Log360 Service Offering | Standard Onboarding | Advanced Onboarding |
---|---|---|
Installation | ![]() |
![]() |
Device management | Windows Server - 25, WKS - 100, Supported Syslog Devices - 10 | ![]() |
Application management - IIS, MSSQL, Other Applications | Up to 1 each | Up to 3 each |
Technician management (role configuration)* | ![]() |
![]() |
Log collection filter configuration | Up to 2 filters | ![]() |
Log retention policy settings | ![]() |
![]() |
Configuring Windows/Linux-based file monitoring (basic configuration) | 1 in each | ![]() |
Tuning product administrative settings 1. Email and SMS server configuration 2. Configuring log collection failure alerts 3. Log forwarding |
![]() |
![]() |
Historic EVT/EVTX file import | ![]() |
![]() |
Custom reports and alerts configuration (provided logs are available) | Up to 1 each | Up to 10 in total |
Reports, alerts, and compliance schedule creation | Up to 1 each | Up to 10 |
Rule-based correlation setup (based on the feasibility/available logs) | Up to 1 | Up to 5 |
Compliance-specific reports configuration | ![]() |
Up to 1 |
UEBA: Custom alerts and reports set up* | Up to 2 | Up to 10 |
Configuring managed servers** | ![]() |
![]() |
Log import scheduling | ![]() |
Up to 5 |
Dashboard customization | ![]() |
Up to 5 |
Security hardening & privacy 1. SSL configuration 2. Configuring TFA 3. GDPR Privacy Configuration 4. CAPTCHA |
![]() |
![]() |
Importing historical logs (supported format) | ![]() |
![]() |
Database migration (PGSQL to MSSQL) | ![]() |
![]() |
Advanced Threat Analytics configuration* | ![]() |
![]() |
SOAR workflow configuration | ![]() |
![]() |
Log360 search engine management | ![]() |
![]() |
Risk score modifications for anomalies based on environment. | ![]() |
![]() |
High availability configuration | ![]() |
![]() |
Restoration of an available backup | ![]() |
![]() |
Incident management configuration | ![]() |
![]() |
Data migration (ES/archive) | ![]() |
![]() |
Custom log parser rule configuration (subject to scope) | ![]() |
![]() |
External threat feed configuration | ![]() |
![]() |
Agent deployment (agent-level registry changes will be performed) | ![]() |
![]() |
NAT configuration | ![]() |
![]() |
Setting up Windows logging | ![]() |
![]() |
Server migration | ![]() |
![]() |
Expert consultation | ![]() |
![]() |
Comprehensive documentation | ![]() |
![]() |
User acceptance testing | ![]() |
![]() |
Integrated walkthrough | ![]() |
![]() |
Signing | ![]() |
![]() |
Post-implementation health check | ![]() |
![]() |
Supporting new log formats (subject to feasibility) | ![]() |
![]() |
Additional custom correlation rules configuration (based on the feasibility/available logs) | ![]() |
![]() |
Training (up to 4 participants) | Available as an add-on | ![]() |
* - if license is purchased
** - only for distributed editions and MSSPs
Note: