LOG MANAGEMENT SOLUTION? EVENTLOG ANALYZER IS AVAILABLE IN 3 EDITIONS FREE EDITION $0Never expires Free Download * Supports up to 5 log sources only * Never expire * 1. Centralized log collection and archival 2. Log search based reports 3. Compliance reports 4. Log forensic analysis capabilities PREMIUM Starts at $595Year Try Now * Supports 10 to 1,000 log source Includes, * 1. Centralized log collection and archival 2. Log search based reports 3. Compliance reports 4. Log forensic analysis capabilities DISTRIBUTED Starts at $2495 Year Try Now * Supports 50 to unlimited log sources * Includes all features of premium edition and supports * 1. Scalable environment 2. Distributed central-collector architecture 3. Multi-geographical location monitoring 4. Site-specific reports 5. Rebranding of the web client for client-specific views WANT TO MANAGE YOUR LOGS IN THE CLOUD? Click here for a detailed comparison between on-premise and cloud version. Try now ARE YOU AN MSSP? CHECKOUT OUR EVENTLOG ANALYZER MSSP EDITION Learn more IT Compliance & Event Log Management Software for SIEM * * * Your data.Before it's breached. * Log360's proactive approach through dark web monitoring * Explore now * * * Live Webinar * Abusing Windows EFS to steal data using PowerShell * Presenter Shehnaaz, Product expert Aug 27 at 2 PM AEST (12 PM SGT) Aug 27 at 2 PM GST | 10 AM GMT | 3:30 PM IST Aug 27 at 11 AM EDT * Register Now * A Customers’ Choice in the 2023 Gartner® Peer Insights ‘Voice of the Customer’™ for SIEM One of the four market winners to grab this recognition. Find out why Source : Gartner Peer Insights ‘Voice of the Customer’: Security Information and Event Management, 3 July 2020 The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates. * * New Feature * EventLog Analyzer's Incident Workbench Unified analytical console crafted for hassle-free threat investigations * Risk profiling Process hunting Evidence building * Hunt, analyze, and resolve threats faster * Explore now 1. 2. 3. 4. 5. 6. * * WHAT OUR CUSTOMERS ARE SAYING Companies of all sizes trust EventLog Analyzer to manage log data efficiently, comply with regulatory demands, and secure their network. TIM TRERISE (IT MANAGER) America’s Christian Credit Union * Entertainment GUNGHO ONLINE ENTERTAINMENT See how EventLog Analyzer helps this entertainment organization streamline log management for its MMORPG network infrastructure. * Education NORTHUMBRIA UNIVERSITY See how EventLog Analyzer helps this educational institution, which has around 31,500 students and 3,500 employees, to monitor its network devices and ensure the security of confidential data. LEN HOLLOWAY IT SECURITY ADMIN OF NORTHUMBRIA UNIVERSITY. * Finance FIRST MOUNTAIN BANK See how EventLog Analyzer helps First Mountain Bank stay compliant with the FDIC's audit requirements. JIM LLOYD INFORMATION SYSTEMS MANAGER * Government FLORIDA DEPARTMENT OF TRANSPORTATION See how EventLog Analyzer enables this government organization to monitor and audit its privileged users. * Entertainment GUNGHO ONLINE ENTERTAINMENT See how EventLog Analyzer helps this entertainment organization streamline log management for its MMORPG network infrastructure. * Education NORTHUMBRIA UNIVERSITY See how EventLog Analyzer helps this educational institution, which has around 31,500 students and 3,500 employees, to monitor its network devices and ensure the security of confidential data. LEN HOLLOWAY IT SECURITY ADMIN OF NORTHUMBRIA UNIVERSITY. 1. 2. 3. 4. * * 5 REASONS TO CHOOSE EVENTLOG ANALYZER High-speed log processing HIGH-SPEED LOG PROCESSING Processes log data at 25,000 logs/second to detect attacks in real time and conduct quick forensic analysis to reduce the impact of a breach. Comprehensive log management COMPREHENSIVE LOG MANAGEMENT Collects, analyzes, correlates, searches, and archives log data from over 700 log sources. Includes a custom log parser to analyze any human-readable log format. Real-time security auditing REAL-TIME SECURITY AUDITING Audits network perimeter devices' logs, user activities, server account changes, user accesses, and a lot more to meet security auditing needs. Instant threat detection and mitigation INSTANT THREAT DETECTION AND MITIGATION Uncover security threats with advanced threat detection mechanisms, such as event correlation and threat feed analysis, and mitigate them using automated workflows. Compliance management COMPLIANCE MANAGEMENT Meet regulatory compliance requirements with predefined compliance reports for PCI DSS, FISMA, GLBA, SOX, HIPAA, ISO 27001, and more. AWARDS AND RECOGNITIONS * * * * * * * * * * RESOURCES YOU MIGHT BE INTERESTED IN LOGGING GUIDE Explore * DATASHEET Real-time log management solution View now * SOLUTION BRIEF Automating incident response with workflows View now * HOW-TO VIDEOS Utilizing EventLog Analyzer to the fullest View now INTERESTED IN A COMPREHENSIVE LOG MANAGEMENT SOLUTION THAT ALSO HELPS