- Free Edition
- What's New?
- Key Highlights
- Suggested Reading
- All Capabilities
-
Log Management
- Event Log Management
- Syslog Management
- Log Collection
- Agent-less Log Collection
- Agent Based Log collection
- Windows Log Analysis
- Event Log Auditing
- Remote Log Management
- Cloud Log Management
- Security Log Management
- Server Log Management
- Linux Auditing and Reporting
- Auditing Syslog Devices
- Windows Registry Auditing
- Privileged User Activity Auditing More..
-
Application Log Management
- Application Log Monitoring
- Web Server Auditing
- Database Activity Monitoring
- Database Auditing
- IIS Log Analyzer
- Apache Log Analyzer
- SQL Database Auditing
- VMware Log Analyzer
- Hyper V Event Log Auditing
- MySQL Log Analyzer
- DHCP Server Auditing
- Oracle Database Auditing
- SQL Database Auditing
- IIS FTP Log Analyzer
- IIS Web Log Analyzer
- IIS Viewer
- IIS Log Parser
- Apache Log Viewer
- Apache Log Parser
- Oracle Database Auditing More..
-
IT Compliance Auditing
- ISO 27001 Compliance
- HIPAA Compliance
- PCI DSS Compliance
- SOX Compliance
- GDPR Compliance
- FISMA Compliance Audit
- GLBA Compliance Audit
- CCPA Compliance Audit
- Cyber Essentials Compliance Audit
- GPG Compliance Audit
- ISLP Compliance Audit
- FERPA Compliance Audit
- NERC Compliance Audit Reports
- PDPA Compliance Audit reports
- CMMC Compliance Audit
- Reports for New Regulatory Compliance
- Customizing Compliance Reports More..
-
Security Monitoring
- Threat Intelligence
- STIX/TAXII Feed Processor
- Threat Whitelisting
- Real-Time Event Correlation
- Log Forensics
- Incident Management System
- Automated Incident Response
- Linux File Integrity Monitoring
- Detecting Threats in Windows
- External Threat Mitigation
- Malwarebytes Threat Reports
- FireEye Threat Intelligence
- Application Log Management
- Security Information and Event Management (SIEM)
- Real-Time Event Alerts
- Privileged User Activity Auditing More..
-
Network Device Monitoring
- Network Device Monitoring
- Router Log Auditing
- Switch Log Monitoring
- Firewall Log Analyzer
- Cisco Logs Analyzer
- VPN Log Analyzer
- IDS/IPS Log Monitoring
- Solaris Device Auditing
- Monitoring User Activity in Routers
- Monitoring Router Traffic
- Arista Switch Log Monitoring
- Firewall Traffic Monitoring
- Windows Firewall Auditing
- SonicWall Log Analyzer
- H3C Firewall Auditing
- Barracuda Device Auditing
- Palo Alto Networks Firewall Auditing
- Juniper Device Auditing
- Fortinet Device Auditing
- pfSense Firewall Log Analyzer
- NetScreen Log Analysis
- WatchGuard Traffic Monitoring
- Check Point Device Auditing
- Sophos Log Monitoring
- Huawei Device Monitoring
- HP Log Analysis
- F5 Logs Monitoring
- Fortinet Log Analyzer More..
- Endpoint Log Management
- System and User Monitoring Reports
-
Log Management
- Product Resources
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
NetScreen's firewall generates terabytes of logs that can be used to audit, manage, and secure your network, but first you have to collect, analyze, correlate, search though, report on, and archive them. Doing all of this manually would be a superhuman task, but luckily EventLog Analyzer acts as a NetScreen firewall log analyzer and provides end-to-end log management for NetScreen devices. EventLog Analyzer supports NetScreen devices with both agent and agentless log collection, custom log parsing, complete log analysis with reports and alerts, a powerful log search engine, and flexible log archiving options. Read more
EventLog Analyzer has extensive out-of-box reports exclusively for NetScreen devices, including:
Allowed Traffic reports: These reports contain detailed information on all the connections that pass through the NetScreen firewall into your network. These reports also identify traffic patterns and trends, helping you monitor and compare authorized traffic versus non-authorized traffic flowing across the network boundary.
Denied Traffic Connections reports: Similar to Allowed Traffic reports, these reports detail all the connections that are denied access to your network and provide NetScreen traffic patterns and trends as well. This information helps you monitor suspicious network traffic that crosses the network boundary.
Firewall User Logon reports: These reports list all the successful logons to the NetScreen firewall as well as the hosts and users with the most logons. There is also a report for identifying logon trends, helping you monitor user access to the system and track down privilege abuse.
Failed Logons reports: Similar to logon reports mentioned above, these reports list all the unsuccessful logons to the firewall. These reports detail the hosts and users with the most failed logons and identify failed logon trends, helping you identify suspicious activity occurring across internal network boundaries.
Firewall Account Management reports: These reports list all the changes made to admin accounts. The three categories of these reports—Admin Added, Admin Deleted, and Admin Modified—help you monitor admin activity and prevent possible privilege abuse.
Firewall Policy Management reports: These reports give a comprehensive list of all changes made to policies. This comprehensive list helps you identify suspicious activity occurring across internal network boundaries from either internal or external agents.
Firewall Intrusion Detection System reports: These reports list potential and past attacks, and identify the source and destination devices most frequently involved in attack attempts. This information helps you form a comprehensive analysis of all the NetScreen security breaches and vulnerabilities that happen within your network.
Firewall Security reports: These reports help you track changes made to firewall rules, and there are specific reports that detail your network policies, anti-spam, anti-virus, and web filters.
System Event reports: These reports identify your system's battery status, power supply, fan status, license status, and system temperature, helping you monitor and maintain most of the physical and electrical functionalities of your system.
You can also generate custom reports based on NetScreen log messages, unique identifiers, NetScreen VPN logs, and other information. Read more about NetScreen firewall-based traffic reports.
Why should you choose EventLog Analyzer for auditing NetScreen firewall logs?
- A user-friendly interface with an intuitive dashboard.
- Easily customizable report templates to meet internal policy needs.
- Custom compliance reports to fulfill growing compliance standards.
- Real-time email and SMS alerts on NetScreen configuration changes and events of interest.
- Secure, tamper-free log archiving.
- Powerful log forensics that enable robust searches, with many flexible options.
EventLog Analyzer lets you create device groups to collect and report on logs from NetScreen devices. This is useful when tracking event behavior and system performance for a select group of critical servers. Create different user profiles for accessing event logs and generating reports: Admin users have access to all features, while Guest users can only generate reports and retrieve archived event logs.