Our Solution
Back
OUR SOLUTION
Capabilities
Predict, prevent, detect, and respond
How It Works
People, platform, and process
Use Cases
By threat, environment, or industry
Talk to a Cybersecurity Advisor
See how we deliver managed threat protection
WHY NETSURION
Back
WHY NETSURION
Key Business Benefits
Powerful yet practical cybersecurity
Industry Leadership
Perennial recognition for innovation
Customer Success
Driven to be your trusted partner
Partners
Back
PARTNER PROGRAM OVERVIEW
Partner Program Benefits
Our solutions are built for service providers
Become a Partner
Grow your cybersecurity practice
Insights
Back
VIEW ALL INSIGHTS
Articles
Read the latest from our blog
SOC Catch of the Day
Real stories of threats we reel in daily
Cybersecurity Q&A Videos
Answering your toughest cybersecurity queries
Webcasts & Events
Join us in-person or online to learn more
Company
Back
MEET NETSURION
Leadership
Meet our management team
News
Press releases and news stories
Careers
Check out our current openings
Contact Us
Talks to sales or support
MyNetsurion
Support
Partner Portal
Contact Us
Product Guides
Documentation
Latest Version Docs
Product Guides
Knowledge Packs
Software Updates
Version 9.x
Version 8.x
Version 7.x
Version 6.x
Supported Devices
Online Training
Online Help
EventTracker 9.x
Home
Customer Support
Product Guides
Latest Version
Product Guides
Feature Guides
How To Guides
Integration Guides
Hardening Guides
EventTracker 9.x
Anomalous Login Detection
Backup and Restore
Change Audit
Embed EventTracker Widget to an External Site
Event Correlator
EventTracker REST API
EventTracker Threat Center (ETC) Integration
EventTracker Application Control
MITRE ATT&CK
™
Remedial Actions
Two-factor Authentication (2FA)
EventTracker 8.x
Active Watch List and its Usage
Backup and Restore
Change Audit
Direct Log Archiver (DLA)
Event Correlator
EventVault Explorer
Log Search
Remedial Actions
EventTracker 7.x
Agent DLA
Backup and Restore
Change Audit
Collection Point Tool
Direct Log Archiver (DLA)
Event Correlator
EventVault Explorer
Log Search
Remote Indexing
Virtual Collection Point
XML API
EventTracker 6.x
Alerts
Categories
Event Filters
EventVault
Remedial Actions
Advanced Audit Policy Configuration – Quick Reference Guide
Anomalous Login Detection
Authenticate Clients with SmartCard
Configure Agent for Solaris BSM Events
Configure AWStats
Configure CheckPoint Logs
Configure Critical Service List Lookup
Configure Custom Columns
Configure Custom Error Settings in IIS
Configure DLA to Transfer Reports and Files
Configure Emerging Threat Blocked IP List Import
Configure EventTracker API Key Account
Configure EventTracker and ELC to access Archives and Reports on Different Computer
Configure IBlocklist BlueTack Bogon IP List Import
Configure IBlocklist BlueTack Hijacked IP List Import
Configure IBlocklist BlueTack Proxy IP List Import
Configure IBlocklist BlueTack Spyware List Import
Configure IP Reputation Lookup
Configure Non Reporting Systems Alert Report
Configure Port
Configure Session Timeout in IIS
Configure SQL DB Trace Files
Configure Syslog over TLS
Configure UK Settings
Configure Windows Syslog
Create Local Account and Active Directory Authentication
Detect Known Bad and Unknown Process
Enable Auditing on Active Directory Objects
Enable Auditing on MS SQL Server
Enable File and Folder Auditing
Execute Log Search via Command Line
Fix Crystal Report Error
Install Agent on Non English Systems
Install and customize IIS Web Server – v7.x
Install and customize IIS Web Server – v8.x
Install EventTracker Agent using EtaDataDispatcher Utility
Install EventTracker and Change Audit Agent (Agent MSI) v7.x to v8.2
Install EventTracker and Change Audit Agent (Agent MSI) v8.3
Install EventTracker and Change Audit Agent (Agent MSI) v9.0
Install EventTracker and Change Audit Agent (Agent MSI) v9.1
Install EventTracker and Change Audit Agent (Agent MSI) v9.2
Install EventTracker and Change Audit Agent (Agent MSI) v9.3
