features

IT Admin Features


See what works best for you

Event Log Management

View and report on event log data in the most convenient and intuitive way possible. Centrally monitor Windows, Unix, Linux, switches, routers, and more by consolidating all of your event logs, syslogs and text-file-based logs in one place, then use filters and multi-level criteria to create powerful reports and receive notifications for events of interest. Templates allow you to quickly configure log management on new servers.

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Filtering

Powerful filtering logic allows you to create complex event filters to target or limit specific log entries or computers from real-time and consolidated log views, monitors and reports including by event type, flagged entries, hosts, log, and messages.

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Syslog Daemon

Using built in UDP and TCP syslog servers, you can collect, monitor, and consolidate syslog messages from both computers and devices such as network routers, firewalls, and Unix, Linux and AS400 servers. By default, when a message is sent from a device, the receiving syslog server automatically adds the device's IP or hostname to the Object Explorer. Once added, the message is saved to the Log Repository.

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Alerts

Receive alerts when noteworthy events occur. Alerts can be sent via email, SMS, or SNMP trap. Depending on the type of event you are alerting on, options are available that allow you to require a certain number of events to occur in a specified time period before an alert is generated. For example, if an Event 4726 is detected, indicating that a user account was deleted, that might not necessarily be important enough to alert on. However, if five of those events are detected in a ten minute period, it might be indicative of an issue requiring attention, and can trigger an alert..

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Actions

React to critical events with multiple types of actions including email notifications, process and service management, and SNMP traps.

  • Document Events - Document when specified thresholds are surpassed in a variety of ways. Write the details to a database, an event log, a text file, or a syslog. Create documentation of server and resource exceptions.
  • Automated Actions - Automatically respond to changes in your network and server resources. Windows services and processes can be programmed to start, stop, or restart as necessary. You can also write custom scripts to execute in response to events.
  • Complex Responses - Issue multiple actions when a condition is triggered, or once the services have recovered to an acceptable state.

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Directory Monitoring

Monitor an individual directory’s size and track its change over time. Monitor, log, and trigger alerts when a directory or file is created, modified, renamed, or deleted. You can also monitor the number of files a directory contains to see if it significantly increases or decreases.

Screenshots

Found In:

sm-64    Server Manager

Disk Monitoring

With one easy-to-navigate console, all of your disk resources can be viewed in one place. Keep an eye on critical resource information such as disk monitoring for space and changes, disk utilization, directory size statistics, largest file statistics, temporary file information, file/folder permissions and much more.

Effective and efficient utilization of disk resources is key in every department within an organization and ensuring proper management of disk space is critical to your business continuity plan. Running out of disk space can result in a loss of services, unproductive users, and potentially corrupt data. 

Screenshots

Found In:

sm-64    Server Manager

Website Monitoring

Monitor your internal and publicly-facing websites to ensure that they are available and responding to requests. You can monitor both HTTP and HTTPS, and even a specific page. Even if your website is responding, it doesn’t mean it is right; Veriato website monitoring has the ability to optionally look for text that the page should or should not contain and also validate your SSL certificate.

Don’t be the guy who lets your company’s domain expire. Automatically query WHOIS servers on a regular basis and check the date of domain expiration, and be proactively notified when the expiration date nears.

Screenshots

Found In:

sm-64    Server Manager

Protocol & Internet Monitoring

Monitor your internal and publicly-facing websites to ensure that they are available and responding to requests. You can monitor both HTTP and HTTPS, and even a specific page. Even if your website is responding, it doesn't mean it is right; Veriato website monitoring has the ability to optionally look for text that the page should or should not contain and also validate your SSL certificate.

Don't be the guy who lets your company's domain expire. Automatically query WHOIS servers on a regular basis and check the date of domain expiration, and be proactively notified when the expiration date nears.

Screenshots

Found In:

sm-64    Server Manager

Process & Service Monitoring

Monitor individual Windows services and processes, a process’ resource usage over time or even schedule a process or batch file to run.

Screenshots

Found In:

sm-64    Server Manager

Log Consolidation

Log Consolidation and Monitoring can be done in real-time, or on a user-defined schedule. Consolidated log entries can be flagged for later review. Isolate pertinent log entries by merging multiple logs into a single view, hiding duplicate entries and filtering the results. Leverage our log retention and archive options to ensure you keep the right amount of log data.

