A refreshed experience is in progress. A few pages may be temporarily limited.

As a Service

Reach out to KIDAN for inquiries and support.

On-demand Consulting

Expert guidance for strategic technology decisions.

Toc

24/7 global technology operations center.

Implementation

Seamless enterprise technology solution deployment.

Training

Empower teams with expert-led technology programs.

Services

Enterprise services supporting critical IT infrastructure.

Solutions

Tailored IT solutions for operational excellence.

SOC

End-to-end security operations monitoring.

Support

Dedicated IT support for seamless operations.

Most visited page

Expert guidance for strategic technology decisions.

About Us

Learn more about KIDAN’s vision, values, and expertise.

Our Partners

Meet KIDAN’s partners working together to deliver technology solutions, support, and growth for businesses.
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
10 +
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
110 +
Enterprise clients across industry sectors
trust KIDAN’s strategic partnerships and solutions to drive technology success.
950 +

Powerful log analysis for compliance and threat detection 

Collect, monitor, and analyze logs, and comply with
regulatory mandates. 

Gartner peerinsights customers’ choice 2021 for SIEM

7th time in Gartner Magic Quadrant, 2024

2nd in Best Event Log Analysis tools, 2020

1st in Top 10 SIEM Solutions

2nd Time Champion, 2020

Expert’s Choice Great UX

Is Your Network Secure, or Just Vulnerable? 

THE CHAOS: A Fragmented Approach

Without endpoint management, chaos, risk, and inefficiency
are inevitable.

Disconnected Log Sources

Attacks go unnoticed due to lack of instant alerts and behaviour monitoring. 


Complex Compliance Reporting

Manually generating audit and compliance reports for multiple regulations (like GDPR, HIPAA, or PCI DSS) is time-consuming and error-prone. 

Delayed Threat Detection

Without real-time correlation and alerts, potential security threats or anomalies often go unnoticed until damage is done.

Inefficient Troubleshooting

When issues occur, tracing the root cause across multiple, unconnected logs is tedious and slows down resolution. 

THE CHAOS: A Fragmented Approach

Without endpoint management, chaos, risk, and inefficiency
are inevitable.

Limited IT Visibility

Keeping track of networks, servers, applications, and cloud resources can be overwhelming. 

Disjointed Access Experience 

Users juggle multiple credentials across systems, leading to password fatigue and increased security risks.

Weak Authentication Practices 

Relying on single-factor authentication leaves endpoints and applications vulnerable to credential-based attacks.

Compliance Gaps 

Inconsistent password policies and lack of audit trails make it difficult to meet regulatory requirements.

Enterprise-Level Log Management 

EventLog Analyzer is one of the most cost-effective Security Information and Event Management (SIEM) solutions that helps you to automate the entire log management process: collects, analyzes, correlates and archives the various log files and summarizes the most important information in reports.  

Manage

Everything

Server And Device Logs

User activities

System Performance

Compliance Reports

Secure

Everyone

Unauthorized Access

Policy violations

Suspicious events

Sensitive data

Empower

Every Action

IT visibility

Security intelligence 

Compliance Automation

Data-driven decisions

Performance Insights

Identity applications and system hardware that are not working optimally

Risk Discovery 

Uncover security risks in the
corporate network

Access Detection 

Detect unauthorized access attempts and policy violations 

Activity Monitoring 

Monitor trends in user activity,
peak times, etc.

Privileged What you can do with EventLog Analyzer Password Management Features 

Stay always well informed about everything that is going on in your network from user behavior to data integrity, network anomalies, unauthorized access attempts and policy violations to system failures and external or internal attacks. 

In-depth Auditing Capabilities

Audits network perimeter devices’ logs, user activities, server account changes, user accesses, and a lot more to meet security auditing needs. 

Augmented Threat Intelligence

Bundled with a global IP threat database and STIX/TAXII feed processor to detect any malicious inbound or outbound traffic. 

Comprehensive Log Management 

Collects, analyzes, correlates, searches, and archives log data from over 700 log sources. Includes a custom log parser to analyze any human-readable log format. 

MFA for OWA

Enable advanced MFA settings to secure access to OWA and the
Exchange admin center.

Conditional access

Automate access control decisions based on parameters like IP address, device, business hours, and geolocation.

Passwordless authentication

Improve user experience by enabling passwordless login for
enterprise applications.

Offline MFA

Ensure security for your offline remote workforce by enabling MFA for offline Windows and macOS logins.

Phishing-resistant MFA

Protect access to enterprise applications with phishing-resistant and passwordless FIDO2 authentication.

MFA for UAC

Safeguard elevated system activities performed on standard user accounts with MFA for Windows UAC.