Install EventTracker Sensor - ETLM (v9.1)
Install EventTracker v9.0 without Internet Connection
Install EventTracker v9.1 without Internet Connection
Install EventTracker v9.2 without Internet Connection
Install Microsoft .NET Framework – v8.x
Install Microsoft .NET Framework – v7.x
Integrate EventTracker with ConnectWise
Integrate EventTracker with IT Glue
Monitor Alert Surge
Monitor Mobile Devices with ActivSync
Monitor Removable Media – v7.x
Monitor Removable Media – v8.x
Monitor Removable Media – v9.x
Monitor Suspicious Activity
Monitor USB device and CD/DVD for Linux OS Using rsyslog
Move CAB files to New Archives folder
Install MS SQL Server Express – v8.x
Install MS SQL Server Express – v7.x
Receive and Forward syslog events through EventTracker Agent
Secure IIS Web Server with Secure Socket Layer (SSL) – v8.x
Secure IIS Web Server with Secure Socket Layer (SSL) – v7.x
Track User Account Lockout
Transfer EventTracker Manager to New System - v9.x
Transfer EventTracker Manager to New System
Windows Advanced Audit Policy Configuration Complete Reference
Windows Agent Deployment on VMware Horizon Mirage Desktop
Windows User Logon Affinity
A10 ADC
Accellion Secure File Transfer
Active Directory
Active Directory Audit
Aerohive Wireless Access Point
AirWatch Mobile Device Management
Akamai Web Application Firewall
Apache Web Server
Amazon Web Services
APC Smart-UPS
Mac OS
Array OS
Aruba OS
Astaro Security Gateway
Aventail SSL VPN
Barracuda Firewall
Barracuda Message Archiver
Barracuda NextGen Firewall F-Series
Barracuda Spam Firewall
Barracuda SSL VPN
Barracuda Web Security Gateway
Blue Coat ProxySG
Carbon Black(Cb) Defense
Carbon Black(Cb) Protection
Centrify Server Suite
Check Point
Cisco 3750 Switch
Cisco ACS
Cisco Aironet AP
Cisco ASA
Cisco Catalyst Switch
Cisco Distributed Director
Cisco IOS
Cisco IronPort ESA
Cisco IronPort WSA
Cisco NAC
Cisco Nexus Switch
Cisco PIX and ASA Firewall
Cisco Router
Cisco SourceFire
Cisco Switch
Cisco VPN
Cisco WLAN Controller
Citrix Access Gateway
Citrix NetScaler
Clavister Firewall
Cyberoam UTM
Dell Force 10
Dell OMSA
Duo Security
eDirectory
EMC Isilon
ESET Antivirus
EventTracker Honeynet
EZProxy
F5 BIG-IP Local Traffic Manager (LTM)
FireWarning
FortiAnalyzer
Fortigate Firewall
Fortinet Firewall
Grizzly Steppe Detection
HA Proxy
HP ProCurve Switch
IBM AIX
IBM DB2 Universal Database
iboss Secure Web Gateway
IIS
IIS SMTP Server
Imperva SecureSphere
InfoBlox
Juniper JunOS
Juniper Netscreen
Juniper SBR
Juniper Secure Access VPN
Kaspersky Security Centre
Linux Audit Report
Linux OS
LOGbinderSP
LOGbinderSQL
Malwarebytes
McAfee ePolicy Orchestrator
McAfee Firewall Enterprise
McAfee Firewall Enterprise VPN
McAfee IntruShield IPS
McAfee Sidewinder Firewall VPN
Meraki Firewall
Meraki Switch
Meraki WAP
Microsoft Antimalware
Microsoft ActiveSync
Microsoft DHCP Server
Microsoft DNS Server
Microsoft DNS Server Advanced
Microsoft Exchange Server
Microsoft Forefront Client Security
Microsoft Forefront Threat Management Gateway
Microsoft 365
Microsoft SharePoint Server 2007-10
Microsoft SharePoint Server LOGbinderSP
Microsoft SQL Server
Microsoft Unified Access Gateway
Microsoft Windows DFS
Microsoft Windows Hyper-V
MySQL Server
Nessus Vulnerability Scanner
NetApp Data ONTAP
OKTA SSO
Open DNS
Open LDAP
Oracle Event Logs
Palo Alto Firewall
Percona Server MySQL
pfSense
PhoneFactor
PoliWall
Routing and Remote Access Service (RRAS)
Ruckus Wireless ZoneDirector
Solaris BSM
SonicWALL UTM Firewall
Sophos Enterprise Console
Sophos UTM
Suricata
Symantec Endpoint Protection
TeamViewer
Tenable.io
Teradata Database Server
Terminal Services Gateway
Text Messaging Using Textbelt API
TippingPoint
Trend Micro Deep Security
Trend Micro InterScan
Trend Micro OfficeScan
Vipre Antivirus
VMware ESX
WatchGuard XTM
Webroot
Websense Security Gateway (WSG)
Windows PowerShell
EventTracker v9.x Server
EventTracker v8.x Server
EventTracker Server
OWASP Compliance