top of page


Public·48 members

Solarwinds Log %26 Event Manager LINK


How to Use Solarwinds Log & Event Manager for Security and Compliance

Solarwinds Log & Event Manager (LEM) is a powerful and affordable security information and event management (SIEM) solution that helps you monitor, analyze, and respond to security events in real time. With LEM, you can collect and normalize logs from various sources, detect threats with built-in rules and correlation engine, and automate responses with active responses and notifications. LEM also helps you demonstrate compliance with various regulations and standards by providing predefined reports and dashboards.

In this article, we will show you how to use LEM for some common security and compliance scenarios, such as:

Monitoring user activity and detecting unauthorized access

Identifying malware infections and compromised systems

Alerting on suspicious network activity and potential data breaches

Generating compliance reports and audits

Let's get started!

Monitoring User Activity and Detecting Unauthorized Access

User activity is one of the most important sources of security events, as it can reveal insider threats, account compromise, privilege escalation, and data exfiltration. LEM can help you monitor user activity across various systems and applications, such as Active Directory, Windows servers, Linux servers, databases, web servers, firewalls, VPNs, and more. You can use LEM to track user logons, logoffs, failed logins, password changes, account lockouts, group membership changes, file access, registry changes, process execution, service changes, and more.

LEM can also help you detect unauthorized access by using its built-in rules and correlation engine. LEM comes with hundreds of predefined rules that can alert you on various indicators of compromise (IoCs), such as:

User logging in from multiple locations or devices

User logging in outside normal hours or from unusual locations

User accessing sensitive files or folders

User performing administrative actions or changing permissions

User creating or deleting accounts or groups

User installing or running unauthorized software

User sending or receiving large amounts of data

You can also create your own custom rules to suit your specific needs and environment. For example, you can create a rule that alerts you when a user logs in to a critical server or database that they are not authorized to access.

When LEM detects a rule violation, it can trigger an active response or a notification to help you respond quickly and effectively. An active response is an automated action that LEM can perform on the source or destination of the event, such as blocking an IP address, killing a process, disabling an account, or sending an email. A notification is a message that LEM can send to you or other stakeholders via email, SMS, syslog, SNMP trap, or ticketing system.

Identifying Malware Infections and Compromised Systems

Malware is one of the most common and dangerous threats to any network. Malware can infect systems through various vectors, such as phishing emails, drive-by downloads, removable media, network shares, or exploits. Malware can also spread laterally within the network by exploiting vulnerabilities or stealing credentials. Malware can cause various damages to your systems and data, such as encrypting files for ransomware, stealing sensitive information for data theft,

exfiltrating data for espionage,

or launching attacks on other targets for botnets.

LEM can help you identify malware infections and compromised systems by using its built-in rules and correlation engine. LEM can detect malware-related events from various sources,

such as antivirus software,


intrusion detection systems (IDS),

intrusion prevention systems (IPS),

and endpoint detection and response (EDR) tools.

You can use LEM to monitor events such as:

Antivirus alerts on malware detection or removal

Firewall alerts on blocked or allowed traffic from known malicious sources or destinations

IDS/IPS alerts on sign


Welcome to the group! You can connect with other members, ge...


bottom of page