{"id":23296,"date":"2022-06-07T06:45:48","date_gmt":"2022-06-07T10:45:48","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=23296"},"modified":"2022-10-11T02:19:14","modified_gmt":"2022-10-11T06:19:14","slug":"auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/","title":{"rendered":"Auditing Capabilities in IT Monitoring Tools for Security and Compliance"},"content":{"rendered":"<div class=\"inner_content\">\n<h2><span class=\"ez-toc-section\" id=\"Logging_and_Auditing_in_IT_Monitoring_Tools\"><\/span>Logging and Auditing in IT Monitoring Tools<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It is critical that access to any configuration changes or management actions made to monitoring platforms are logged and traceably audited. In this article, I will help you learn how to discover the auditing capabilities in IT monitoring tools. You will learn how to audit and manage the monitoring platform itself and make sure that it is being used appropriately. In a future article, I intend to focus more on how to leverage and evaluate features in monitoring tools to audit and track configuration changes of the applications and systems they monitor &#8211; e.g., auditing the <a href=\"https:\/\/www.eginnovations.com\/blog\/automation-integration-monitoring\/\" target=\"blank\" rel=\"noopener noreferrer\">use of scripts and remote control actions<\/a> from the tool and automatically tracking changes such as adding a new hypervisor or server to the infrastructure landscape.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-23382\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/Audit.webp?2324\" alt=\"\" width=\"300\" height=\"270\" border=\"0\" \/>As an enterprise monitoring solution, <a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\" target=\"blank\" rel=\"noopener noreferrer\">eG Enterprise<\/a> offers a powerful platform to provide unified end-to-end monitoring of applications, infrastructure, and third-party services by leveraging APIs (Application Programming Interfaces) and supported interfaces. As with any monitoring tool, care must also be taken to control permissions and privileges and access to the tool itself to ensure that the deep insights provided are only accessed by the authorized staff in a traceable and auditable manner. <a href=\"https:\/\/www.eginnovations.com\/blog\/role-based-access-control-rbac-in-eg-enterprise\/\" target=\"blank\" rel=\"noopener noreferrer\">Role Based Access Control (RBAC)<\/a> features are a de facto standard for monitoring tools.<\/p>\n<p>Moreover, it is best practice to ensure proactive auditing detects and eliminates any rogue or malicious operators operating from outside or even from within the organization. Many freeware and entry-level tools are woefully inadequate in this area, failing to even record logins to the monitoring platform let alone configuration changes made to how monitoring is performed or what is to be monitored. Depending on which industry you are in, you may have to comply with industry standards, such as HIPAA, SOX, etc., that may require you to have controls over all the tools you have in place. Auditing is an important way in which you prove compliance with these standards as far as a monitoring tool is concerned.<\/p>\n<p>The consoles, dashboards and reports associated with a monitoring platform are relied upon by organizations within critical business processes and relied upon by individual employees to perform specific tasks and roles. Uncontrolled or untraceable changes to your monitoring configuration and interfaces can impact on your staff\u2019s work routines and, ultimately, the ability of a business to deliver highly available applications and services to end customers and employees. While auditing is mainly focused on admin changes, you can also use it to track new dashboards or dashboard templates being created or being manipulated.<\/p>\n<p>Auditing is not just for security. It also helps determine why the monitoring tool is sometimes misbehaving or baselines and frequency of alerts have changed &#8211; e.g., if someone changes thresholds incorrectly. Auditing changes can alert you to changes that should not have been made or users who may need additional training and allows the ownership of decisions to be tracked and decisions questioned.<\/p>\n<p>When evaluating a monitoring platform, you should consider what audit logs are supported, the coverage of the auditing, and how easily you can access and automatically audit the data collected without resorting to manual inspection and parsing of text files. The problem is more severe in a SaaS configuration, where the management console is accessible over the Internet, making it more vulnerable to external attackers.