Sentry II is a comprehensive security tool.  It gives you complete management and monitoring of event logs, performance monitor counters, files, Windows services, running processes, TCP ports and network devices, storing important events and counters in a database and will also generate alerts based on your priorities.  

Security requirements today require automated processes for Event Log management and server monitoring. The watchdog features of Sentry II, including its outstanding intrusion detection capabilities,  ensure that your network is secure from both internal and external security threats.  

The automatic reporting tool creates HTML reports to detail your organizations adherence to IT security policy.  You can easily see what you're most interested in using the wizard-based ad-hoc report writer.  You can schedule Sentry II to automatically email you reports at specified intervals.  You have complete flexibility on what is reported, for what time frame and for events related to a particular audit policy.  Monitoring data can be viewed in real-time, or historical data reports can be generated.  Graph and Charting Wizard lets you save and create graph templates for historical trending and analysis. Any item that Sentry II monitors or reports on can be utilized as an input to a Chart or Graph letting you quickly view unusual activity on your Servers. 

Web-based user interface allows access from anywhere.  Security options provide complete control over who has access to what information.  You can define authorized Users, with different security and rights to access and use the various Sentry II features. 

Sophisticated alert features notify you of potential problems, enabling you to automatically execute corrective actions when alert conditions have been met.  You can receive alerts through a variety of notification options, including:
        Email
        Pop-ups
        Pager

Sentry II's 9 modules provide the most comprehensive and accurate system monitoring:  

EVENT LOG WATCH

Real-time monitoring of Windows and Unix event logs.  Sentry II automatically inserts all event log data into an ODBC database.

SERVER WATCH

Monitor availability of all servers in your network, from easy-to-scan user interface.  Monitor server IP services including HTTP, FTP, SMTP, POP3, SNMP, and DNS.   TCP/IP ports are watched for intrusion detection.

FILE WATCH

Immediately know when important files have been altered or when key files such as virus definition files are not being updated in a timely manner.   Real-time monitoring of key system and application files for creation, deletion, change, no change, size, and/or content. 

WINDOWS COUNTER WATCH 

Know instantly when Windows system counters exceed thresholds you have set.  Includes counters for:
       Exchange
       IIS
       SQL Server
       Memory use
       Processor use
       System performance

PROCESS WATCH

Real-time monitoring of any or all processes for key conditions you specify:
       Process should be running.
       Process should not be running.
       If process is not running, start it.
       If process is running, terminate it.
Process watch is an invaluable ally in stopping worms and other malicious processes.

SERVICES WATCH

Real-time monitoring of select, key system and application services that should be running, including anti-virus and other key security services. Automatically starts, restarts and stops services.

SNMP WATCH

Real-time monitoring of Trap messages, proactive SNMP query monitoring of select SNMP counter variables from your network devices.  Gives you the first indication of suspicious, unauthorized, or performance related activities on the network.

SYSLOG WATCH 

Real-time monitoring of select SYSLOG messages from network devices and Unix/Linux systems indicating suspicious, unauthorized, or performance related activities.

CUSTOM WATCH

Create your own custom intrusion-detection programs, scripts, commands, or batch files.
      Executed periodically on any scheduled basis you define.
      Fully integrated with Sentry II's alerting and reporting system.

Download Sentry II

Free Product Download

Download
 

Overview

Details
Evaluating Automated Security Tools
Features
Sarbanes-Oxley Compliance
Why you should monitor your event logs
 

White Paper

Event Log Management COST JUSTIFICATION
 

Documentation

Administrator Logins
Alert Percentage By Server
Architecture Diagram
Brochure
Event Watch Report
EventLog Watch Percentage By Server
Login Failures
Monitored Performance Counters
Selected Performance Counters
Server Status Report
User Manual
 

Reviews

Customer Endorsements

2002-2005 Engagent