Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

We can help with installation, configuration, customization and training

Log data analysis for SIEM

Good security strategies include real-time event log monitoring for critical security incidents and periodic analysis of security-relevant logs. This enables you to detect suspicious activity and respond quickly. Monitor security-relevant policies, mechanisms (e.g., authentication, authorization, etc.), activity (e.g., privileged user activity) and applications (e.g., IDS, IPS, firewall, etc.) in real time.

Complete IT infrastructure monitoring and management

Unplanned system downtime ranges from a minor nuisance to a major catastrophe. Monitor the availability, functionality, performance and use of your IT assets – everything from network devices, workstations and servers to applications, business, infrastructure services and network protocols.

Log data consolidation for compliance

Most data security standards and regulations require that all relevant log data is managed, collected, consolidated and safely stored so that companies can prove accountability for the actions occurring in their workplace. GFI EventsManager provides three-layer log data consolidation accessible through two-factor authentication, forensic investigations capabilities and compliance reporting.

Security information and event management – SIEM

Protect against threats by detecting suspicious activity, monitoring security policies, security-related mechanisms (such as encryption, authentication and authorization), and applications (such as antivirus or firewall).

Active IT Infrastructure and operations monitoring

Actively detect IT issues using check-based and real-time monitoring of the availability, functionality, usage and performance of your entire network, from network devices, workstations and servers to applications, business, infrastructure services and network protocols.

Proactive monitoring based on log data

Get proactive in detecting problems before they occur and affect your business, simplify your IT management by having debug data from the assets that failed in the same console that sends the failure alert.

Forensic investigation

In case of litigation or security incidents, advanced filtering capabilities and drill-down log browsing enables advance forensic investigation of user and network activity.

Event log data centralization and consolidation for compliance

Prove accountability for the actions occurring in your IT environment by collecting, analyzing, normalizing and consolidating log data from across the network. Cover your event log data-related requirements of PCI DSS, HIPAA, SOX and more.

Makes sense of event log data – operational intelligence

Log data comes in high volumes and is cryptic by nature, but at the same time it contains loads of useful information about what is going on in your environment. GFI EventsManager interprets and translates log data, delivering operational intelligence and bringing visibility and insight into business operations.


Supports a wide range of log types such as Windows, syslog, text-based files, W3C, SNMP traps, XML, SQL Server and Oracle, etc., enabling monitoring of servers, workstations, network devices and applications.


Can comfortably report on over 2 billion log entries with average server hardware. Even works in highly distributed and secure environments, where there is no persistent connection between sites.


  • Processor: 2.5 GHz dual core or higher
  • RAM: 3 GB
  • Hard disk: 10 GB of available space

NOTE: Hard disk size depends on your environment, the size specified in the requirements is the minimum required to install and archive events.


Supported operating systems – server side

  • Windows Server 2016
  • Windows Server 2012 R2
  • Windows Server 2008 R2
  • Windows SBS 2011
  • Windows SBS 2008
  • Windows 10
  • Windows 8/8.1
  • Windows 7
  • Windows Vista SP1

Other components

  • .NET 4
  • Microsoft Data Access Components (MDAC) 2.8 or later
  • (Optional) A mail server (If email alerting is configured).

Software requirements - Scanned machine(s)

  • For Microsoft Windows event log scanning: Remote registry service must be enabled and source folders must be accessible via Windows shares.
  • W3C log scanning: The source folders must be accessible via Windows shares.
  • Syslog and SNMP Traps: Sources/senders must be configured to send messages to the computer/IP address where GFI EventsManager is installed.

Knowledge base

Browse the GFI EventsManager knowledge base.


Learn how to use GFI EventsManager

Deployment guide

Learn how to deploy GFI EventsManager

Configure IBM iSeries event collection with audit and ESM

This document explains how to configure and use GFI EventsManager to collect IBM iSeries (formerly AS/400) audit events through Audit, a software tool developed by Raz-Lee Security.

The need for effective event management

This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.

How to perform network-wide security event log management

This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LanGuard S.E.L.M. (now GFI EventsManager). It is written by Randy Franklin Smith, author of the in-depth series on the Windows security log in Windows 2000 and .NET Magazine.

SharePoint event collection

This document explains how to configure and use GFI EventsManager to collect Microsoft SharePoint audit events which have been processed by LOGbinder SP in order to make the information more readable and manageable.

GFI and FB Security Group does not do any form of refund. We encourage and highly recommend that you take advantage of their “Try before you buy” policy: Use the 30-day free trial period to thouroughly test and evaluate the product before purchasing.