Contents: • Enterprise Event Logging for Smbs

Contents: • Enterprise Event Logging for Smbs

May 2007 Contents: • Enterprise Event Logging for SMBs..............................2 • Vista’s ActiveX Installer...……………….............................5 • Toolbox: Icacls.......................................................…….....8 • Access Denied..................................................................11 • Reader to Reader: Tips to Secure Your Backup Tapes...............................13 May 2007 Security Pro VIP Enterprise Event Logging for SMBs These 6 tools solve your tough log collection and management needs By John Howie In recent articles, I described various tools you can including email messages, network messages, and use to ease the pain of event log collection and Short Message Service (SMS) alerts via a gateway. management (see the Windows IT Pro Web-exclusive In addition, EventsManager has event-filtering article “Collecting and Analyzing Event and System capabilities that include preconfigured event queries Logs,” March 28, 2006, InstantDoc ID 49492, and the as well as a query builder that lets you build your own Windows IT Security article “Security Log Collection,” queries to retrieve events of interest from consolidated November 2006, InstantDoc ID 93330). Small-to- logs. It also lets you color-code significant events. GFI midsized businesses (SMBs) have many free or EventsManager 7.0 requires Microsoft SQL Server inexpensive tools to choose from. However, SMBs 7.0 or later or Microsoft SQL Server Desktop Engine with sophisticated needs might want to consider (MSDE) to store collected events. a log collection and management suite from one of the many vendors that provide tools designed for Even if you’ve considered and discounted previous enterprises. Here are some enterprise-class tools you versions of EventsManager, I recommend you take might want to explore. another look, if you’re in the market for an enterprise event manager. The product is priced from $800 for GFI EventsManager 7.0 3 nodes to $32,000 for 500 nodes. Custom pricing is GFI EventsManager 7.0 (http://www.gfi.com/ available for more than 500 nodes and for consultant eventsmanager) boasts some impressive features licenses. and is a great improvement over its predecessor, GFI LANguard Security Event Log Monitor 5.0. Total Event Log Management Suite EventsManager supports Windows event logs, syslog, Dorian Software Creations offers a set of tools and World Wide Web Consortium (W3C) log files such under the name Total Event Log Management Suite as Microsoft IIS logs, but not Internet Authentication (http://www.doriansoft.com/totalsolution/index.htm). Service (IAS) logs. One tool in the suite is Event Archiver 6.0, which collects Windows event logs and stores them in a EventsManager provides rule-based event log central location or database; it doesn’t support IIS management that can be quickly deployed to filter out or IAS text log files or syslog. Event Archiver uses unwanted events and concentrate on those events that an agentless technology; a central server pulls event are pertinent to your situation. The latest version has logs from monitored systems. Event Archiver lets you an optimized, multithreaded event-processing engine group several computers together into administrative designed to improve event scanning performance domains to which you can apply policy settings and to support plug-ins. GFI claims the product can that can automatically archive specific and different process an impressive 6 million events per hour. types of events for each group of computers. Event Archiver predefines more than 100 events that you You can establish scanning profiles, which are used to can choose for collection. Collected log files can be configure rules for categories of assets. For example, stored in ODBC-compliant databases, and Event you can configure different sets of rules for servers Archiver supports the SQLOLEDB Provider for large and workstations and apply the rules quickly. A database import operations. generic profile can be applied to all assets and then supplemented with targeted profiles. You analyze stored logs by using another tool in the suite, Event Analyst 5.0. This tool lets you EventsManager makes the often cryptic and nearly search for specific events in stored event-log files or unreadable Windows event log entries more user databases. You can create HTML-based reports from friendly. It provides extensive reporting capabilities, consolidated logs by using prepackaged reports or including many predefined reports ranging from account dynamic, filter-based queries. usage and management reports to policy change and application management reports to trend reports. A third tool in the suite, Event Alarm 4.0, is a Windows EventsManager can notify systems administrators service that runs in