SolarWinds Log & Event Manager: Exactly as Advertised
March 15, 2019

SolarWinds Log & Event Manager: Exactly as Advertised

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with SolarWinds Log & Event Manager

SolarWinds Log & Event Manager is used by our company's IT department to monitor events on domain controllers in locations across the globe. The primary use is for account events, such as lockouts, disablement, and enablement to both user and computer accounts. It is a more proactive way to give attention to user account management. While not an originally intended use, the node health section also lets us know if a domain controller is not acting properly.
  • Monitors account lockouts and reports them with detail so that it is easier to solve this with end users.
  • Monitors and reports account disablement with detail to whoever disabled an account, for audit and accountability.
  • Also, monitors and reports account enablement with detail to whoever enabled an account, again for audit and accountability.
  • Flash-based UI can lag, HTML5 would be preferred
  • Availability for custom widgets, but you need a bit of training to get things done right unless you have time for trial and error.
  • It only knows what it knows for account lockouts. If a source machine isn't available in the Event Viewer ID that triggers the alert, it does not have any extra tools to help it determine the issue.
  • Increases productivity by pinpointing most account lockouts, allowing our helpdesk team to focus on other incoming issues
  • Provides details on account disablement for audit purposes.
Great for email alerts of account actions, such as lockout, enablement, and disablement. We engaged in a separate solution to track account creation. Other solutions are needed for the in-depth tracking of account lockouts if it doesn't involve a definite source machine on the network.

SolarWinds Security Event Manager (SEM) Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
10
Deployment flexibility
9
Integration with Identity and Access Management Tools
9
Custom dashboards and workspaces
8
Host and network-based intrusion detection
Not Rated