- Free Edition
- What's New?
- Quick Links
- Log Management
- Application Log Management
- Application log monitoring
- IIS log analyzer
- IIS web log analyzer
- IIS FTP log analyzer
- IIS log parser
- VMware log analyzer
- Hyper V event log auditing
- SQL database auditing
- SQL server auditing
- MySQL log analyzer
- Apache log analyzer
- DHCP server auditing
- Database activity monitoring
- Database auditing
- Oracle database auditing More..
- IT Compliance Auditing
- IT Compliance Auditing
- SOX Compliance Audit
- GDPR Compliance Audit
- ISO 27001 Compliance Audit
- HIPAA Compliance Audit
- PCI Compliance Audit
- FISMA Compliance Audit
- GLBA Compliance Audit
- GPG Compliance Audit
- ISLP Compliance Audit
- FERPA Compliance Audit
- CCPA Compliance Reports
- CCPA Compliance Software
- NERC Compliance Audit Reports
- Cyber Essentials Compliance Reports
- Reports for New Regulatory Compliance
- Customizing Compliance Reports
- PDPA compliance audit reports
- CMMC Compliance Audit More..
- SIEM
- Security Information and Event Management (SIEM)
- Threat Intelligence
- STIX/TAXII feed processor
- Server Log Management
- Event Log Monitoring
- File Integrity Monitoring
- Linux File Integrity Monitoring
- Threat Whitelisting
- Advanced Threat Analytics
- Security Log Management
- Log Forensics
- Incident Management System
- Application log management
- Real-Time Event Correlation
- Detecting Threats in Windows
- External Threat Mitigation
- Malwarebytes Threat Reports
- FireEye Threat Intelligence
- Linux Log Analyzer More..
- Network Device Monitoring
- Network Device Monitoring
- Router Log Auditing
- Cisco Logs Analyzer
- VPN log analyzer
- IDS/IPS log monitoring
- Solaris Device Auditing
- Monitoring user activity in routers
- Monitoring Router Traffic
- Switch Log Monitoring
- Arista Switch Log Monitoring
- Firewall Log Analyzer
- Firewall Traffic Monitoring
- Windows Firewall Auditing
- SonicWall Log Analyzer
- H3C Firewall Auditing
- Barracuda Device Auditing
- Palo Alto Networks Firewall Auditing
- Juniper Device Auditing
- Fortinet Device Auditing
- pfSense Firewall Log Analyzer
- NetScreen Log Analysis
- WatchGuard Traffic Monitoring
- Check Point Device Auditing
- Sophos Log Monitoring
- Huawei Device Monitoring
- HP Log Analysis
- F5 Logs Monitoring
- Fortinet log analyzer More..
- Endpoint Log Management
- System and User Monitoring Reports
- More Features
- Resources
- Product Info
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
Most SIEM solutions contain a great deal of sensitive information on events happening across a network, which means ensuring secure access to these solutions is crucial for network security.
This is why EventLog Analyzer utilizes two-factor authentication to ensure that only authorized users access the solution. With two-factor authentication enabled, users are verified twice during login—once with a password and again with a one-time password (OTP) sent to a registered mobile number or email address.
Two-factor authentication can secure your sensitive data even if your password is compromised. This double authentication method is essential, because cybercriminals are constantly looking to breach networks using stolen credentials.
Do you still need two-factor authentication if you have a strong password?
A strong password is an essential part of keeping your EventLog Analyzer account safe, since this will be your first line of defense against potential attacks. But using a password alone isn't always the most effective way to secure an account. Passwords are becoming less effective because of increasingly sophisticated password cracking attacks, such as brute force, dictionary, and keylogger attacks.
Two-factor authentication eliminates the risks of password cracking attacks, since the OTP is sent directly to the user and cannot be replicated. Having multiple factors in the authentication process greatly enhances the security of an account, keeping malicious users from accessing sensitive information.
Two-factor authentication methods in EventLog Analyzer
EventLog Analyzer has a list of options to choose from to set your preferred two-factor authentication method.
- Email verification
- SMS verification
- Google Authenticator
- RSA SecurID
- Duo Security
- Backup verification codes
Email verification
When email verification is enabled, a verification code will be sent to your registered email address. This code has to be entered in addition to the password before you can log into your account.
SMS verification
When this feature is enabled, an SMS with the verification code will be sent to the registered mobile number. The code needs to be entered before you can log in.
Google Authenticator
With this verification method, a six-digit verification code will be generated in the Google Authenticator app. This code has to be entered in the required field before you can log in.
RSA SecurID
When the RSA SecurID feature is enabled, the security code generated by the RSA SecurID mobile app or security token sent via SMS or email will have to be entered before you can log in.
Duo Security
If verification via Duo Security is enabled, you can log in by entering a six-digit security code sent via SMS, phone call, or push notification from the app.
Backup verification codes
If the registered device is not available or if you are unable to receive the one-time password (OTP), backup verification codes can be used to log in. These backup codes can be generated while logging into your account for which two-factor authentication has been configured. Keeping a copy of these codes handy is a fail-safe mechanism to ensure that you can log into your account even at the event of your device getting lost.
Configuring two-factor authentication for EventLog Analyzer.