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Top_Auditing_Features_for_Monitoring_Platforms_and_Tools\"><\/span>Top Auditing Features for Monitoring Platforms and Tools<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div class=\"link_list_style\" style=\"padding: 25px 20px;\">\n<p style=\"margin-bottom: 15px;\">Change configuration and auditing features are now critical features that need to be evaluated when selecting monitoring platforms and tools and any solution adopted in a corporate or regulated environment MUST include:<\/p>\n<ol class=\"ol_style_line_s\" style=\"margin: 0;\">\n<li><a href=\"#features1\" rel=\"features1\">Auditing successful and failed logins to the monitoring platform<\/a><\/li>\n<li><a href=\"#features2\" rel=\"features2\">Auditing configuration changes made to the monitoring platform, including details of previous configurations as well as the new changes<\/a><\/li>\n<li><a href=\"#features3\" rel=\"features3\">Auditing of automated and scripted actions and bulk operations<\/a><\/li>\n<li><a href=\"#features4\" rel=\"features4\">The ability to export audit reports in flexible formats and automate the scheduling audit reporting for compliance<\/a><\/li>\n<li><a href=\"#features5\" rel=\"features5\">Full auditing available regardless of the deployment architecture chosen for eG Enterprise &#8211; on-premises, in cloud, and SaaS (Software as a Service) Ready-to-go<\/a><\/li>\n<\/ol>\n<\/div>\n<h3 id=\"features1\"><span class=\"ez-toc-section\" id=\"1_Auditing_of_Logins_to_the_Monitoring_Platform\"><\/span>1. Auditing of Logins to the Monitoring Platform<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A significant failing in many freeware or entry level products is the failure to even log or audit user access to the monitoring product, and for any enterprise-grade organization, this is usually a red flag to adoption because of the compliance implications. eG Enterprise records each and every administrator login and provides out-of-the-box audit reports that allow both proactive monitoring and forensic analysis of user behaviors and actions performed. Failed logins are also audited assisting the detection of many types of malicious attempts to breach security measures.<\/p>\n<p style=\"margin-bottom: 15px;\">At a minimum for a successful login, data to be captured includes:<\/p>\n<ul>\n<li>the name of the user<\/li>\n<li>the IP address of the host from which the user accessed the eG management console<\/li>\n<li>the exact time of login<\/li>\n<li>the accurate time of logout<\/li>\n<li>the duration of the user access<\/li>\n<\/ul>\n<p style=\"margin-bottom: 15px;\">For failed login attempts, at a minimum, data capture should include:<\/p>\n<ul>\n<li>the name of the user<\/li>\n<li>the IP address of the host from which the user attempted to login to the eG management console<\/li>\n<li>the Interface type that was used &#8211; whether web or command line<\/li>\n<li>the exact time of the login attempt<\/li>\n<li>the reason for the login failure<\/li>\n<\/ul>\n<table class=\"hand_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/hand-left.png\" alt=\"\" width=\"58\" height=\"58\" border=\"0\" \/><\/td>\n<td>\n<div style=\"font-family: inherit; line-height: 28px;\"><b>Critical Feature:<\/b> MUST monitor and audit each and every login to the monitoring platform and MUST monitor failed login attempts.<\/div>\n<div style=\"font-family: inherit; line-height: 28px;\">Granular controls should allow control of who can access all audit log data. It must be possible to restrict users to see no audit data or only their own and allow only designated authorized admins access to overviews of all users\u2019 data.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>For further details on eG Enterprise auditing of successful logins, please see: <a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Auditing-Successful-User-Logons.htm\" target=\"blank\" rel=\"noopener noreferrer\">Auditing Successful User Logons (eginnovations.com)<\/a><\/p>\n<p>For further details on eG Enterprise audit reporting on failed logins, please see: <a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Auditing-Failed-Logons.htm\" target=\"blank\" rel=\"noopener noreferrer\">Auditing Failed Logons (eginnovations.com)<\/a><\/p>\n<p>From the eG Enterprise console, select the \u201cAdmin\u201d tab and from the menu select \u201cAudit\u201d to show the range of Audit reports available.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin3-largeview.jpg\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23357 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin3.webp?200\" alt=\"Auditing IT Monitoring tools\" width=\"850\" height=\"644\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 1: If you have the appropriate administrator privileges, auditing will be accessible via the &#8220;Admin&#8221; tab of the main eG Enterprise console.