LOGbinder Blog

Updates, Tips and News   RSS Feed  

«  Supercharger for Windows ... | Exchange Cumulative Updat... »

A new tool for unleashing the power of native Windows Event Collection arrives February 23

Thu, 02 Feb 2017 11:40:23 GMT

With today's endpoint-focused attack methods, it's never been more important to get security logs from every single computer on your network.

Windows Event Collection is baked into the OS itself and it's just waiting to be used. (Already a big believer in WEC? Read on, we've got a very big announcement for you.)

Very, very few organizations currently monitor the Windows Security Log on every server, desktop and laptop on the network and it's easy to understand why when you consider these facts:

  • Security logs are huge. Multiply huge by the number of endpoints and you get “extremely huge”
  • Many SIEM (e.g. ArcSight) and log management solutions (e.g. Splunk) charge based on volume of logs consumed
  • Remote log collection is prohibitively inefficient and, ironically, opens up security issues
  • Agents = Resistance. Admins don't want agents on their systems. Agents use resources. Agents have to be monitored and cared for. Agents have to be updated.

Windows Event Collection to the rescue

WEC provides the power of an agent with a zero-footprint and completely hands-off control. Leveraging Active Directory, we can cause any number of endpoints to forward their most important security events to the Windows event collector of our choice – or in very large organizations we can distribute that load across multiple collectors as necessary.

At that point, whether you use agents to push events or WMI/RPC to pull events, the burden of getting these events into your SIEM or log management solution now drops from thousands of systems down to a handful.

WEC also gives you options to deal with the size issue of event logs. Even with WEC's ability to bring event logs to your SIEM's doorstep, maybe you can't afford to upgrade the hardware and licenses necessary to handle that influx of log data. Or maybe your SIEM's scalability tops out at a certain point. One of these is the situation for most enterprises.

Then it's time to acknowledge that the majority of security log data is noise and leave that noise behind. With the power of advanced Xpath queries you can filter out the noise and get the much smaller number of important events. That requires specialized knowledge of Xpath and the Windows security log but read on.

In this deeply technical, real training for free ™ webinar at UltimateWindowsSecurity.com, Randy Franklin Smith will implement Windows Event Collection live and demonstrate how to:

  1. Target endpoints at your Windows Event Collectors
  2. Set up a Windows Event collector
  3. Create a subscription on the collector
    1. Scoped to a certain group of computers as forwarders
    2. Includes advanced filtering of noise events
  4. Monitor the subscription as source computers begin to forward events
  5. Troubleshoot problem forwarders

As great as WEC is, it's still just a foundation technology that lacks enterprise management, monitoring or reporting or features for scalability like load balancing. It's time to change that. After this detailed tour of Windows Event Collection, we will introduce a new and unique solution for managing this foundation technology in Windows. The product is Supercharger for Windows Event Collection. Supercharger automates every aspect of Windows Event Collection from:

  • configuring collectors
  • the creation of subscriptions
  • advanced filtering that safely ignores the noise without also suppressing important events

To advanced enterprise features like

  • load balancing large environments across multiple collectors
  • 24/7 health analysis and monitoring of every event source computer
  • performance monitoring and capacity planning – all from one pane of glass

We will demonstrate Supercharger and make it available for immediate trial download.

We are very excited about the release of Supercharger and we can't wait to help you improve security, increase endpoint vigilance while lowering costs. Please join us! Click here to register.

Comments disabled

powered by Bloget™