Solution Brief: Privileged User Monitoring and Audit using EventLog Analyzer
The privileged users of enterprise IT network (System Administrator, Network Administrator and Database Administrator) have more powers than ordinary users of network. They are responsible for keeping the system available. They will have the powers to create new user profiles and assign privileges. Also, add or change privileges to existing users and remove users.
With more privileges, number of cases of misuse by the users is increasing. To monitor the privileged user is painful for any organization. Because, they are the one whom you rely on the smooth functioning of the network. But, it is slowly turning to be inevitable. Even the compliance regulations demand the privileged user activities are monitored. You like it or not, you have no option but to monitor their activities, without impacting productivity.
EventLog Analyzer provides you with the much wanted PUMA reports. It closely analyzes the user activity and generates the reports. It generates graphical reports for host wise user activity events and user wise activity events. The graphical reports gives the visual picture of the user activities and can be drilled down to raw log level. You can export the reports to PDF and CSV formats. You can also customize this report to suit your requirement.
User Activity Overview report display the user activity events for a specific host or group of hosts. You can select a specific host of host group. The following events are displayed in the report graphically:
User Logons, User Logoffs, Failed Logons, Successful User Account Validation, Failed User Account Validation, Audit Logs Cleared, Audit Policy Changes, Objects Accessed, User Account Changes and User Group Change.
User Based Report display the user activity events for a specific user or group of users. You can filter for selected hosts, users and events. The following events are displayed in the report graphically:
User Logons, User Logoffs, Failed Logons, Successful User Account Validation, Failed User Account Validation, Audit Logs Cleared, Audit Policy Changes, Objects Accessed, User Account Changes and User Group Change.