- Table of Contents
- Related Documents
-
| Title | Size | Download |
|---|---|---|
| 00-Platform overview | 24.62 KB |
Platform overview
The Comprehensive Log Audit Platform collects massive security log data across the network. It allows you to store, back up, filter, and audit logs, configure alarm settings, and set actions to be taken for specific situations from a single management interface. It provides a range of statistics reports from which the administrators can gain insights into the overall security situation across the network and provide prudent management of logs through their entire life cycles.
Benefits
Diversified data collection
· Can collect massive logs generated by varieties of security devices, network devices, hosts, operating systems, and application systems.
· Can collect logs in real time through proactive and passive means.
· Supports centralized or distributed storage of massive logs and management of logs through their entire lifecycles.
· Can collect logs of different vendors by supporting log adaptation and log classification.
Comprehensive correlation analysis
· For multiple events in a time span, the system performs a comprehensive analysis based on correlation rules to identify security problems or potential threats from the viewpoint of the entire network.
· The administrator can identify security events that occur frequently according to the analysis result and perform targeted troubleshooting.
· Security event statistics and trends can be exported to a Word file for subsequent analysis.
Features
· Overview
Present an overview of the log sources, log count, and log statistics
· Log Center
Display all original logs collected by the platform.
· Event Center
Manage correlation rules and display detailed information about security events analyzed by correlation rules.
· Report Center
Display and export report files about security event by day, week, or month according to predefined report templates.
· Configuration
Configure basic system settings, including user privileges, system parameters, log sources, and collectors, and alarm policies.
