Please write us at email@example.com if you are a partner or a customer and would like to gain access.
Contact our support team:
End-User License Agreement
This series of How To videos shows the new features that came along with the release of LogPoint 5.5 (please note, no audio). For general How To videos and videos of new features from previous releases, please scroll further down.
The release of LogPoint 5.4 includes no less than three major new features, which you can have a look at in the How To videos below (please note, no audio). For general How to videos and How To videos of features in version 5.3, please scroll further down.
1. Proxy Device Support - 00:09:40
LogPoint can now collect logs through a Proxy Server. Logs from multiple devices connected to a single Proxy Server can be collected in LogPoint.
The Syslog Collector has been extended to support Proxy Servers. This enhancement can be accessed via the “Use as Proxy” or “Uses Proxy” feature.
Numerous Proxy Servers and Proxy Devices can also be added in bulk using the Import CSV file feature.
2. Syslog Forwarder - 00:05:22
It is possible to push logs of selected devices from one LogPoint to another in air-gapped environments in an unencrypted format.
The Syslog Forwarder mode is specifically designed to have a minimal user interface. In this mode, functionalities such as adding remote syslog targets and importing devices, normalizations and repos are available.
The main LogPoint has the ability to recognize the normalized data coming from the Syslog Forwarder and store them directly in the specified repository.
The process of exporting a configuration file (from the main LogPoint) and importing the same file (on the Syslog Forwarder) is necessary to maintain the same configuration on both the sides. This is required to configure the Syslog Forwarder to collect logs from devices set up in the main LogPoint.
3. Enhancement with Timestamp Usage - 00:03:00
Users can search logs on the basis of actual log-generated time, which is captured in the Log Timestamp (
As logs are stored on the basis of log-collected time, which is captured in the Collection Timestamp (
col_ts) field, the ‘Over Scan Period’ is required to search logs if the search has to be carried out on the basis of
log_ts. The Over Scan Period covers the time gap between the Log Timestamp and the Collection Timestamp.
Each device is configured with Time Zone selected when adding the device. If the Time Zone information is not present in the logs, the system uses the Time Zone configured for the device.
This series of How To videos shows the new features that came along with the release of LogPoint 5.3 (please note, no audio). For general How to videos, please scroll further down.
With LogPoint, you will discover a full enterprise SIEM solution.
LogPoint is EAL 3+ certified and the solution is tailored to solve the specific security management challenges of your business - whether the goal is compliance, forensics or operational insight.
And the best part..? We have the most predictable licensing model in the industry.