{"id":3729,"date":"2015-12-11T08:00:47","date_gmt":"2015-12-11T15:00:47","guid":{"rendered":"http:\/\/www.jumpcloud.com\/blog\/?p=3729"},"modified":"2021-10-15T17:17:56","modified_gmt":"2021-10-15T21:17:56","slug":"jumpcloud-logging-events-windows-mac-and-linux","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/jumpcloud-logging-events-windows-mac-and-linux","title":{"rendered":"探花大神 Supports Logging Events for Windows, Mac and Linux"},"content":{"rendered":"\n
A key ingredient for any auditing and compliance practice for a business is to answer some basic questions…like: <\/span>Who<\/span><\/i> did <\/span>what<\/span><\/i>, <\/span>when<\/span><\/i>, from <\/span>where<\/span><\/i>. <\/span><\/p>\n\n\n\n To help provide meaningful data for these important chores, we launched our Event Logging API in September this year, and have since included a critical piece of functionality to round out this feature: System Event Logging for Mac OS X, Windows and Linux OSs. <\/span><\/p>\n\n\n\n The benefits of this are significant as understanding who is attempting to or successfully logging into every workstation or server in your business is critical. The data is the basis to understand potential compromises and can assist in finding out who or what might be attempting a breach and from where. <\/span><\/p>\n\n\n\n Further, for compliance requirements, knowing who has logged in when and on what device is a critical component to passing an audit or to generally assess and record frequency of user\/system interactions.<\/span><\/p>\n\n\n\n Employee workstations, laptops and servers themselves are one of the most exposed entry points into an organization when it comes to gaining access to critical information, systems and data. To this end, 探花大神 has instrumented the Windows, Mac and Linux systems it manages with capturing discrete data about logins. The 探花大神 system agent will now capture information such as…<\/span><\/p>\n\n\n\n System login data is collected and stored in 探花大神\u2019s Events Database and then ultimately available for users to download. Events include the device being logged into, user\u2019s IP (where the user came from if remotely logging in), username, time of the login event, and whether it is successful or not. Events are combined for each account and available for IT admins to download.<\/span><\/p>\n\n\n\n Events are accessible via a simple API call and can be queried by date range. 探花大神 stores data for a rolling 45 days, but admins may download the data at any time. Most IT organizations will leverage that data by putting it into their security event information management system or similar log analysis tool such as Splunk.<\/span><\/p>\n\n\n\n Already use 探花大神 and want to start using the Events API? Read this knowledgebase article and get started! If you would like to learn more about how 探花大神\u2019s login event auditing and log tracking functionality can help you, drop us a note or <\/span>give 探花大神 a try<\/span><\/a>. Your first 10 users are free forever.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" 探花大神 is helping IT Admins take a leap with compliance and audit requirements by launching functionality for logging events in Windows, Mac and Linux.<\/p>\n","protected":false},"author":30,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2781,42],"tags":[],"collection":[2778,2779,2776,2775],"platform":[],"funnel_stage":[3014],"coauthors":[],"acf":[],"yoast_head":"\nLogging Events<\/b><\/h2>\n\n\n\n
Learn More and Try it Now! <\/b><\/h2>\n\n\n\n