Device-based MFA

Protect business-critical machines in your organization with
device-based MFA.

MFA for RDP

Enhance RDP login security by implementing MFA with various authentication methods in addition.

MFA for Windows Servers

Secure access to critical Windows Servers by implementing MFA with multiple authentication methods for increased security.

For all your log management needs

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Start your free 30-day trial 

Manage mobile devices and access to business apps
and data

On-Premises Deployment

Deployment on public cloud infrastructure (e.g., AWS, Azure).

Cloud-Based Deployment 

Deployment on public cloud infrastructure (e.g., AWS, Azure).

Security analytics and beyond

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

For better implementation experience, and tailored solutions that's unique to your business.

Upgrade to a Fully Managed Security Posture

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

24/7 Proactive Security & Threat Mitigation

Our TOC operates around the clock to monitor your endpoints. We don’t just send you alerts; we actively investigate, validate, and remediate threats before they can impact your operations. This includes vulnerability management, patch deployment, and enforcing security configurations across your entire fleet of devices.

Expert Management & Optimization

Your Endpoint Central platform will be managed and optimized by certified engineers who live and breathe this technology. We handle all software deployments, policy configurations, and routine maintenance, ensuring the tool is always performing at its peak and aligned with the latest security best practices.

Strategic Reporting & Visibility

Move beyond raw data. We provide you with clear, executive-level monthly reports that translate technical activity into business-relevant insights. Understand your security posture, see the threats we’ve neutralized, and demonstrate compliance with ease.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

ManageEngine EventLog Analyzer Pricing

Free plan

FREE

Features

Supports up to 5 log sources only

Never expire

Centralized log collection and archival

Log search-based reports

Compliance reports

Log forensic analysis capabilities

Premium

$595.00

Features

Supports up to 5 log sources only

Never expire

Centralized log collection and archival

Log search-based reports

Compliance reports

Log forensic analysis capabilities

Distributed

$2,495.00

Features

Supports up to 5 log sources only

Never expire

Centralized log collection and archival

Log search-based reports

Compliance reports

Log forensic analysis capabilities

All Resources

Admin guide

Help Documents

Release notes

Fundamentals

Identity360 encryption
Risk Exposure...

REST API Guide

Identity360 API

Solution Handbooks

Product slide deck

Technical Guides

Architecture guide

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full 
value.

Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We’ll help you set up, onboard, and train your team.

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

10’000+

Organizations trust EventLog Analyzer
with their Active Directory Security

Eventlog Demo Form
Fill This Form To Schedule A
Personalized Web Demo
By clicking ‘Submit’, you agree to processing of personal data according to the Privacy Policy.

Your Questions, Answered with Clarity.

Direct answers to the most common strategic, technical, and commercial questions
about Endpoint Central.

Working with computers always involve authentication which is usually done by the user name and password combination. Now, when use ADSelfService Plus to reset Windows password or to unlock your locked-down account, first, the solution has to authenticate identity.

To do this, the solution uses any or all of the following methods depending on your IT administrator’s preference. Providing the information for the authentication, is called the enrollment process

ADSelfService Plus services can be categorized as Enrollment Requiring Services & Non-Enrollment Services.

  • Enrollment Requiring Services:
    • Self-Service Password Reset
    • Self-Service Account Unlock
  • Non-Enrollment Services:
    • People Search
    • Self-Service Active Directory Update
    • Password Expiration Notification

Registration is needed to use the primary functions of ADSelfService Plus.

When ADSelfService Plus is used to reset the Windows password or to unlock a locked-down account. First, the solution has to authenticate the identity. To do this, the solution uses any or all of the following methods depending on the IT administrator’s preference. Providing the information for the authentication is called the enrollment process.

 

Logon to ADSelfService Plus and edit the enrollment data. For example, the security question is “What is your favorite movie?” to which the answer is “Cast Away”. However, now the need to update the answer to “Transformer”, logon, and edit the “Security Answer” any time.

 

Being the Swiss Partner of ManageEngine, Kidan is responsible for aiding with professional services, such as installing, implementing, configuring, training, and supporting the company to ensure an effective on-boarding of ADSelfService Plus.

1 Minute Guided Tour about the Event Log Analyzer features and experience
of the users 

Start your free 30-day trial 

Manage mobile devices and access to business apps
and data

On-Premises Deployment

Deployment on public cloud infrastructure (e.g., AWS, Azure).

Cloud-Based Deployment 

Deployment on public cloud infrastructure (e.g., AWS, Azure).

For better implementation experience, and tailored solutions that's unique to your business.

