[Use case] Detecting suspicious service installations
Hello all, In this series of posts, we'll share various product use cases, their importance, and how the product can be used to solve them. In this post, we look at the correlation rule to detect suspicious service installations. Rule name: Suspicious service installed What the rule detects: This rule identifies malicious services running on your organization's devices. Why the rule is useful: At any given time, a Windows machine runs several services, all of which are required to accomplish several
[Use case] Detecting suspicious software installations
Hello all, In this series of posts, we'll share various product use cases, their importance, and how the product can be used to solve them. In this post, we look at the correlation rule to detect suspicious software installations. Rule name: Suspicious software installed What the rule detects: This correlation rule allows you to detect potentially malicious software installed within your organization. Why the rule is useful: Since organizations use hundreds of applications, it's very easy for an isolated
[Resource] Threat intelligence with STIX/TAXII threat feeds
Free solution brief: How EventLog Analyzer alerts you about malicious entities by processing the latest threat intelligence from STIX/TAXII threat feeds. Threat intelligence is organized information about potential or current attacks that threaten an organization, which helps them identify threats and make informed decisions on how to deal with them. The STIX and TAXII protocols are global standards to express and communicate threat intelligence, respectively. They help provide unified, high quality
[Resource] Network security attack handbook
Free network security handbook: How the EventLog Analyzer component of Log360 detects network attacks with event correlation. If there's one thing that's certain about the nature of security attacks, it's that they are complex and dynamic. Attackers can infiltrate your network from anywhere, progress through a series of devices unnoticed, before breaching their ultimate target and compromising your critical data or resources. The event correlation module of EventLog Analyzer is a versatile, powerful
Exchange Reporter Plus integrates with Log360
A couple of weeks back, O365 Manager Plus was integrated with Log360. We have further broadened Log360's scope with Microsoft Exchange server reporting and auditing by integrating Exchange Reporter Plus. What exactly are the new functionalities? Exchange Server reporting: Get complete information about all components of your Exchange environment, including mailboxes, distribution lists, public folders, and more. Exchange Server auditing: Track and report on non-owner mailbox accesses, mailbox logon
Security Notice
Dear Users, ManageEngine released Log360 5044 on 7th March 2018, with the following vulnerabilities fixed. Cross Site Scripting (XSS) in the search and reports page (CVE-2018-7405) raised by Suresh Khutale has been fixed. Remote code execution when uploaded by an agent (DDI-VRT-2018-10). Click here to download Log360 5044.
O365 Manager Plus integrates with Log360
Dear All, There's a new feather in Log360's cap! Joining ADAudit Plus and EventLog Analyzer in Log360 is O365 Manager Plus, an Office 365 reporting, management, auditing and alerting tool. What does this mean for you? Access to audit reports and the option to create alerts for critical events in Exchange Online and Azure Active Directory. Office 365 Reporting: Access an exhaustive list of reports to get deep insights on Exchange Online and Azure Active Directory and comply with industry mandates
[GDPR Webinar] Detecting and responding to personal data breaches.
Be GDPR-ready by this May. It's hard to prevent data breaches. Most of the time the only option that we have is containing the attack to reduce the impact. If you're a security administrator or a to-be data protection officer, then you need to definitely deploy a security solution that helps detect and report personal data breaches.The GDPR's Article 33 - Notification of data breaches to supervisory authorities says that too. Join our webinar and hear our compliance expert explain how easily you
Log collector not working
Hy, i am using event log analyzer buil no 11020 its not showing dashboard display and not collecting any log data. kindly help me Regards Balu
Log360 Users
Hi, i try log360 but i don't understand the user configuration, how can i set a new user to log into log360 ?? thk
Let us celebrate our everyday heroes!
July 28, 2017, is the SysAdmin appreciation day. Let us recognize and thank our IT warriors for their hard work and dedication. Let’s face it. If not for our SysAdmins we wouldn't be able to get through a single business day with zero hiccups. Most of the times, we hardly spare a minute to say thanks for all that we get done by our SysAdmins. Now is our chance to thank them for the year round work they do. To all the SysAdmins out there, we, at ManageEngine, would like to truly thank you for
ManageEngine Log360 free online workshop series - Register now
We are excited to announce our exclusive free online workshop series for Log360 from this week. We have designed the topics of this workshop series based on the popular demands of our customers. So, we hope you're as excited as we are. Insights from this series will take you one step ahead of your peers. So hurry up and register right away. Free online Log360 workshop series 2017 25th July - 16th August 2017 Every Tuesday & Wednesday Register Now Highlights of this workshop: Our workshop focuses
Free webinar series: Securing your organization from cyber attacks
Join us for our free two-part webinar series to learn about the tools and techniques you need to secure your organization from cyber attacks. We'll be discussing the two-pronged approach - including both reactive and proactive measures - that'd help you secure your IT against the recently prevalent cyber threats. Register here: http://bit.ly/SecEntIT Part 1: Handling an attack | Thursday, July 20th, 2:30pm IST Part 2: Preventing attacks | Thursday, August 3rd, 2:30pm IST Click here for more details
ManageEngine Log360 free feature demo workshop - Incident management - Register now
Incident management is an essential feature in any SIEM system as it ensures complete accountability in dealing with security attacks. It is a critical bridge between incident detection and incident response, which helps organizations gain a handle on both processes and streamline their overall security system. Join us for our special feature demo workshop to learn about incident management and see how it works on Log360. Free online Log360 feature demo workshop 5th July, 2017 2 PM - 3 PM
Where can I find info regarding User Roles
Hi all, I just want to know what are the difference of the 3 user categories in Technician Roles. Thanks, Amir
ManageEngine Log360 free online workshop series (week 4) - Register now
Securing databases, the core elements of network infrastructure, goes a long way in strengthening organizations’ security forte. If turned a blind eye, sensitive and critical information can be compromised jeopardizing the organization. However, running a systematic audit trail on these databases can ensure data protection. So, this week, our Log360 workshop session will be focused on how to conduct databases audit to protect confidential data. Do register for our workshop and know all you need to
ManageEngine's free webinar to know how to comply with GDPR easily!
