Server Monitoring with EventSentry
Features
EventSentry v4.2
New Features
Event Log Monitoring
SIEM to the core
Reporting
Health Monitoring
Compliance
ADMonitor
ADMonitor
Management
Log File Monitoring
Network
Enviroment
Environment
Notifications
Consolidation
EventSentry_logo_color_badge
Why EventSentry?
Downloads
Evaluation
Download EventSentry
EventSentry Light
EventSentry Light
Admin Assistant
Admin Assistant
SysAdmin Tools
Roadmap
Roadmap
EventSentry History
Version History
FREE
Fully Functional Evaluation
Download Now
Support
Knowledge Base
Knowledge Base
How-to Guides
How To's
Tutorials
EventSentry Screencasts
Screencasts
EventSentry Support
Request Support
EventSentry Documentation
EventSentry v4.2.3 Documentation
System32
Blog
Purchase
Product Sheet
EventSentry Pricing
Pricing
EventSentry Quote
Request a quote
Request Demo
Schedule a demo
Testimonials
Testimonials
Login
Download
Validation Scripts
Accounts: Block Microsoft accounts
Accounts: Limit local account use of blank passwords to console logon only
Accounts: Local Administrator account should be disabled
Accounts: Local Guest account should be disabled
Accounts: Rename Local Administrator and Guest Accounts
Attack Surface: Disable LLMNR
Attack Surface: Disable WinRM (Windows Remote Management)
Auditing: Policy subcategories should be enabled
Auditing: Removable Storage
Autoplay should be disabled for all drives
Autorun: Prevent AutoRun by default
check_last_file_modification.vbs
check_last_folder_write_activity.vbs
Covid-19
Data Execution Prevention (DEP) must be configured to at least OptOut
Directory Size: WinSxs\Temp\PendingDeletes
Domain Controller: IPv6 Should be enabled
Domain Controller: Permissions on the Active Directory data files must only allow System and Administrators access
Domain Controller: SYSVOL directory must have proper access control permissions
Domain Member: Digitally encrypt or sign secure channel data (always)
Domain Member: LDAP server signing requirements
Exchange Server Build Version Check (Exchange Updated)
file_size.vbs
General: AntiVirus Status
General: Windows Activation Status
General: Windows firewall status
Hyper-V: Virtual Disks Folder Free Space Under 2GB
iis_monitor_sites_pools.ps1
Internet Explorer: Check digital signature of executables
Internet Explorer: Software must be disallowed to run or install with invalid signatures
list_software_raid.vbs
Local volumes must be formatted with NTFS
Logon: Enable Display Last Logon Info
Logon: Require CTRL+ALT+DEL for interactive logons
Microsoft Edge: SmartScreen filter must be enabled
Microsoft Edge: Users must not be allowed to ignore SmartScreen filter warnings for unverified files
Microsoft Office: Check Activation Status
Microsoft Office: Determine whether macros are enabled
Network Access: Disable SMBv1
Network Access: Do not allow anonymous enumeration of SAM accounts and shares
Network Access: Restrict anonymous access to Named Pipes and Shares
Passwords: Enforce history
Passwords: Maximum Age
Passwords: Minimum length
Passwords: Storing LAN Manager hash
PowerShell: Logging should be enabled
PowerShell: Mitigating risks with Constrained Language mode
PowerShell: v20 should not be installed / enabled
Prevent users from making changes to exploit protection
Printing: Prevent users from installing printer drivers
Privacy: Windows location services should be disabled
Privacy: Windows Telemetry Should Be Disabled
process_duration.vbs
Secure Boot must be enabled
Services: List services containing a space in service path not enclosed in quotes
Solicited Remote Assistance must not be allowed
TLS/SSL Insecure Ciphers (SCHANNEL)
Tracking: The location feature must be turned off
Tracking: Windows Telemetry must not be set to Full
VirtualBox Tools
VMWare Tools
Windows Build Version Check (End Of Life)
Windows Build Version Check (OS Updated)
Windows Installer: Disable "Always install with elevated privileges" option
Knowledge Base
Documentation
Tutorials
Screencasts
Validation Scripts
Support Center