SlideShare ist ein Scribd-Unternehmen logo
1 von 11
1
SolarWinds®
Log & Event Manager
Workstation Edition
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
2
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Short of eliminating users, how can you effectively
protect your network against them? (remember, you need
end-users, they’re great job security)
3
Agenda
» Workstation Log Monitoring – Why it Matters
» Extending Your LEM Installation to Monitor Workstations
» LEM Workstation Edition Licensing & Pricing
» Helpful Resources for Additional Reading
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
4
The Importance of Monitoring Workstation Logs
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
A. To Protect Data and Prevent Data Loss!
Q. Why do I need workstation log & event monitoring?
• Internal threats and security risks introduced
by employees pose a very real problem
• Workstations are one of the more vulnerable
entities on your network
• Compliance requirements may mandate
monitoring of workstations
5
Key Use Cases for Workstation Log Monitoring
» Unauthorized users logging on to workstations
» Multiple failed logon attempts
» Use of unauthorized USB drives and other attached devices
» Launch of prohibited applications (IM, games, etc.)
» Changes to local accounts and groups
» System changes, such as installation of unexpected software
and changes to local policies
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
What are key workstation activities I should look for?
6
What is LEM Workstation Edition?
» It’s a new pricing model designed for SolarWinds LEM
customers to make workstation log management more
affordable than ever!
» Workstation Edition provides ALL the functionality of LEM
to help you cost-effectively collect, correlate, analyze and
store logs from a greater number of workstation nodes.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
LEM Workstation Edition is a way to extend your existing LEM install
7
Benefits of Using LEM Workstation Edition
» Extend LEM’s powerful log collection, correlation, analysis and
management functionality to cost-effectively cover more
workstations and protect against endpoint vulnerabilities.
» Monitor all workstation events in real-time:
 Security events – assists with monitoring and preventing
 Operational events – identify and troubleshoot performance issues
 Policy-driven events – analyze and report compliance and policy violations
» Take Action!!!
 Leverage Active Responses to automatically combat workstation security
threats in real-time—no human intervention required!
 Ensure your network stays protected against endpoint threats even when
you’re sleeping!
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
8
Windows® Log Management with LEM
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
» Use LEM Workstation Edition right alongside your existing LEM
license to monitor both your Windows servers and workstations
COST-EFFECTIVELY.
9
Useful Workstation-based LEM Active Responses
» Kill Suspicious and Unapproved Processes
 The Kill Process Active Response enables LEM to automatically kill a
suspicious or unapproved process by name or ID.
 This action helps protect against unauthorized, malicious, or otherwise
unknown processes from consuming system resources at the least or
propagating a virus that takes down the network at worst
» Disable Networking on Infected Workstation
 Use the Disable Networking Active Response to disable networking
on a workstation at the Windows® Device Manager level.
 This action is useful for isolating network infections and attacks, and
can be automated in a LEM rule, or executed manually from the
Respond menu in the LEM Console.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
LEM
10
Useful Workstation-based LEM Active Responses
» Remove Unapproved Users from Administrative Group
 LEM uses a Windows Active Response tool based on where you want
to remove the user(s) from—the domain level or local level.
 This action protects against elevated privileges that could allow a user
to access restricted resources or make harmful system changes
» Detach Unauthorized USB Device
 The Detach USB Device Active Response allows you to automatically
detach a USB or mass storage device from a workstation.
 This action is useful for allowing only specific, approved devices to be
attached to your Windows computers or detaching any device
exhibiting suspicious behavior.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
LEM
11
Supported Workstation Operating Systems
» LEM Workstation Edition supports the following client
operating systems and are known as Workstation Nodes:
 Windows XP
 Windows Vista®
 Windows 7
» All other data sources including Windows Server 2003, 2008,
2012 are part of LEM server license, known as Universal Nodes.
© 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.

