Enter value for atleast one primary component.

Thank you for your interest in Log360.

Please fill-up the form to get a personalized quote, that best suits your requirements. Our sales representative will get back to you shortly.

  • No. of Domain Controllers
  • No. of Syslog Devices

    (Firewalls, Routers, Switches, IDS/IPS, AS400, etc)

     

    Collectively specify the number of Linux/Unix devices, IBM AS400 systems, routers, switches, firewalls, IDS/IPS, and other syslog devices that you wish to audit.

  • No. of Windows Servers
  • No. of Windows WorkStations
 

Add-ons

  •  

    File Server Auditing - Monitor file and folder changes through effective file integrity monitoring techniques. Learn more..

    1. Windows File Servers
    2. Linux File Servers
    3. NetApp/EMC/Synology NAS
  •  

    Collectively specify the number of applications from which you want to collect and analyze the logs. This could be your Oracle,MySql database, Apache, DHCP, Terminal Servers, and more.

    1. IIS Sites
    2. MSSQL Servers
    3. Other Applications
  •  

    The Active Directory Reporting add-on provides key insights into AD and helps spot network security loopholes by delivering security reports on AD objects such as users, computers, security groups, OUs, GPOs, and more.

  •  

    AWS, Azure AD/0365 Auditing - Monitor every event happening in your AWS, Azure AD/0365 environment. Find out who performed any operation and when it was performed.

    1. Office 365 Tenants
    2. AWS Accounts
  •  

    UEBA helps identify, qualify, and investigate internal threats. Its core capabilities include anomaly detection, score-based risk assessment, and threat corroboration.

  •  

    This add-on helps you accurately identify and estimate the severity of threats posed by malicious URLs, domains, and IP addresses by corroborating data from third-party threat intelligence services.

  •  

    With this add-on, you can audit every admin and user activity in Exchange. Keep track of mailbox, database, DAG, and distribution list-related changes.

    1. Servers
By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.
 
Compare Models Here's a more detailed breakdown of all the services included in both plans to help you decide:
×
Log360 Service Offering Standard Onboarding Advanced Onboarding
Installation Tick Tick
Device management Windows Server - 25, WKS - 100, Supported Syslog Devices - 10 Tick
Application management - IIS, MSSQL, Other Applications Up to 1 each Up to 3 each
Technician management (role configuration)* Tick Tick
Log collection filter configuration Up to 2 filters Tick
Log retention policy settings Tick Tick
Configuring Windows/Linux-based file monitoring (basic configuration) 1 in each Tick
Tuning product administrative settings
1. Email and SMS server configuration
2. Configuring log collection failure alerts
3. Log forwarding
Tick Tick
Historic EVT/EVTX file import Tick Tick
Custom reports and alerts configuration (provided logs are available) Up to 1 each Up to 10 in total
Reports, alerts, and compliance schedule creation Up to 1 each Up to 10
Rule-based correlation setup (based on the feasibility/available logs) Up to 1 Up to 5
Compliance-specific reports configuration Cross Up to 1
UEBA: Custom alerts and reports set up* Up to 2 Up to 10
Configuring managed servers** Cross Tick
Log import scheduling Cross Up to 5
Dashboard customization Cross Up to 5
Security hardening & privacy
1. SSL configuration
2. Configuring TFA
3. GDPR Privacy Configuration
4. CAPTCHA
Cross Tick
Importing historical logs (supported format) Cross Tick
Database migration (PGSQL to MSSQL) Cross Tick
Advanced Threat Analytics configuration* Cross Tick
SOAR workflow configuration Cross Tick
Log360 search engine management Cross Tick
Risk score modifications for anomalies based on environment. Cross Tick
High availability configuration Cross Tick
Restoration of an available backup Cross Tick
Incident management configuration Cross Tick
Data migration (ES/archive) Cross Tick
Custom log parser rule configuration (subject to scope) Cross Tick
External threat feed configuration Cross Tick
Agent deployment (agent-level registry changes will be performed) Cross Tick
NAT configuration Cross Tick
Setting up Windows logging Cross Tick
Server migration Cross Tick
Expert consultation Cross Tick
Comprehensive documentation Cross Tick
User acceptance testing Cross Tick
Integrated walkthrough Cross Tick
Signing Cross Tick
Post-implementation health check Cross Tick
Supporting new log formats (subject to feasibility) Cross Tick
Additional custom correlation rules configuration (based on the feasibility/available logs) Cross Tick
Training (up to 4 participants) Available as an add-on Tick

* - if license is purchased

** - only for distributed editions and MSSPs

Note:
  • Only purchased sub-components of Log360 will be installed and configured.
  • The implementation of the above services are subject to fulfilment of client deliverables outlined in the scope of work (SOW).