To manage and correlate Files and Folders, click here.

To enforce concurrent Logon and Generate Logon Reporting, click here.

With Sentry II you can easily:

1.        Manage the configuration of your Servers

2.        Perform event correlation over multiple Servers and network devices

3.        Monitor the performance of your Servers and network devices

4.        Conduct an analysis of your Servers for Capacity Planning

5.        Meet your specific compliance needs

6.        Manage your critical applications

7.        Manage the content of your logs

8.        Archive your logs to a centralized location

9.        Use the viewer to investigate critical events

10.      Generate compelling reports based on the status of your Servers

11.      Generate real-time notifications when critical Server failure events occur

12.   Network Status Display

Technical information:

Sentry II can actively monitor:

a. Windows 95, 98, NT, 2000, 2003, XP and 64-bit operating systems

b. Unix and Linux servers via SNMP trap and Syslog messages, and open ports

c. Network Devices: Firewalls, routers, hubs, switches, print servers and more via SNMP trap and Syslog messages, and open ports.

Sentry II Server runs on a Standard Windows Server:

a.      Sentry II can run on a Windows NT, 2000, or 2003 server.

Sentry II uses an ODBC database to store server information:

a.      Choose between Microsoft SQL or Access for your database.

b.     The database enables you to easily search for your critical information.

c.     Pre-configured reports are available within Sentry II to enable you access to your data without technical database knowledge.

d.     The database is configured intuitively to make reporting easy.

1.     How Sentry II manages server configuration:

a.      Track Port uptime (HTTP, Telnet, FTP and more!)

b.     Track Service uptime on all Windows platforms (all services)

c.     Prevent specific Services from running

d.     Track running Processes

e.      Prevent specific processes from running

f.       Track file content and discover “Who touched what file”

g.     Current Installed Hardware listing

2.     Event Correlation with Sentry II:

a.      Query of Event Logs, SNMP traps or Syslog messages over multiple servers

b.     Set watch conditions to alert you in real time when specific events occur. 

3.     Monitor the Performance of your Servers and Network Devices:

a.      Collect Windows and SNMP counters from your Servers and Network Devices

b.     Store the information in the Sentry II database to perform analysis over time

c.     Use the Watch feature to alert you when specific thresholds are breached (i.e. free space on drive C:\ below 20% or Processor Utilization above 70%)

4.     Capacity Planning with Sentry II:

a.      Monitor your individual processes to ensure they are not “hogging” your Server resources

b.     Collect Windows and SNMP counter data over time to perform trending and discover when upgrades and new equipment is needed

5.     Compliance with Sentry II:

a.      Sarbanes-Oxley (SOX)

b.     Health Insurance Portability and Accountability Act (HIPAA)

c.  Nispom

d.  NIST

6.     Managing your critical Applications with Sentry II:

a.      Monitor your applications at the Service, Process or Port level

b.     Use our watch feature to send alerts when your application is not functioning properly

c.     Use our watch feature to restart the application’s process or service automatically whenever it stops.

d.     Use our watch feature to schedule an application to run and alert you if it fails.

7.     Managing the content of your logs:

a.      Archive your Event Logs and Syslog Messages in an unmodified state and search them quickly and easily from the Sentry II viewer.

b.     Report on and Export your Current, Monitored (Event Logs with a watch associated with them) or Archived event logs

c.     Use our watch feature to be instantly aware of your critical event log messages.

8.     Archiving your logs with Sentry II:

a.      Store your Event Logs and Syslog Messages in an Unmodified State

b.     Search over 2 million archived records in under 20 minutes!

9.     Searching for critical events with the Sentry II Viewer:

a.      Search your events based on log type, event id, user, source, description and more

b.     Export, email or print your search results

10. Generating compelling reports with Sentry II:

a.      Intuitively designed graphical reports in just a few clicks!

b.     Export your reports to: PDF, HTML, Excel, Word, and many other formats

11. Real-Time notification in Sentry II:

a.      Receive real time notifications on critical events via: email, pop-up, program executable, text message, pager, SNMP Trap, Syslog message and more!




Download Sentry II


Release Notes

User Manual
Event IDs
Evaluating Automated Security Tools
Sarbanes-Oxley Compliance
Why you should monitor your event logs

White Paper

Event Log Management Cost Justification


Customer Endorsements

© 2002-2007 Engagent