The General Data Protection Regulation (GDPR), taking effect on May 25th, 2018, is Europe's overriding data protection regulation. Organizations with international operations should already be executing strategies to align to this latest security mandate or at least have a plan of action to comply with it. If not, they will attract stringent penalties from the European Parliament Council and Commission for mishandling personal data. However, if you haven't yet started preparing your action plan,
ManageEngine Log360 free online workshop series (week 3) - Register now
Securing business-critical applications can be challenging but is quite critical in warding off cyber threats. To help stay in control of these applications and the data it processes, it is vital to audit them on a regular basis. So, this week, our Log360 workshop session will be centered on auditing log data of business-critical applications. Do register for our workshop and know how to audit business-critical applications. Free online Log360 workshop series 2017 (Week 3) 20th & 21st June Register
ManageEngine Log360 free online workshop series (week 2) - Register now
Auditing log data from network devices can go a long way in mitigating network breaches. Your network security solutions such as firewalls and IDS/IPS generate large volumes of syslog messages everyday which need to be analyzed to ensure network security. Learn how you can use Log360 to perform a thorough network audit and receive real time alerts for security events of interest in part two of our on-going free online workshop series. Free online Log360 workshop series Episode 2 - 14th June 2 PM
ManageEngine Free Webinar: Are you protected from the WannaCry ransomware attacks?
On May 12th, 2017, the world witnessed the biggest ever cyber-attack in the history of the internet. A ransomware named WannaCry stormed through the web, took over many companies’ network and held their data for ransom. In the first few hours of the attack, over 200,000 machines were infected and even the big organizations with most secure networks succumbed to it. The attack hit more than 150 countries and shut down everything from telecoms in Spain to the Interior Ministry in Russia. To know that
ManageEngine Log360 free online workshop series (week 4) - Register now
Databases, the core elements of network infrastructure, need to wisely secure as they contain sensitive and critical information which if compromised can jeopardize an organization. Running an audit trail of these databases will reveal information that can ensure data protection. So, this week, our Log360 workshop session will be centered on auditing databases to protect confidential data. Do register for our workshop and know all you need to know about auditing databases. Free online Log360 workshop series 2017 (Week 4)
Firewall Ports to be opened between the Log360 Server and the systems
Hello Gentlemen! I have the Log360 installed on a DMZ server. The Systems and this server are separated by a Firewall. Can anybody please help me with the ports that need to be open for the Log360 to work without issues? Thank you in advance. Best regards, Mohammed Abubaker CCIE#43994
ManageEngine Log360 free online workshop series (week 3) - Register now
As cyber threats are becoming increasingly more advanced, business-critical application security has become every admin's concern. Auditing applications vital to running businesses can help stay in control of the system in place and the data it processes. So, this week, our Log360 workshop session will be centered on auditing log data of business-critical applications. Do register for our workshop and know all you need to know about auditing business-critical applications. Free online Log360 workshop
ManageEngine Log360 free online workshop series (week 2) - Register now
This week on our Log360 online workshop, we will look into extensive auditing of network devices. It's important every security administrator knows how to perform scrutinizing audits on all network devices to ensure every loophole in their configuration is identified and resolved. This is because a comprehensive security audit reduces the risk of security incidents. So, what are you waiting for? Register right away to know all about auditing! Free online Log360 workshop series 2017 (Week 2) 25th
ManageEngine Log360 free online workshop series - Register now
We are excited to announce that this week we are kickstarting exclusive free online workshop series for Log360. We have designed the topics of this workshop series based on the popular demands of our customers. So, we hope you're excited as much as we are. Insights from this series will take you one step ahead of your peers. So hurry up and register right away. Free online Log360 workshop series 2017 18th April - 11th May 2017 Every Tuesday & Thursday Register Now Highlights of this workshop:
Introducing ManageEngine Log360 - A comprehensive SIEM solution
Hi All, We're all excited to announce the release of Log360 - the new web-based integrated solution that combines EventLog Analyzer and ADAudit Plus into a single console to help you manage your Active Directory auditing and network security easily. Log360 is pretty easy to install and configure. It provides you with single simple console that helps you to combat security breaches, meet compliance requirements, perform AD auditing, automate log management process, and more. Download a 30-day Free
ManageEngine Customer Support is Experiencing a Slowdown
Some of you may have experienced slow customer service over the last 12 hours or so. Yes, we have an issue and I want to give you an update. A severe cyclone Vardah hit Chennai on Monday, December 12th and passed over the city several hours ago. All offices and schools in the region remained closed today. Zoho’s Chennai office was also closed, with the exception of our customer support staff who came in before the storm hit. However, customer support has been spotty as communication links have
Contest: Win an iPad Mini 2 or a $200 Amazon gift voucher!
Hello! It's that time of the year when we remember all that's spooky. Over the years, we have all come to fear several things. The dark, monsters under the bed, zombies, computers, wires, hackers...you get the drift. Network security has given us all a fright or two (or a hundred, but who's counting?). In the spirit of Halloween, we thought we could share our IT nightmares. Do take up our survey and let us know what scares you the most about network security. We're giving away an iPad Mini
Integration
Is it possible to integrate Log 360 with the third party analytics tool or transfer events to SIEM solution?
Complete audit trail
Can I see in Log360 these facilities? Complete audit trail (who, what, when, where) Show Before and After values of modified objects Thanks.