Enterprise-Level Log Management 

EventLog Analyzer is one of the most cost-effective Security Information and Event Management (SIEM) solutions that helps you to automate the entire log management process: collects, analyzes, correlates and archives the various log files and summarizes the most important information in reports.  

Manage

Everything

Server And Device Logs

User activities

System Performance

Compliance Reports

Secure

Everyone

Unauthorized Access

Policy violations

Suspicious events

Sensitive data

Empower

Every Action

IT visibility

Security intelligence 

Compliance Automation

Data-driven decisions

Performance Insights

Identity applications and system hardware that are not working optimally

Risk Discovery 

Uncover security risks in the
corporate network

Access Detection 

Detect unauthorized access attempts and policy violations 

Activity Monitoring 

Monitor trends in user activity,
peak times, etc.

Privileged What you can do with EventLog Analyzer Password Management Features 

Stay always well informed about everything that is going on in your network from user behavior to data integrity, network anomalies, unauthorized access attempts and policy violations to system failures and external or internal attacks. 

In-depth Auditing Capabilities

Audits network perimeter devices’ logs, user activities, server account changes, user accesses, and a lot more to meet security auditing needs. 

Augmented Threat Intelligence

Bundled with a global IP threat database and STIX/TAXII feed processor to detect any malicious inbound or outbound traffic. 

Comprehensive Log Management 

Collects, analyzes, correlates, searches, and archives log data from over 700 log sources. Includes a custom log parser to analyze any human-readable log format. 

MFA for OWA

Enable advanced MFA settings to secure access to OWA and the
Exchange admin center.

Conditional access

Automate access control decisions based on parameters like IP address, device, business hours, and geolocation.

Passwordless authentication

Improve user experience by enabling passwordless login for
enterprise applications.

Offline MFA

Ensure security for your offline remote workforce by enabling MFA for offline Windows and macOS logins.

Phishing-resistant MFA

Protect access to enterprise applications with phishing-resistant and passwordless FIDO2 authentication.

MFA for UAC

Safeguard elevated system activities performed on standard user accounts with MFA for Windows UAC.

Device-based MFA

Protect business-critical machines in your organization with
device-based MFA.

MFA for RDP

Enhance RDP login security by implementing MFA with various authentication methods in addition.

MFA for Windows Servers

Secure access to critical Windows Servers by implementing MFA with multiple authentication methods for increased security.

For all your log management needs

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

Log management

Collect and analyze logs from all your end-user devices on a single console.

Syslog management

Collect and analyze syslogs from various devices and gain insights on network activities that are displayed through intuitive graphs and reports.

Universal log collection

Collect logs from multiple log sources such as Windows and Unix and Linux systems, IBM AS/400, applications, databases, firewalls, routers, switches, IDS/IPS, and your Cloud infrastructure.

Application log management

Manage application logs and gain in-depth security information on incidents through predefined reports and real-time alerts.

Event log management

Collect, filter, parse, analyze, correlate, search, and archive event logs.

1 Minute Guided Tour about the Event Log Analyzer features and experience
of the users 

Start your free 30-day trial 

Manage mobile devices and access to business apps
and data

On-Premises Deployment

Deployment on public cloud infrastructure (e.g., AWS, Azure).

Cloud-Based Deployment 

Deployment on public cloud infrastructure (e.g., AWS, Azure).

Security analytics and beyond

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

File integrity monitoring

Ensure the security of sensitive data

Protect your organization’s sensitive data from unauthorized access, modifications, security threats, and breaches. With EventLog Analyzer’s file integrity monitoring feature, you can track any changes made to files or folders that contain confidential data in real time to quickly detect critical security incidents and ensure data integrity.
Deeply analyze file and folder accesses, permission changes, and data value changes to Windows file servers and Linux servers.

For better implementation experience, and tailored solutions that's unique to your business.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

All Resources

Admin guide

Help Documents

Release notes

Fundamentals

Identity360 encryption
Risk Exposure...

REST API Guide

Identity360 API

Solution Handbooks

Product slide deck

Technical Guides

Architecture guide

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full 
value.

Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We’ll help you set up, onboard, and train your team.

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

10’000+

Organizations trust EventLog Analyzer
with their Active Directory Security

Eventlog Demo Form
Fill This Form To Schedule A
Personalized Web Demo
By clicking ‘Submit’, you agree to processing of personal data according to the Privacy Policy.

Your Questions, Answered with Clarity.

Direct answers to the most common strategic, technical, and commercial questions
about Endpoint Central.

Working with computers always involve authentication which is usually done by the user name and password combination. Now, when use ADSelfService Plus to reset Windows password or to unlock your locked-down account, first, the solution has to authenticate identity.