MITIGATE SECURITY THREATS AND MEET COMPLIANCE DEMANDS? Try it out free for 30 days Schedule a personalized demo A SINGLE PANE OF GLASS FOR COMPREHENSIVE LOG MANAGEMENT Log ManagementLog AnalysisIT ComplianceSIEMQuick LinksRelated Products * » Agent-less Log Collection * » Agent based Log Collection * » Importing Event Logs * » Windows Event Log Management * » VMware ESX/ ESXi Log Monitoring * » Applications Log Management * » Active Directory Logs auditing * » MS IIS - Web Server/ FTP Server Log Monitoring * » IBM AS 400/ iSeries Log Monitoring * » Cloud Infrastructure Log Monitoring * » Universal Log Parsing and Indexing * » Log Retention * » Syslog Management * » Event correlation * » Log forensics * » Log Search * » Security Reports * » Custom Report Builder * » Privilege User Monitoring and Auditing (PUMA) Reports * » Real Time Alerts * » Alert Notifications * » What is log analysis * » PCI DSS Compliance Reports * » SOX Compliance Reports * » ISO 27001 Compliance Reports * » Customizing Compliance Reports * » GDPR Compliance Reports * » FISMA Compliance Reports * » GPG Compliance Reports * » Compliance Report Builder * » HIPAA Compliance Reports * » GLBA Compliance Reports * » ISLP Compliance Reports * » Log Management * » Security Log Management * » Server Log Management * » STIX/TAXII feed processor * » File Integrity Monitoring * » Privilege User Monitoring and Auditing (PUMA) * » User Authentication * » Dashboards & User Specific Views * » Rebranding * » Demo * » Get Quote * » Compare Editions * » Pricing & Purchase * » Let Us Assist You * » Logging Guide * » What's new? * » Awards & Recognition * » Unified SIEM tool & SOAR solution * » Active Directory Auditing * » File server auditing & data discovery * » SharePoint Management and Auditing Solution * » Integrated Identity & Access Management (AD360) * » Active Directory Management & Reporting * » Identity security with MFA, SSO, and SSPR * » Microsoft 365 Management & Reporting Tool * » Cloud Security & Log Management * » All Windows AD Tools * » Cloud SIEM & Log Management * » Exchange Server Auditing & Reporting * » Active Directory Backup & Recovery Tool * » Active Directory FREE Tools A SINGLE PANE OF GLASS FOR COMPREHENSIVE THREAT MANAGEMENT Free Trial Get Quote Email Download Link * Download * Live Demo * Video Demo * Get Quote * Buy Now * About us * EULA * Terms of service * Security * Compliance * Privacy policy * Cookie policy * Affiliate program * Newsletter * Contact sales * Our offices * Global (English) © 2024 Zoho Corporation Pvt. Ltd. All rights reserved. At ManageEngine, we do not use third-party software to track website visitors. We take your privacy seriously and use our own tools hosted in our data centres. Your data is yours, and we never monetize it for advertisement purposes. You can learn more about our cookie policy here and change your preferences at any time. Manage Cookies Accept All Cookies COOKIE SETTINGS The options below allow you to manage your consent for the cookies that are set on this website. You can manage your preference anytime by visiting our cookie policy or by clicking on the cookie icon at the bottom-left corner of the webpage. STRICTLY NECESSARY Always Active They are necessary for our website to function and cannot be switched off in our systems. They are essential in order to enable you to navigate around the website and use its features. If you remove or disable these cookies from your browser, we cannot guarantee that you will be able to use our websites. Learn More FUNCTIONAL/PREFERENCE They allow us to remember the choices made by you (such as your user name, language or region) as well as other functionalities (such as controlling the cookie banner, redirection to a new page) in order to provide a more personalised online experience. These preferences are remembered (through the use of persistent cookies) so that you need not set them again the next time you visit the page. Note : The live chat widget will not work if the functionality/preference setting is disabled. Learn More ANALYTICS They help us improve the way our websites work (e.g. by ensuring that users are finding what they are looking for easily). These collect aggregate information about visits, navigations in the websites so that we can make improvement and report our performance. Analytics cookies may also be used to test new pages or features to understand how users adopt them. Learn More THIRD-PARTY COMPANY COOKIES When you visit some of our webpages that contain embedded content hosted on a third party platform such as YouTube videos, these third parties set cookies on your browser. We always opt for the most privacy friendly options provided by these parties, however these are not controlled by us. If you do not want these parties to set cookies on your browser on visiting our site, you should avoid visiting webpages that contain such embeds. Learn More Save & Exit Back to Top