|Sentry II - Why Monitor Event Logs|
Sentry II is a comprehensive security tool. It gives you complete management and monitoring of event logs, performance monitor counters, files, Windows services, running processes, TCP ports and network devices, storing important events and counters in a database and will also generate alerts based on your priorities.
Security requirements today require automated processes for Event Log management and server monitoring. The watchdog features of Sentry II, including its outstanding intrusion detection capabilities, ensure that your network is secure from both internal and external security threats.
The automatic reporting tool creates HTML reports to detail your organizations adherence to IT security policy. You can easily see what you're most interested in using the wizard-based ad-hoc report writer. You can schedule Sentry II to automatically email you reports at specified intervals. You have complete flexibility on what is reported, for what time frame and for events related to a particular audit policy. Monitoring data can be viewed in real-time, or historical data reports can be generated. Graph and Charting Wizard lets you save and create graph templates for historical trending and analysis. Any item that Sentry II monitors or reports on can be utilized as an input to a Chart or Graph letting you quickly view unusual activity on your Servers.
Web-based user interface allows access from anywhere.
Security options provide complete control over who has access to what
information. You can define authorized Users, with different security and
rights to access and use the various Sentry II features.
Sentry II's 9 modules provide the most comprehensive and accurate system monitoring:
EVENT LOG WATCH
Real-time monitoring of Windows and Unix event logs. Sentry II automatically inserts all event log data into an ODBC database.
Monitor availability of all servers in your network, from easy-to-scan user interface. Monitor server IP services including HTTP, FTP, SMTP, POP3, SNMP, and DNS. TCP/IP ports are watched for intrusion detection.
Immediately know when important files have been altered or when key files such as virus definition files are not being updated in a timely manner. Real-time monitoring of key system and application files for creation, deletion, change, no change, size, and/or content.
WINDOWS COUNTER WATCH
Know instantly when Windows system counters exceed
thresholds you have set. Includes counters for:
Real-time monitoring of any or all processes for key conditions you
Real-time monitoring of select, key system and application services that should be running, including anti-virus and other key security services. Automatically starts, restarts and stops services.
Real-time monitoring of Trap messages, proactive SNMP query monitoring of select SNMP counter variables from your network devices. Gives you the first indication of suspicious, unauthorized, or performance related activities on the network.
Real-time monitoring of select SYSLOG messages from network devices and Unix/Linux systems indicating suspicious, unauthorized, or performance related activities.
Create your own custom intrusion-detection programs, scripts, commands,
or batch files.
Free Product Download
© 2002-2005 Engagent