<\/div>\n<p>If you select the \u201cSuccessful Login\u201d report, you will be given an interface to configure your audits to your own needs.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/02-largeview.jpg\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23359 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/02.webp?200\" alt=\"Logon report from the IT monitoring tool\" width=\"850\" height=\"408\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 2: \u201cSuccessful Login\u201d report can be configured to your own needs.<\/div>\n<p>All the columns are active to allow you to sort and order the data by key parameters, such as date or duration of logon.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/03-largeview.jpg\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23361 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/03.webp?200\" alt=\"Auditing user logons in IT monitoring tool\" width=\"850\" height=\"695\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 3: A range of parameters are available to control the reports generated.<\/div>\n<p>The timeline of the report can be controlled to the granularity of your choice, from hours to days, weeks, months, or longer; the time range of interest is also fully adjustable. And filters can be applied to limit the view to an individual or group of users. The \u201cInterface\u201d used to access eG Enterprise is another filter allowing you to separate the auditing of user access from web console or via any API\/command line interfaces.<\/p>\n<p>Selecting the \u201cFailed Logins\u201d Report from the Admin-&gt;Audit menu will access similar data for failed logins including reasons for failure.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin10-largeview.jpg\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23363 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin10.webp?200\" alt=\"Failed logons report is very useful for identifying security issues\" width=\"889\" height=\"736\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 4: Troubleshooting failed logins becomes simple (it is often a mistyped or forgotten password, deleted account, or misremembered username), but failed logins can be a sign of malicious brute force attacks especially if multiple login attempts occur from different IPs or strange IPs. Details on locking down access to eG Enterprise via IP address can be found in Administration Policy (eginnovations.com).<\/div>\n<h3 id=\"features2\"><span class=\"ez-toc-section\" id=\"2_Auditing_Configuration_Changes_made_to_the_Monitoring_Tool\"><\/span>2. Auditing Configuration Changes made to the Monitoring Tool<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>eG Enterprise provides <strong>AUDITLOG REPORTS,<\/strong> in which you can keep tabs on critical configuration changes made using the eG administrator interfaces, such as password changes, test parameter changes, new server additions, threshold changes, etc., which can significantly alter the way the eG Enterprise system performs monitoring. Sometimes, these configuration changes, if not done properly or if carried out by unauthorized\/unqualified personnel, can cause the eG Enterprise system to generate false alerts and perform inaccurate diagnosis. As these AUDITLOG REPORTS reveal what admin settings were modified by which user, along with the details of the original settings, they greatly help administrators in quickly identifying and rectifying errors (if any) in configuration.<\/p>\n<p style=\"margin-bottom: 15px;\">Details of reports provided by eG Enterprise can be found in the documentation (see <a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Auditing-Configuration-Changes.htm\" target=\"blank\" rel=\"noopener noreferrer\">Auditing Configuration Changes made using the eG Administrative Interface<\/a>) and include:<\/p>\n<ul>\n<li>the date\/time of the change<\/li>\n<li>the name of the user who made the change<\/li>\n<li>the IP address of the host from which the user accessed the eG admin interface<\/li>\n<li>the module that was accessed by the user<\/li>\n<li>the specific operation\/activity that was performed by the user on that module<\/li>\n<li>the Interface type that was used &#8211; whether web or command line<\/li>\n<li>the detailed description of the change, followed by a snapshot of the settings prior to change, and the settings after the change; if a configuration has been newly introduced (e.g., a server has been newly managed), then only the Current Settings will be displayed. By default, every change record that the report displays will be accompanied by the Current and Previous configuration settings, this can be modified to simplify reports if desired.