Security Basics mailing list archives
Re: RE: Event Log Monitor
From: mark-g () sc rr com
Date: Tue, 24 Aug 2004 10:13:35 -0400
You could also use a program called "Health Monitor". It can be set up to look at the processes, and events on the systems, and be set up to page or text message users. Hope this helps Mark ----- Original Message ----- From: Dinis Cruz <dinis () ddplus net> Date: Friday, August 20, 2004 3:46 am Subject: RE: Event Log Monitor
I would also recommend this product (GFI S.E.L.M). I have used it severaltimes in the past and even created some advanced SQL queries (using Pivot tables and Data Cubes) which allow me to do security forensics (and trace, for example, individual user's actions). Best regards Dinis Cruz .Net Security Consultant DDPlus-----Original Message----- From: Ross, George [george.ross () atlahq org] Sent: 18 August 2004 13:24 To: chammett () dpsolutions com; security-basics () securityfocus com Subject: RE: Event Log Monitor Look at GFI they have a product that is well priced. www.gfi.com LANGUARD PRODUCTS - Security Log Monitor, it does more than security logs. -----Original Message----- From: Charles J. Hammett Jr. [chammett () dpsolutions com] Sent: Monday, August 16, 2004 3:57 PM To: security-basics () securityfocus com Subject: Event Log Monitor Can someone point me in a direction on software that willmonitor theEvent logs within a Windows enviroment. The servers will be indifferent> domains within our NOC and i want to monitor all event logs for anycritical events. SMS, Email and Paging would be and added feature. thanks in advance -- Charles J. Hammett Jr. A+ Net+ INet+ Security+ Server+ MCSA MCSE CCEA chammett () dpsolutions com Data Processing Solutions Inc. Your Total Solution Provider http://www.dpsinet.com P. 410.720.3300 X 123 --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad andget $545off any course! All of our class sizes are guaranteed to be 10students orless to facilitate one-on-one interaction with one of our expertinstructors.>Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab.Master theskills of an Ethical Hacker to better assess the security of yourorganization.>Visit us at:http://www.infosecinstitute.com/courses/ethical_hacking_training.html> ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of ourclass> sizesare guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skillsof a certified computer examiner, learn to recover trace data leftbehind byfraud, theft, and cybercrime perpetrators. Discover the sourceof computercrime and abuse so that it never happens again. http://www.securityfocus.com/sponsor/InfoSecInstitute_security- basics_040817 ----------------------------------------------------------------------------------------------------------------------------------------------- -------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computercrime and abuse so that it never happens again. http://www.securityfocus.com/sponsor/InfoSecInstitute_security- basics_040817------------------------------------------------------ ----------------------
--------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- RE: Event Log Monitor, (continued)
- RE: Event Log Monitor Darren Mackay (Aug 19)
- RE: Event Log Monitor Ross, George (Aug 19)
- RE: Event Log Monitor Dinis Cruz (Aug 23)
- AW: Event Log Monitor Freddie Soerensen (Aug 24)
- RE: Event Log Monitor Dinis Cruz (Aug 23)
- Re: Event Log Monitor patrick (Aug 19)
- Event log Monitor Charles J. Hammett Jr. (Aug 19)
- RE: Event Log Monitor Ross, George (Aug 23)
- RE: Event log Monitor Depp, Dennis M. (Aug 23)
- RE: Event log Monitor Charles J. Hammett Jr. (Aug 24)
- Re: Event log Monitor Robert Mezzone (Aug 23)
- Re: RE: Event Log Monitor mark-g (Aug 24)