Get access to immediate incident response assistance.
Eliminate active threats with 24/7 threat detection, investigation, and response.
Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.
Advance your cybersecurity program and get expert guidance where you need it most.
Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.
Prevent unauthorized access and exceed compliance requirements.
Stop email threats others miss and secure your organization against the #1 ransomware attack vector.
Prepare for the inevitable with 24/7 global breach response in-region and available on-site.
Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.
Windows Log Monitoring monitors Windows Event Logs on the host and specified plain text files on the host for events allowed by Trustwave’s SIEM (Security Information and Event Management) product. WLM collects, filters, and then forwards events from its data sources in an XML format at a configured interval or queue size (5 minutes or 30 events by default) to the Agent Messaging Server (AMS) which passes the message onto a SIEM database. SIEM identifies which events are important and logs them. Those events are collected into a report in the MSS application under Security Activity in the L4 portal.
WLM is not available for Linux systems.
To contact Trustwave about this article or to request support: