This screencast will walk you through a typical EventSentry installation and explores the different configuration options available during the setup.
Explores the layout of the management console and explains how to configure the available monitoring options (including groups, filters, health objects and notifications) from a high level.
Shows how to configure EventSentry's filters to forward events to a notifications (e.g. email) or how to consolidate events into a database. The screencast also explains how to exclude unwanted events.
Shows how to use the filter timer feature to avoid unnecessary alerts. In the screencast we utilize filter timers to avoid service status change alerts, which usually result in two alerts.
An in-depth look into EventSentry's Disk Space Monitoring. Explains how to configure disk space monitoring and how to use the Web Reports to view various disk reports, such as disk space trends and disk space status reports.
Shows how to configure heartbeat monitoring to monitor the uptime of remote hosts and/or TCP-based services. The screencast also explains how to setup advanced features such as WAN-options and maintenance schedules.
The screencasts in this chapter first show you how to monitor any Windows performance counters to create alerts and consolidate performance data in the EventSentry database. The last tutorial explains how to use the web interface to create various reports about performance data.
Describes how to monitor Windows services and drivers to create alerts, and also points out how to track service status changes in the EventSentry database. The tutorials also explain how to monitor processes on a system.
An in-depth look in to EventSentry's Tracking features that let you track Windows Processes, user logons and print jobs.
Provides a detailed overview of File monitoring in EventSentry. Walks you through how to configure monitoring for checksum changes, file additions and file deletions.
A look into how to configure EventSentry to monitor your critical log files. Discusses the differences between Simple and Delimited log files and how EventSentry can be used in either case.
Vulnerability scanning is an absolute must, and this screencast will show you how to completely automate this process using Nessus(c) and EventSentry. The screencasts covers the installation and configuration of Nessus, how to integrate Nessus into the EventSentry Reporting interface and conclude by showing you how to automate vulnerability scanning using the Windows Task Scheduler.
Backing up event logs in their native .evt format can increase security on your network, especially when used in combination with database consolidation. Learn how to setup centralized event log backups with minimal effort, including how to setup a secure centralized file share with minimal effort. The screencast also points out how to avoid common pitfalls with security permissions.
Domain controllers and member servers are obviously critical to security log monitoring but there are many things you can only track by monitoring end-user workstation security logs.
In this webinar, Randy will explain why the Windows network architecture makes workstation security log monitoring so important. Randy will show you why you need to monitor workstation logs if knowing what your users are doing is really important.
Remember, insider threats account for more security related losses than external intruders. Randy will paint the big picture and then reveal specific event IDs you should look for to track end-user activity such as program execution, software installation and the only way to accurately determine when a user logged off their workstation.
Extend the built-in system health monitoring capabilities of EventSentry by executing any script from the built-in Application Scheduler feature. This screen cast will use a VBScript that monitors all IIS web sites as an example, and we will show you how to integrate this script with EventSentry.
iService is a web-based email response and workflow system which seamlessly integrates with EventSentry. Alerts generated by EventSentry are securely submitted to iService via HTTPS, where they are routed to the appropriate help desk agent for resolution and/or escalation in real-time. iService also offers contact management, knowledge base, email marketing and other capabilities.