Supported Products (Sample List) – May 2011LogRhythm is designed to support the collection, analysis, correlation, management and reporting of virtually any type of log source. Our list of supported log sources includes hundreds of commercially available devices, systems and applications as well as a myriad of custom devices and legacy applications.
Below is a sample of the more common types of log sources for which LogRhythm provides full normalization. The total list of log sources that from which Logs can be collected and managed is much broader that the list below. If you are seeking support for a log source type not listed below, support may exist or can be developed to meet your needs.
For any custom log source or device not currently supported for full normalization, LogRhythm can collect, archive and manage those logs out-of-the-box. Furthermore, LogRhythm provides customers with the capability to create full normalization within the application. Alternatively, LogRhythm professional services can develop support for you.
Access ControlCisco Secure ACSConSentry NACImperva SecureSphereRSA SecureID ACE Server
Anti-SpamProofpoint Spam Webfilter Spam Assassin
Anti-VirusBlue Coat ProxyAVClam Antivirus ESET Nod32 AntivirusKaspersky AntivirusMcAfee EPolicy OrchestratorSophos AntiVirus Enterprise ServerSymantec Antivirus Corporate EditionTrendMicro OfficeScan Antivirus Server
ApplicationBind DB2Epicor CoalitionFinacle CoreFinacle TreasuryGene6 FTP ServerJuniper Application Acceleration ApplianceLogRhythm AgentMeridianMicrosoft Windows Server Update ServicePatchLinkPrinceton CardSecureProFTPD
Riverbed ApplianceSiemens Radiology Information SystemSWIFTTandemTrade InnovationsVerint ApplicationvsFTP
Content Inspection/Filter Barracuda WebFilter Citrix NetscalerCode Green Networks Content Inspection ApplianceIBM WebsphereiPrism Web FilterSquid CacheWebDefendWebSense
Customer RelationsMicrosoft CRM
DatabaseIBM Informix Dynamic ServerMicrosoft SQL ServerOracle Database 10gOracle Database 11gOracle Database 9
Data Loss PreventionFidelis XPS
Directory ServicesWindows DFS Replication
E-Mail SecurityIronPort Email Security ApplianceMcAfee Email Security ApplianceMcAfee GroupShield – ExchangeTumbleweed Mailgate Server
E-Mail ServerBlackberry Enterprise ServerIBM Lotus Domino Enterprise ServerKerio Mail ServerMicrosoft ExchangePostfixSecure Computing IronMailSendmailSun Java System Messaging ServerZimbra Email
EncryptionSafeNet DataSecure i116 ApplianceVormetric Encryption Technology
File Integrity MonitorTripwire
FirewallApplicure DotDefenderAstaro Security GatewayBarracuda Spam FirewallCheckpoint FirewallCisco ASACisco Firewall Services ModuleCisco PIXCitrix Gateway ServerDialogic Media GatewayFortinet FirewallJuniper FirewallNetscreen FirewallNortel Firewall/VPNPalo Alto FirewallSidewinder FirewallSonic WallSygate FirewallSymantec Endpoint ProtectionWatchguard Firebox
2011
IDS/IPS Active Scout IPSAirDefense WIPSAirMagnet Network AssuranceCheckpoint IPS-1Cisco AIP-SSM IPS ModuleCisco IDSM-2 IDSCisco NIDSCisco Security AgentEnterasys DragonIBM ISS ProventiaJuniper IDS/IPSMcAfee Intrushield IPSMcAfee Network Access ControlNetwork Chemistry RF ProtectSnortSonicwall firewall/IDSSourceFire IDSTipping PointTop Layer IPS
Load Balancer Cisco ACE Load BalancerCisco CSS Load Balancer SwitchCisco Global Site SelectorCitrix NetScalerF5 BIG-IP Local Traffic Manager
Network ManagementBradford Campus ManagerForeScout Network Access ControlGeneric ISC DHCPInfobloxKeri Doors NetXtremeMicrosoft DHCP ServerMicrosoft ISA ServerMS System Center EssentialsMicrosoft System Center Operations ManagerMicrosoft System Management ServerX-NetStat
Operating SystemAIXAS/400 ServerBSD UnixCentOS Linux ServerGeneric LinuxHP OpenVMSHP-UXIBM iSeriesIBM ZOSIRIX
LinuxMac OSXNCR Unix System VNovell NetWareSnare Windows AgentSolarisSuse LinuxUbuntu LinuxUnix Tru64Windows 2000 ServerWindows 2000 WorkstationWindows 2003 Server EnterpriseWindows 2003 Server StandardWindows 2003 WorkstationWindows 2008 Server EnterpriseWindows Vista WorkstationWindows XP Workstation
Physical Security BioPassword
Point-Of-Sale IBM 4690 POS ControllerXPient POS CCA Manager
Remote Access Citrix Presentation ServerDefender Security Servers (DSS)Microsoft RAS Server
RouterCisco RouterEnterasys RouterHP Procurve RouterHP RouterJuniper RouterRUGGEDCOM RUGGEDROUTERWatchGuard Router
StorageEquallogic SANNetApp Filer
SwitchBrocade FC SwitchCisco SwitchDell Powerconnect SwitchEnterasys SwitchExtreme Networks Black Diamond SwitchFoundry SwitchHP Procurve SwitchJuniper SwitchNortel Passport SwitchNortel Switch
Unified Threat ManagerMcafee Secure Internet Gateway
VirtualizationMicrosoft Virtual Server 2005VMWare ESX ServerVMWare Virtual Machine
VOIPAvaya VOIP ServerCisco Call Manager VOIP Server
VPNAventail SSL/VPNCisco VPN ConcentratorF5 Firepass SSL/VPNJuniper Host CheckerJuniper SSL/VPNNortel ContivitySonicwall SSL-VPN 2000
Vulnerability Assessment McAfee Foundstone
Web ServerApacheApache TomcatBlue Coat Web Proxy ServerMicrosoft IIS
Wireless Access Airwave Management SystemAruba 5000 OS Cisco Wireless Control System
Wireless Access PointCisco Aironet Access PointSymbol WAPWS2000 Wireless Switch
2011