Complete Event Log Viewing, Monitoring and Management.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

© 2010 Quest Software, Inc. ALL RIGHTS RESERVED Quests solutions for Windows Management Lee Elliott & Jonathan Culver – Technical Account Managers Windows.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Your Data Any Place, Any Time Manageability. SQL Server 2008 Manageability Challenges Challenges face database administrators today : Managing complex.
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
New Release Announcements and Product Roadmap Chris DiPierro, Director of Software Development April 9-11, 2014
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
Test Case Management and Results Tracking System October 2008 D E L I V E R I N G Q U A L I T Y (Short Version)
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
Complete Event Log Viewing, Monitoring and Management.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Privileged Account Management Jason Fehrenbach, Product Manager.
Overview of the technology that comprises Attendance Enterprise.
XProtect® Expert 2013 Product presentation
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Manageware For Documentum ESI SOFTWARE 2006
…your guide through terrain
1 ECM System Monitor in the CMOD Environment. © 2013 IBM Corporation Enterprise Content Management IBM ECM System Monitor Improve Availability / Lower.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Unified Logs and Reporting for Hybrid Centralized Management
Microsoft Virtual Server 2005 Product Overview Mikael Nyström – TrueSec AB MVP Windows Server – Setup/Deployment Mikael Nyström – TrueSec AB MVP Windows.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
System Center Operations Manager 2007 Dave Northey Microsoft Ireland.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Reducing TCO with Lifecycle Management
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
CSI-E Computer Security Investigator – Enterprise.
Ripple Technologies, Inc 7/98 LogCaster. Ripple Technologies, Inc 7/98 LogCaster NT Real Time System Monitoring.
Adra Match BALANCER: Balance Sheet Reconciliation Software Powered by the Microsoft Azure Cloud MICROSOFT AZURE ISV PROFILE: ADRA MATCH Adra Match develops.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 7: Fundamentals of Administering Windows Server 2008.
ABC Manufacturing Demonstration of Attendance Enterprise.
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
A Networked Machine Management System 16, 1999.
Overview Managing a DHCP Database Monitoring DHCP
Event Log View and Sentry Event Log Management Copyright 2002 Engagent, Inc.
System Center Operations Manager 2007 Overview Amit Gatenyo Infrastructure & Security Team Lead Dario.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
Jorke Odolphi Product Technology Specialist WebCentral Using Microsoft Operations Manager To Monitor And Maintain Your Farm.
Enterprise Messaging & Collaboration. e-Interact Modules.
©2011 Quest Software, Inc. All rights reserved. Quick, Scalable Restore of Granular Objects Recovery Manager for Active Directory.
WINDOWS AZURE AND THE HYBRID CLOUD. Hybrid Concepts and Cloud Services.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
I/Watch™ Weekly Sales Conference Call Presentation (See next slide for dial-in details) Andrew May Technical Product Manager Dax French Product Specialist.
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
2016 Citrix presentation.
Infrastructure, Data Center & Managed Services
Get to know SysKit Monitor
A 5-minute overview of ADAudit Plus
Backup Monitoring – EMC NetWorker
Your Data Any Place, Any Time
Presentation transcript:

Complete Event Log Viewing, Monitoring and Management

Event Log Sentry & View Functionality Summary Remote viewing of multiple event logs with filtering capabilities Real-time notification of critical events Automatic response to selected events Automatic event storage in MS SQL Database Automatic clearing and archiving of event logs Centralized management of Audit Policies and event log settings

Event Log Suite integration with Demandtech Software Out-of-the-box templates for viewing, monitoring, and managing specifics events generated by Performance Gallery/Performance Sentry When? May 2002

Event Log View Consolidated Event Log Viewing

When do you view your event logs? Best Practices requires Daily viewing Diagnostic Event Viewing when systems fail

Functionality of Event Log View Consolidated view of Event Logs Grouped machines for strategic viewing Complete event log information presented Detailed filtering capabilities Create and store custom filters Custom filters for 3 rd party applications (in development)

