The log analysis software adds multiple function points:
1, increase the user's time password can enter their own, previously is the default password, and then you can login to modify.
2. Asset Management adds asset import function.
3, added alarm export function.
4, added three-party interface configuration, you can configure mail, syslog, SNMP trap. This enables the sending of alarm messages to third-party interfaces when a new alarm is generated.
650) this.width=650; "src=" Http://static.oschina.net/uploads/space/2015/0716/114429_U9k3_247205.png "style=" margin:0px;padding:0px;border:1px solid RGB (221,221,221); "alt=" 114429_u9k3_247205.png "/>
5. The alarm rule increases the editing function and increases the ability of the alarm to output the third-party interface. If it is Linux and configured in the asset IP, port, account, password, open up the firewall can be remote This is an attack source IP.
650) this.width=650; "src=" Http://static.oschina.net/uploads/space/2015/0716/113422_JmRX_247205.png "style=" margin:0px;padding:0px;border:1px solid RGB (221,221,221); "alt=" 113422_jmrx_247205.png "/>
6, increased the audit monitoring and system monitoring of two large modules.
Audit monitoring includes both the overall report and the log audit.
Overall monitoring. Including collection protocol distribution, log source ranking, attack alarm distribution and attack source ranking.
650) this.width=650; "src=" Http://static.oschina.net/uploads/space/2015/0716/112457_z2NH_247205.png "style=" margin:0px;padding:0px;border:1px solid RGB (221,221,221); "alt=" 112457_z2nh_247205.png "/>
Log audit mainly completed the Windows and Linux commonly used audit reports.
650) this.width=650; "src=" Http://static.oschina.net/uploads/space/2015/0716/115244_PF3H_247205.png "style=" margin:0px;padding:0px;border:1px solid RGB (221,221,221); "alt=" 115244_pf3h_247205.png "/>
7, increase the system monitoring function, system monitoring mainly includes system status and event monitoring.
The system state mainly includes the system CPU, memory, the use of the hard disk and the collecting alarm of the collector.
650) this.width=650; "src=" Http://static.oschina.net/uploads/space/2015/0716/115603_j7Wx_247205.png "style=" margin:0px;padding:0px;border:1px solid RGB (221,221,221); "alt=" 115603_j7wx_247205.png "/>
Event monitoring mainly monitors the number of events collected at all times.
650) this.width=650; "src=" Http://static.oschina.net/uploads/space/2015/0716/170957_L5KY_247205.png "style=" margin:0px;padding:0px;border:1px solid RGB (221,221,221); "alt=" 170957_l5ky_247205.png "/>
This article is from the "Zhulinu blog" blog, make sure to keep this source http://zhulinu.blog.51cto.com/539189/1685071
Seci-log 1.09 Publish Log analysis adds multiple reports and feature points