Huawei eLog

Huawei eLog

Unified Log Management and Quick Matching Capability

eLog supports multiple log collection modes, including Syslog, session, SFTP, FTP static file, FTP dynamic file, and Windows Management Instrumentation (WMI). Users can collect, classify, filter, summarize, analyze, store, and monitor logs reported from the application systems or NEs to help the administrator manage massive logs and learn NE running status, trace network user behavior, and quickly recognize and eliminate security risks.

eLog supports prompt notifications of key logs. The administrator can customize keywords, log type, and log level thresholds. When logs match customized keywords, log type, or log level, eLog generates alarms in real time and notifies users through SMS messages or emails.

Unified Security Log Management and Quick Matching Capability

eLog supports multiple log collection modes, including Syslog, session, SFTP, FTP static file, FTP dynamic file, and Windows Management Instrumentation (WMI). Users can collect, classify, filter, summarize, analyze, store, and monitor logs reported from Firewall to help the administrator manage massive logs and trace network user behavior, and quickly recognize and eliminate security risks.

eLog supports prompt notifications of key logs. The administrator can customize keywords, log type, and log level thresholds. When logs match customized keywords, log type, or log level, eLog generates alarms in real time and notifies users through SMS messages or emails.

Professional NAT Tracing and Automatic Association with User information to Meet Secure Audit Requirements

eLog collects and analyzes logs about sessions on NAT devices to obtain NAT information, including the IP address, destination port, NA T source IP address, and protocols. eLog uses the NA T information and the data source provided by the Authentication, Authorization and Accounting (AAA) server to ensure secure audit and traffic investigation.

Profound User Online Behavior Analysis

eLog works with Huawei USG devices to analyze user online behavior, including user traffic, online time, keywords, web access trends, emails, applications, network threats, and outgoing files.

Rich Security Event Analysis Reports Showing Network Security Status

eLog collects security event logs about network security devices and systems, analyzes them, and generates reports to help users learn the network security status. eLog supports DDoS attack event analysis, plug-in block analysis, access control event analysis, policy matching analysis, IPS analysis, URL filter analysis, and email filter analysis.

Million-level Log Processing per Second, Meeting Requirements of State-level Network Auditing

eLog meets the performance requirements of state-level network auditing and collects and audits millions of system logs in a second, supporting high-performance log collection, storage, and audit functions for large and ultra large networks.