<\/li>\n<\/ul>\n<div class=\"tips-box\" style=\"padding: 20px; margin-bottom: 30px;\"><strong>Note:<\/strong> <em>eG Enterprise can be deployed with clusters of managers to provide built in redundancy for failover. All auditing features are designed to work and trace operations in the normal way in such a configuration. Many freeware and entry-level products do not provide full auditing in redundant configurations, and this is an item to be added to any evaluation checklist as to whether actions can truly be associated and traced with multiple managers and management clusters.<\/em><\/div>\n<p>For full details, see <a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Auditing-Configuration-Changes.htm\" target=\"blank\" rel=\"noopener noreferrer\">Auditing Configuration Changes made using the eG Administrative Interface.<\/a><\/p>\n<table class=\"hand_table_style\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2020\/07\/hand-left.png\" alt=\"\" width=\"58\" height=\"58\" border=\"0\" \/><\/td>\n<td>\n<div style=\"font-family: inherit; line-height: 28px;\"><b>Expert tip:<\/b> always check that full auditing is implemented for monitoring product even in failover architectures, such as multiple managers and management clusters.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The \u201cAudit-&gt;Admin\u201d menu item gives access to changes made; these include critical data on the creation of new users, changes to privileges, etc. Auditing logins alone is insufficient if this critical data is not traceable to ensure those authorized are done so by legitimate operators and the possibility of rogue ex-employees granting and leaving backdoor accounts can be eliminated.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin12-zoomview.jpg\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23367 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin12.webp?200\" alt=\"Audit log of all changes made to an IT monitoring tool\" width=\"850\" height=\"419\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 5: Customizing the admin report view. Again, timelines, date ranges, user, and interface filters are available. Additional filters can be applied for Host IP, Modules, and specific Activities. By default, only those modules and activities applied within the reporting time period are shown to accelerate deep dive analysis and eliminate null and empty reports when filtering is applied.<\/div>\n<p>Filtering on the \u201cAdd User\u201d activity, you can review whether new users have been configured correctly and, if not, by whom. Any changes to permissions, as well as who made them, when, and from where, will be recorded on-going.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin13-largeview.jpg\" data-rel=\"lightbox-image-5\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23369 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin13.webp?200\" alt=\"Audit report of all changes\" width=\"850\" height=\"557\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 6: Reviewing the creation of a new account made for me by the user \u201cadmin\u201d, it appears the admin has restricted my ability to see reports in Reporter to a 2-week time period for increased data security. Additionally, I am not trusted to delete alarms in the system, as that is the helpdesk operators&#8217; job, and they certainly don\u2019t want me interfering! The admin has also defined a \u201cMMM dd, yyyy\u201d format to be used, such as \u201cMay 10, 2022\u201d, as this system is used across multiple geographies, and we like to avoid USA\/Europe date format confusions \ud83d\ude00.<\/div>\n<p>All changes that modify what is monitored, how it is monitored, and the users view from eG Enterprise of the monitoring are recorded.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin16-largeview.jpg\" data-rel=\"lightbox-image-6\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23371 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin16.webp?200\" alt=\"Audit manual as well as automated changes\" width=\"850\" height=\"597\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 7: All components added to the monitoring infrastructure are logged, whether added manually or via intelligent auto-discovery technologies.<\/div>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditalarm20-largeview.jpg\" data-rel=\"lightbox-image-7\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-23373 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditalarm20.webp?200\" alt=\"Auditing threshold changes made in the IT monitoring tool - through UI and via API or CLI\" width=\"850\" height=\"591\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 8: Threshold changes are captured. Here, the audit logs record that a user has modified the sensitivity of a \u201cDisk busy\u201d metric threshold and when and how often alerts will be modified. The time window in which a threshold breach is considered significant has also been changed. Such changes will affect reports on the number of alarms so they should always be tracked and transparent to management.