Why use Event Log View? Best practices requires daily viewing of all event logs. Event Log View makes it possible to satisfy best practices by streamlining and simplifying the viewing process Event Log View reduces the time and resources spent viewing event logs and, as a result, reduces the related TCO (Total Cost of Operations)

Event Log Sentry Centralized Event Log Monitoring and Management

Monitoring Functionality of Event Log Sentry Monitor event logs for critical events and receive immediate notification when they occur Multiple notifications in response to events (Pager, Cell phone, Blackberry, etc.) Popup Customizable messages in notifications, including macros (variables) Integrated templates for 3 rd party solutions

Automated Responses Ability to run two automated actions per event trigger Run console applications Run batch files Custom scripts

Why monitor your event logs with Event Log Sentry? Decrease administrative response time to critical events to prevent system failures Uninterrupted end-user productivity due to automated triggers Proactive Monitoring means: Reduces TCO associated with repairing system failures since problems are resolved before system failures occur Administrators time spent on priority projects instead of reactive repair and analysis

Automated Event Log Clearing with Event Log Sentry Schedule automated clearings for multiple event logs on non-production hours

Why Automate Event Log Clearing? Event logs never reach maximum capacity– no loss of information Reduces TCO since Administrative resources are not used to clear event logs

Event Log Archiving with Event Log Sentry Archives raw.EVT files to back-up server

Why do you need to automate event log archiving? Automation ensures that archiving occurs Second source of original event information for diagnostics and audit trail purposes Best Practices requires back up of all critical event log information

Storing Events in an SQL Database with Event Log Sentry Migrate specific events into SQL Database using native SQL Server API

Why store events in an SQL Database? Long-term data analysis Use standard reports with Seagate Crystal Reports or create customized reports Provides Audit trail Uses MS SQL Server proprietary API calls Faster than ODBC Non-interference with other SQL Clients that may be running

Managing Policy Settings with Event Log Sentry Centralized management of Event Log Settings and Audit Polices Regular scans of settings and ability to reset policies and settings according to selected template(s)

Why centralize Policy and Auditing Settings? Ensures correct event information is written to Security Log Enforces consistent conformance with corporate security policies across all machines

Managing Event Log Sentry Easy distribution of agents to servers or workstations in all domains. Template-based design so that changes to multiple machines are performed with ease Global templates and domain-level templates for simplified management

The Distributed Architecture of Event Log Sentry

How does Event Log Sentry Work? E vent Log Sentry Server for Database Migration and.EVT Backup E vent Log Sentry Admin Console on Admin workstation E vent Log Sentry Agents on any machine whose event logs will be processed

Benefits of Event Log Sentrys Distributed Architecture Design Centralized management Easily manages multiple domains Load Balancing for continued monitoring and management Efficient network/processor utilization Scalable for large enterprises

How scalable is Event Log Sentry? Test environment 50 Servers 200 Workstations Tasks Performed Monitoring selected events Migrating selected events Archiving

Test Environment Performance Used one Event Log Sentry Server Migrate Events Backup Logs Processor Utilization and Network Traffic Unaffected on all monitored machines (250) Processor Utilization on Event Log Sentry Server hovered around 3%Never higher than 7% Event Log Sentry Server also ran PDC and SQL Server

Conclusions from Test Environment I nstallations up to 500 Servers will only require two Event Log Sentry Servers for same performance as test environment O ne for Backup O ne for Database Storage

Planned for May 2002 Centralized Agent Template Storage with IIS Automatic Web Updates for 3 rd Party Agent Templates ODBC Compliance

Works with Windows 2000 NT Event Logs System Application Security Windows 2000 Active Directory Logs Directory Service DNS Server File Replication Service

Event Log Sentry and Event Log View Overall Benefits Immediately isolate and prevent system and security threats through real-time notifications and automated actions Research failures and breaches through an archived repository Increase network visibility to improve security and systems management Reduces TCO by reducing time spent viewing, monitoring, and managing event logs

Engagent Inc. Engagent th Ave NE Kirkland, WA (877)