To do this, the solution uses any or all of the following methods depending on your IT administrator’s preference. Providing the information for the authentication, is called the enrollment process

ADSelfService Plus services can be categorized as Enrollment Requiring Services & Non-Enrollment Services.

  • Enrollment Requiring Services:
    • Self-Service Password Reset
    • Self-Service Account Unlock
  • Non-Enrollment Services:
    • People Search
    • Self-Service Active Directory Update
    • Password Expiration Notification

Registration is needed to use the primary functions of ADSelfService Plus.

When ADSelfService Plus is used to reset the Windows password or to unlock a locked-down account. First, the solution has to authenticate the identity. To do this, the solution uses any or all of the following methods depending on the IT administrator’s preference. Providing the information for the authentication is called the enrollment process.

 

Logon to ADSelfService Plus and edit the enrollment data. For example, the security question is “What is your favorite movie?” to which the answer is “Cast Away”. However, now the need to update the answer to “Transformer”, logon, and edit the “Security Answer” any time.

 

Being the Swiss Partner of ManageEngine, Kidan is responsible for aiding with professional services, such as installing, implementing, configuring, training, and supporting the company to ensure an effective on-boarding of ADSelfService Plus.

ManageEngine EventLog Analyzer Pricing

Free plan

FREE

Features

Supports up to 5 log sources only

Never expire

Centralized log collection and archival

Log search-based reports

Compliance reports

Log forensic analysis capabilities

Premium

$595.00

Features

Supports up to 5 log sources only

Never expire

Centralized log collection and archival

Log search-based reports

Compliance reports

Log forensic analysis capabilities

Distributed

$2,495.00

Features

Supports up to 5 log sources only

Never expire

Centralized log collection and archival

Log search-based reports

Compliance reports

Log forensic analysis capabilities

For better implementation experience, and tailored solutions that's unique to your business.

Available Editions of EventLog Analyzer

Features

Premium Edition

Distributed Edition

Number of log sources

50 to 1,000

Distributed Edition

Monitoring of syslogs and Windows event logs

Auto-discovery for new devices, import of old events, event filters

Ready-made / plannable / individual reports , available immediately

Ready-made / plannable / individual reports , available immediately

Real-time event analysis and compliance reports

Automated alarms , notification via SMS and SNMP trap

Log forensics

For better implementation experience, and tailored solutions that's unique to your business.

10’000+

Organizations trust EventLog Analyzer
with their Active Directory Security

Eventlog Demo Form
Fill This Form To Schedule A
Personalized Web Demo
By clicking ‘Submit’, you agree to processing of personal data according to the Privacy Policy.

For better implementation experience, and tailored solutions that's unique to your business.

All Resources

Admin guide

Help Documents

Release notes

Fundamentals

Identity360 encryption
Risk Exposure...

REST API Guide

Identity360 API

Solution Handbooks

Product slide deck

Technical Guides

Architecture guide

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full 
value.

Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We’ll help you set up, onboard, and train your team.

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

Your Questions, Answered with Clarity.

Direct answers to the most common strategic, technical, and commercial questions
about Endpoint Central.

Working with computers always involve authentication which is usually done by the user name and password combination. Now, when use ADSelfService Plus to reset Windows password or to unlock your locked-down account, first, the solution has to authenticate identity.

To do this, the solution uses any or all of the following methods depending on your IT administrator’s preference. Providing the information for the authentication, is called the enrollment process

ADSelfService Plus services can be categorized as Enrollment Requiring Services & Non-Enrollment Services.

  • Enrollment Requiring Services:
    • Self-Service Password Reset
    • Self-Service Account Unlock
  • Non-Enrollment Services:
    • People Search
    • Self-Service Active Directory Update
    • Password Expiration Notification

Registration is needed to use the primary functions of ADSelfService Plus.

When ADSelfService Plus is used to reset the Windows password or to unlock a locked-down account. First, the solution has to authenticate the identity. To do this, the solution uses any or all of the following methods depending on the IT administrator’s preference. Providing the information for the authentication is called the enrollment process.

 

Logon to ADSelfService Plus and edit the enrollment data. For example, the security question is “What is your favorite movie?” to which the answer is “Cast Away”. However, now the need to update the answer to “Transformer”, logon, and edit the “Security Answer” any time.

 

Being the Swiss Partner of ManageEngine, Kidan is responsible for aiding with professional services, such as installing, implementing, configuring, training, and supporting the company to ensure an effective on-boarding of ADSelfService Plus.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Join 100+ IT Leaders at KIDANVerse

Be part of the first edition.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details For Pricing

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.