<\/div>\n<p style=\"margin-bottom: 15px;\">Similar auditing and reporting functionality is provided for all eG Enterprise user roles and modules, see:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Auditing-Configuration-Changes-made-using-the-eG-Monitor-Interface.htm\" target=\"blank\" rel=\"noopener noreferrer\">Auditing Configuration Changes made using the eG Monitor Interface<\/a> (Just like changes made using the eG admin interface, care should also be taken while making changes using the eG monitor interface &#8211; e.g., while deleting alarms, acknowledging alarms, configuring quick insight\/live graph views, etc. Changes that are implemented carelessly can only add to an administrator\u2019s confusion and cause unnecessary delay in problem resolution.)\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditlog9-largeview.jpg\" data-rel=\"lightbox-image-8\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23375\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditlog9.webp?200\" alt=\"\" width=\"850\" height=\"607\" border=\"0\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 9: Changes to the monitor interface include modifications to dashboards. Sometimes the history and design rationale behind a dashboard or custom widget may be lost and rigorous auditing assures that ownership can be traced.<\/div>\n<\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Auditing-Configuration-Changes-made-using-the-eG-Reporter-Interface.htm\" target=\"blank\" rel=\"noopener noreferrer\">Auditing Configuration Changes made using the eG Reporter Interface<\/a> (Typically, the key configuration changes that a user can make using the eG Reporter component is to add\/modify\/remove FAVORITES and SCHEDULE report configurations.)<\/li>\n<li><a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Auditing-the-Display-Settings.htm\" target=\"blank\" rel=\"noopener noreferrer\">Auditing the Display Settings Changed Using the eG Configuration Management Interface<\/a> (Generate audit log reports that will help you instantly identify whether any changes were made to the dashboard and overall display settings of the eG Configuration Management interface, as well as who made these changes, and when.)<\/li>\n<\/ul>\n<h3 id=\"features3\"><span class=\"ez-toc-section\" id=\"3_Auditing_of_Automated_and_Scripted_Actions_and_Bulk_Operations\"><\/span>3. Auditing of Automated and Scripted Actions and Bulk Operations<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-23376\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin14.webp?56\" alt=\"\" width=\"355\" height=\"400\" border=\"0\" \/> Always check auditing covers API (Application Programming Interface), Bulk operations, Auto-discovery by agents, and Command Line access to your monitoring tools beyond web and console access.<\/p>\n<p>Auditing helps track automatic actions taken by the monitoring tool &#8211; e.g., deleting expired users and all their components; these types of bulk and self-service actions and maintenance tasks are <a href=\"https:\/\/www.eginnovations.com\/blog\/multi-tenant-network-monitoring\/\" target=\"blank\" rel=\"noopener noreferrer\">heavily utilized by our MSP (Managed Service Provider) customers.<\/a><\/p>\n<p>Automated programmatic and scripted access is often an organization&#8217;s Achilles&#8217; heel for secure monitoring platform access!<\/p>\n<h3 id=\"features4\"><span class=\"ez-toc-section\" id=\"4_The_Ability_to_Export_Audit_Reports_in_Flexible_Formats_and_Automate_the_Scheduling_Audit_Reporting_for_Compliance\"><\/span>4. The Ability to Export Audit Reports in Flexible Formats and Automate the Scheduling Audit Reporting for Compliance<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-23377\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/auditadmin17.webp?56\" alt=\"\" width=\"355\" height=\"130\" border=\"0\" \/>For systematic by-process due diligence, configuration change tracking and auditing must remove the need to manually trawl audit logs; proactive monitoring should be in place and regular automated audit report generation and archiving implemented. Log data should be available via a flexible GUI, including search and filtering, and ideally via .CSV and .pdf formats for additional analysis. It must be possible to capture and retain data on significant timescales to enable retrospective compliance reviews and future forensic diagnosis.<\/p>\n<p>All audit reports are presented in .html format with an option to export in .pdf or .csv formats, to print or to schedule and email.