Using Windows Event Collector
This document provides guidance on configuring Windows 2008 Server or Windows 7 or higher systems to forward selected events from their event log to another Windows system which acts as the Event Collector. EventTracker can then receive events from the Event Collector and properly distinguish each event.
Integrating Vulnerability Scanner Data with Eventtracker
The video session will show you how to integrate data from Vulnerability scanners such as Qualys, Nessus, Nexpose etc., into EventTracker and make the Vulnerability score available for risk calculations within EventTracker.
Determine and Control Log Flow
With this session you will learn how to determine how many event logs your systems are generating per day. This will allow you to set your filters so that you are getting only the necessary events in your archives.
How to Create Categories
This training session will instruct you how to create your own policy for monitoring. It will teach you how to create categories by selecting certain events based on predefined rules. EventTracker supplies hundreds of predefined categories but it also gives you the flexibility to create your own knowledge packs and reporting building blocks by creating custom categories.
How to Generate Reports with EventTracker
In this session you will get an overview of how to run on demand and how to schedule reports. You will see how to use custom categories as report templates.
How to Manage Groups
This short training session will teach you how to create and manage groups within EventTracker
How to Monitor CISCO Devices with EventTracker
This session will show how CISCO devices log information. It will also teach how to setup alerts and run reports against your CISCO devices.
How to Remove Systems from EventTracker
This short training session describes how to uninstall the EventTracker Agent and how to remove monitored systems from the System Manager.
How to Setup Alerts
This training session will show how to set up alerts in EventTracker. Alerting is critical to support monitoring conditions in real time. This short training session will help you with the rule builder, alerting strategies and notification.
How to Setup Filters
This session will introduce different filtering strategies to remove unnecessary events. It will show you various levels of filtering to optimize your event collection and long term storage.
Monitor File Access Activity
Learn how to track down who has been accessing files on your systems. Determine what was done to those files and track it back to the user logon.
Monitoring Admin Activities
This session will show how to track the activities of your Administrators and how to track when the Administrator account is used by anyone on your network, including domain and local admin accounts.
This training session will show how to monitor the logon/logoff activities for all your users. It will also show how to determine when your users are failing to log in.
Monitoring UNIX and Linux Systems with EventTracker
In this session you will learn how to monitor and alert on syslog data coming from UNIX and Linux systems. The session will also teach how to configure the syslog.conf file on the monitored system to get the needed information.