the background and monitors and operators via a variety of real-time alerts, Windows event logs and syslog messages generated May 2007 Security Pro VIP 2 by network devices. It’s agentless and can monitor archived events can be generated in PDF, HTML, remote systems. A feature called False Positive Microsoft Excel, Microsoft Word, and other formats. Reduction lets you choose to ignore certain events Sentry II also lets you search consolidated event logs that are known to be irrelevant in your environment. by such items as event identifier, username, event Like Event Archiver, Event Alarm comes with more source, and description, and print, email, or export than 100 predefined events that administrators can the results to a document. Contact Engagent directly easily select to monitor. When events of interest are for pricing information. logged to a database, Event Alarm can notify systems administrators and operators via a number of means, ELM Log Manager including an email message, a network message, Another tool is TNT Software’s ELM Log Manager forwarding details of the event to a syslog server, 4.0 (http://www.tntsoftware.com/products/ and broadcasting over the network to administrators elmlogmanager.aspx), which can monitor Windows running Dorian Software Creations’ proprietary event logs, Microsoft ISA Server log files, IIS log notification utility. files, SQL Server error log files, and a number of other application log files, including custom log files, The last tool in the suite is Event Rover. This tool lets backup-software log files, antivirus log files, and static you filter and sort Windows event log entries into a tree HTML files. ELM Log Manager also supports syslog view for easier analysis. The tool can export log data and SNMP traps. ELM Log Manager uses an agent to HTML-format reports. Event Rover links to Dorian to collect logs and stores them in a SQL Server 7.0 Software Creations’ Web site, http://www.eventlogs. or later database, or MSDE. You can manage default com, at which you can research the meaning behind retention periods to optimize database usage. You individual entries in the Windows event log. can configure ELM Log Manager to fire off an alarm if a specific event is detected a certain number of times The Event Log Management Suite is priced at within a user-defined period, but you can also send $1,499.99 for five servers, 25 workstations, and an an alarm if an event is not detected a certain number unlimited number of syslog devices or for 0 servers of times in a user-defined period—a unique feature. and an unlimited number of syslog devices. The price rises to $2,99.99 for 5 servers and an unlimited A central console lets administrators view and search number of syslog devices. For pricing of other collected logs for events of interest. The tool ships combinations of servers and workstations, contact with predefined reports that let administrators quickly Dorian Software Creations directly. identify computer and user account creation and management activities, privilege elevation by users, Sentry II logon and logoff activity, object access to files and Engagent’s Sentry II (http://www.engagent.com/ registry subkeys, and Group Policy activity. ELM Log newsite/products/product_sentryII.htm) is actually Manager can also notify systems administrators and much more than simply a Windows event log, SNMP operators in real time via email, executed command trap, and syslog management package. It can scripts, network alerts, IM, syslog, SNMP, SMS, and proactively monitor TCP/IP and Windows services, several other methods. other running processes, and system performance. Sentry II monitors Windows systems from Windows TNT Software offers other tools that SMBs might find 95 through Windows Server 2003, with support for interesting, including ELM Event Log Monitor 4.0 and both 32-bit and 64-bit OSs. Sentry II can also monitor ELM Enterprise Manager 4.0. ELM Event Log Monitor UNIX and Linux servers and network devices by provides a subset of ELM Event Log Manager’s using SNMP traps and capturing syslog events, but it features for businesses that don’t require all the doesn’t provide support for IIS and IAS text log files. It features that ELM Event Log Manager provides. ELM uses agents running on Windows 2003, Windows NT Enterprise Manager contains all the features of ELM Server, or Windows 2000 Server to monitor systems. Log Manager and many more, including real-time monitoring of applications and services. Contact TNT Sentry II monitors events and can notify systems Software directly for pricing information. administrators and operators in real time via email, SMS, pager, SNMP, syslog, pop-up, and custom- EventTracker program alerts when critical events are logged. Prism Microsystems’ EventTracker (http://www.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us