<\/p>\n<h3 id=\"features5\"><span class=\"ez-toc-section\" id=\"5_Full_Auditing_Available_Regardless_of_the_Deployment_Architecture_Chosen_for_eG_Enterprise_-_On-premises_in_Cloud_and_SaaS_Ready-to-go\"><\/span>5. Full Auditing Available Regardless of the Deployment Architecture Chosen for eG Enterprise &#8211; On-premises, in Cloud, and SaaS Ready-to-go<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>eG Enterprise can be deployed on-premises, in a cloud of your choice, or used via our ready-to-go SaaS offering; details of the diverse options, including options for MSPs (Managed Service Providers), are covered in: <a href=\"https:\/\/www.eginnovations.com\/blog\/deployment-choices-saas-on-prem\/\" target=\"blank\" rel=\"noopener noreferrer\">Deploying eG Enterprise Monitoring \u2013 SaaS or On-Premises.<\/a> Unlike many competitors, our comprehensive auditing is available for all options, including on-premises, as well as SaaS because we understand that those choosing on-premises for specific compliance often have stringent auditing requirements too.<\/p>\n<div class=\"link_list_style\" style=\"padding: 20px;\">SaaS and on-premises monitoring solutions have different benefits, but auditing is critical to all customers. Parity of solution regardless of deployment choice is a must.<\/div>\n<h3><span class=\"ez-toc-section\" id=\"Ensuring_Security_within_Monitoring_Architecture\"><\/span>Ensuring Security within Monitoring Architecture<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Comprehensive auditing capabilities in IT monitoring is essential. Tools should offer logging and log management is just one of many security and governance features we include within eG Enterprise that are widely used in corporate enterprises and organizations that are subject to regulatory control, including limiting access to approved locked-down IP addresses and ranges, multi-factor authentication, single sign-on, account locking, encryption, a no agent listening on open ports architecture, and more. (See <a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Security-Architecture-of-eG-Enterprise.htm\" target=\"blank\" rel=\"noopener noreferrer\">Security Architecture of eG Enterprise.)<\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Further_Information\"><\/span>Further Information<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Please see <a href=\"https:\/\/www.eginnovations.com\/product\/capabilities\/change-configuration-tracking\" target=\"blank\" rel=\"noopener noreferrer\">Change Tracking and Configuration Monitoring<\/a> for an overview of how eG Innovations can track and log changes within the IT infrastructures it is monitoring &#8211; e.g., logging patch updates, hot fixes, software installations, etc.<\/li>\n<li>For information on MSP specific features, including bulk and self-service operations that are frequently subject to audit, see <a href=\"https:\/\/www.eginnovations.com\/blog\/multi-tenant-network-monitoring\/\" target=\"blank\" rel=\"noopener noreferrer\">Multi-Tenant MSP Monitoring.<\/a><\/li>\n<li>For more information on securing monitoring platforms using best practices for open TCP port control, see <a href=\"https:\/\/www.eginnovations.com\/blog\/secure-monitoring-tcp-ports\/\" target=\"blank\" rel=\"noopener noreferrer\">Secure Monitoring &#8211; Open TCP Ports are a security risk.<\/a><\/li>\n<li>To read more about enhanced security features in eG Enterprise, including Two-factor authentication, Single Sign-on, audit logging, account lockout, etc., please see <a href=\"https:\/\/www.eginnovations.com\/documentation\/Admin\/Security-Architecture-of-eG-Enterprise.htm\" target=\"blank\" rel=\"noopener noreferrer\">Security Architecture of eG Enterprise.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Logging and Auditing in IT Monitoring Tools It is critical that access to any configuration changes or management actions made to monitoring platforms are logged and traceably audited. In this article, I will help you learn how to discover the auditing capabilities in IT monitoring tools. You will learn how to audit and manage the [&hellip;]<\/p>\n","protected":false},"author":57,"featured_media":23379,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[409,366,383,393,382],"tags":[624,400,625,165,196],"class_list":["post-23296","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eg-enterprise","category-end-to-end-monitoring-e2e","category-it-infrastructure-monitoring","category-msp-monitoring","category-unified-monitoring","tag-auditing-monitoring-tool","tag-it-monitoring","tag-it-monitoring-tool","tag-it-security-and-compliance","tag-monitoring-tool"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Auditing Capabilities in IT Monitoring Tools | eG Innovations<\/title>\n<meta name=\"description\" content=\"The auditing capabilities in IT monitoring tools you use is critical to meeting security and compliance requirements. We have the tools you need.