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Security Event Monitoring

Robust Security Event Monitoring empowers your IT resources to be immediately informed of issues regarding network and application security. Create alerts and reports about logon attempts and account issues, as well as any security-related event log or syslog entry.

Specific alerts and reports include:

  • Event Logs - Create a report based on any user-defined filter criteria
  • Failed Logons - Scan consolidated Security Event Logs for failed logon attempts
  • Successful Logons - Report on Successful Logons, such as identifying use of privileged accounts
  • Logon Sessions - Monitor and correlate logon and logoff events
  • Account Lockout - Report on locked out user accounts, identifying potential security risks
  • Account Management - Scan consolidated Security Event Logs for Account Management audit events, such as changes to local or domain accounts
  • New Accounts - Report on the creation of new user accounts

Review only relevant data. For example, Logon Reports can automatically exclude Logon Type 3 and SYSTEM logon/logoff events. This helps eliminate unnecessary reporting of network logons to shared folders and printers.

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Text Log Monitoring

Consolidate all text-file-based application logs, such as those generated by IIS, together and then monitor for specific entries to alert on..

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Reporting

The need to maintain accurate audit trails has never been greater. Veriato solutions provide the tools and data needed to get and stay compliant.

Understanding who is accessing systems and resources is critical. Get the detail you need to maintain security:

  • Track failed logon attempts, logon sessions, account management, new user accounts and object access
  • Create complex filters that support nested criteria to analyze and audit user access
  • Receive daily and weekly Security Event Log reports such as failed logons
  • Receive real-time notification of failed logon attempts, account lockouts and file access

Our reporting functionality has provided the detail necessary to meet many regulatory compliance standards for our customers, including:

  • PCI Data Security Standard (PCI DSS)
  • Sarbanes-Oxley Act (SOX)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Basel II
  • European Union Directive on Data Protection (EU DPD)
  • Federal Information Security Management Act of 2002 (FISMA)
  • Gramm-Leach-Billey Act
  • National Institute of Standards and Technology (NIST)
  • North American Electric Reliability Corporation (NERC)
  • SB1386 (California)
  • Turnbull Guidance 1999
  • UK Data Protection Act
  • USA Patriot Act

Screenshots

Found In:

lm-64    Log Manager sm-64    Server Manager

Resource Monitoring

Monitor Windows Servers or Workstations for excessive or extended CPU load and memory consumption. Store the history for any period of time, enabling you to view historical load and consumption data, empowering you to identify patterns of concern. The data can be saved to Microsoft SQL Server, MySQL, or Oracle, or if no database is available, our own fast binary format.

Screenshots

Found In:

sm-64    Server Manager

Registry Monitoring

Monitor changes made to the Windows Registry. By watching for specific changes to Windows Registry key values, you can be sure that no harmful or unintended changes are made to the Registry.

Screenshots

Found In:

sm-64    Server Manager

Database Monitoring

Verify Microsoft SQL, MySQL, Oracle, or ODBC database availability. Be able to execute statements, ensuring your critical databases are up and running. With Microsoft SQL, you can also monitor various SQL Server Performance Counters and be notified when their returned values are higher or lower than expected, potentially indicating performance issues.

Screenshots

Found In:

sm-64    Server Manager

Email Server Monitoring

Verify the availability of various email services, such as IMAP, POP3 or SMTP, to ensure that your email system is operational. Server Manager also includes an end-to-end email monitor, allowing you to specify both an SMTP server and a POP3 or IMAP server, and then verify that a serialized email message can be sent and then received on the other end.

Additionally, with Microsoft Exchange Server, you can monitor various Exchange performance counters and be notified when their returned values are higher or lower than expected, potentially indicating a performance issue.

Screenshots

Found In:

sm-64    Server Manager

Windows Performance Counters

Monitor virtually any Windows performance counter and be notified when the returned value is higher or lower than expected, which could be indicative of a performance issue. For example, you may wish to monitor performance counters such as the processor or disk queue length. You can store the returned values for however long you would like so that you can go back and review them later and look for trends.

Found In:

sm-64    Server Manager