Weitere ähnliche Inhalte

Mehr von SolarWinds

Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
SolarWinds
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
SolarWinds
 

Mehr von SolarWinds (20)

Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
 
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
 
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Extending Log Management to Desktop for LEM Users

  • 1. 1 SolarWinds® Log & Event Manager Workstation Edition © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 2. 2 © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Short of eliminating users, how can you effectively protect your network against them? (remember, you need end-users, they’re great job security)
  • 3. 3 Agenda » Workstation Log Monitoring – Why it Matters » Extending Your LEM Installation to Monitor Workstations » LEM Workstation Edition Licensing & Pricing » Helpful Resources for Additional Reading © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 4. 4 The Importance of Monitoring Workstation Logs © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. A. To Protect Data and Prevent Data Loss! Q. Why do I need workstation log & event monitoring? • Internal threats and security risks introduced by employees pose a very real problem • Workstations are one of the more vulnerable entities on your network • Compliance requirements may mandate monitoring of workstations
  • 5. 5 Key Use Cases for Workstation Log Monitoring » Unauthorized users logging on to workstations » Multiple failed logon attempts » Use of unauthorized USB drives and other attached devices » Launch of prohibited applications (IM, games, etc.) » Changes to local accounts and groups » System changes, such as installation of unexpected software and changes to local policies © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. What are key workstation activities I should look for?
  • 6. 6 What is LEM Workstation Edition? » It’s a new pricing model designed for SolarWinds LEM customers to make workstation log management more affordable than ever! » Workstation Edition provides ALL the functionality of LEM to help you cost-effectively collect, correlate, analyze and store logs from a greater number of workstation nodes. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. LEM Workstation Edition is a way to extend your existing LEM install
  • 7. 7 Benefits of Using LEM Workstation Edition » Extend LEM’s powerful log collection, correlation, analysis and management functionality to cost-effectively cover more workstations and protect against endpoint vulnerabilities. » Monitor all workstation events in real-time:  Security events – assists with monitoring and preventing  Operational events – identify and troubleshoot performance issues  Policy-driven events – analyze and report compliance and policy violations » Take Action!!!  Leverage Active Responses to automatically combat workstation security threats in real-time—no human intervention required!  Ensure your network stays protected against endpoint threats even when you’re sleeping! © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 8. 8 Windows® Log Management with LEM © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. » Use LEM Workstation Edition right alongside your existing LEM license to monitor both your Windows servers and workstations COST-EFFECTIVELY.
  • 9. 9 Useful Workstation-based LEM Active Responses » Kill Suspicious and Unapproved Processes  The Kill Process Active Response enables LEM to automatically kill a suspicious or unapproved process by name or ID.  This action helps protect against unauthorized, malicious, or otherwise unknown processes from consuming system resources at the least or propagating a virus that takes down the network at worst » Disable Networking on Infected Workstation  Use the Disable Networking Active Response to disable networking on a workstation at the Windows® Device Manager level.  This action is useful for isolating network infections and attacks, and can be automated in a LEM rule, or executed manually from the Respond menu in the LEM Console. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. LEM
  • 10. 10 Useful Workstation-based LEM Active Responses » Remove Unapproved Users from Administrative Group  LEM uses a Windows Active Response tool based on where you want to remove the user(s) from—the domain level or local level.  This action protects against elevated privileges that could allow a user to access restricted resources or make harmful system changes » Detach Unauthorized USB Device  The Detach USB Device Active Response allows you to automatically detach a USB or mass storage device from a workstation.  This action is useful for allowing only specific, approved devices to be attached to your Windows computers or detaching any device exhibiting suspicious behavior. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. LEM
  • 11. 11 Supported Workstation Operating Systems » LEM Workstation Edition supports the following client operating systems and are known as Workstation Nodes:  Windows XP  Windows Vista®  Windows 7 » All other data sources including Windows Server 2003, 2008, 2012 are part of LEM server license, known as Universal Nodes. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 12. 12 LEM Workstation Edition Licensing & Pricing » LEM differentiates workstation nodes from non-workstation nodes only in terms of pricing and NOT functionality. » Workstation node-based licensing model gives you the cost benefit of monitoring thousands of workstation logs at affordable and competitive pricing. » You can upgrade your existing deployment to cover workstations. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Refer to pricing and licensing details of LEM Workstation Edition here: http://www.solarwinds.com/OnlineQuote/LicenseCalculator.as px?productid=27&region=NA
  • 13. 13 Helpful Resources » For Additional Reading:  Why & How of Monitoring Workstations with Log & Event Manager  Why Workstation Log Management is Crucial For Network Security  Useful Active Responses to Combat Workstation Security Threats  Workstation Log Management Made Easy with the New LEM 5.6 © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 14. 14 Trademark The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide, LLC, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks, registered or pending registration in the United States or in other countries. All other trademarks mentioned herein are used for identification purposes only and may be or are trademarks or registered trademarks of their respective companies. © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 15. 15 Thank You! © 2013 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.