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Auditing Capabilities in IT Monitoring Tools | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"The auditing capabilities in IT monitoring tools you use is critical to meeting security and compliance requirements. We have the tools you need.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-07T10:45:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-11T06:19:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-SocialBanner.jpg\" \/>\n<meta name=\"author\" content=\"Krishnamurthi Srinivasan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Auditing Capabilities in IT Monitoring Tools | eG Innovations\" \/>\n<meta name=\"twitter:description\" content=\"The auditing capabilities in IT monitoring tools you use is critical to meeting security and compliance requirements. We have the tools you need.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-SocialBanner.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krishnamurthi Srinivasan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Auditing Capabilities in IT Monitoring Tools | eG Innovations","description":"The auditing capabilities in IT monitoring tools you use is critical to meeting security and compliance requirements. We have the tools you need.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Auditing Capabilities in IT Monitoring Tools | eG Innovations","og_description":"The auditing capabilities in IT monitoring tools you use is critical to meeting security and compliance requirements. We have the tools you need.","og_url":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2022-06-07T10:45:48+00:00","article_modified_time":"2022-10-11T06:19:14+00:00","og_image":[{"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-SocialBanner.jpg","type":"","width":"","height":""}],"author":"Krishnamurthi Srinivasan","twitter_card":"summary_large_image","twitter_title":"Auditing Capabilities in IT Monitoring Tools | eG Innovations","twitter_description":"The auditing capabilities in IT monitoring tools you use is critical to meeting security and compliance requirements. We have the tools you need.","twitter_image":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-SocialBanner.jpg","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Krishnamurthi Srinivasan","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/"},"author":{"name":"Krishnamurthi Srinivasan","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/b72120370c7ccdca0685addb1b92193f"},"headline":"Auditing Capabilities in IT Monitoring Tools for Security and Compliance","datePublished":"2022-06-07T10:45:48+00:00","dateModified":"2022-10-11T06:19:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/"},"wordCount":2733,"commentCount":0,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-Thumbnail.jpg","keywords":["Auditing monitoring tool","IT Monitoring","IT monitoring tool","IT Security and Compliance","Monitoring tool"],"articleSection":["eG Enterprise","End-to-End Monitoring (E2E)","IT Infrastructure Monitoring","MSP Monitoring","Unified Monitoring"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/","url":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/","name":"Auditing Capabilities in IT Monitoring Tools | eG Innovations","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-Thumbnail.jpg","datePublished":"2022-06-07T10:45:48+00:00","dateModified":"2022-10-11T06:19:14+00:00","description":"The auditing capabilities in IT monitoring tools you use is critical to meeting security and compliance requirements. We have the tools you need.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-Thumbnail.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2022\/05\/audit-log-Thumbnail.jpg","width":362,"height":235},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Auditing Capabilities in IT Monitoring Tools for Security and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/b72120370c7ccdca0685addb1b92193f","name":"Krishnamurthi Srinivasan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6ee31821c85fcc98673d39626fc5c92b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ee31821c85fcc98673d39626fc5c92b?s=96&d=mm&r=g","caption":"Krishnamurthi Srinivasan"},"url":"https:\/\/www.eginnovations.com\/blog\/author\/krishnamurthi-srinivasan\/"}]}},"modified_by":"eG Innovations","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/23296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=23296"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/23296\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/23379"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=23296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=23296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=23296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}