Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.
170d528a300aa2f1792277680a460ba822c427433349e63d2a245318f6e0bfa1
Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.
8116398679eccdbf701b7ebca4b67fe6ccad023fff3124c4e36a8accaf56bfa9
Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.
0c323cfcd78aabc9d13d858b0c0cef01c3baacfd55ec7c052caf1f70399bd2ad
Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.
8ea069973658ec38364825e8c6aab694b935017b10a5c89e15c9b3f2ae2ec6dd
Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.
fb722ddc9b901ff8165599523162a4808abb71c7014e7eee6649b81b486fe487
Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.
8c0430d579bab11eaa1f923ffc2abab4bcfb5db6116cf7099435f580ea7267d3
Logcheck helps spot problems and security violations in your logfiles automatically and will send the results to you in e-mail.
dfe4cb29305c619dc0a0aca5b11b2bd397baccf3076b48f03457f66f299ab42e
Logcheck will automatically monitor your system logs and mail security violations to you on a periodic basis. Freeware clone of the logcheck program shipped with the TIS Gauntlet Firewall system
58c20f0c1793b182aae240d8d003f22efbb7d3886dc38e836a6ee94d33422775