Java Audit Log


Advertisement

BoostSolutions Item Audit Log  v.2.2.517.0



BoostSolutions Item Audit Log
View audit information at SharePoint item and list level.

Based on the SharePoint audit feature, Item Audit Log enables users to view audit logs at item, library and list level through context ...

SharePoint Item Audit Log  v.2.3.730.0



BoostSolutions Item Audit Log
View audit information at SharePoint item and list level.

Based on the SharePoint audit feature, Item Audit Log enables users to view audit logs at item, library and list level through context ...





Advertisement

Polliwog - Java Web Log Analyzer  v.rc.1.1

A Java based web server log file analyzer. Gives you detailed knowledge of what your visitors did whilst visiting your site. Provides information on human visitors, searches, search engines, site areas, pages, visit paths and more...

Classes to make Java logging easier  v.1.1

Java natural log includes class to do the following. Automatically produce method and class names, and line numbers in log messages. Send messages to syslogd servers via three different mechanisms. Simplify messages to just the message itself.

SNARE Epilog for Windows  v.1.6.0

SNARE (System iNtrusion Analysis and Reporting Environment) is a series of log collection agents that facilitate centralised analysis of audit log data. Agents are available for Linux, Windows, Solaris, IIS, Lotus Notes, Irix, AIX, ISA/IIS + more.SNARE ...

Iptables logviewer  v.1.0

View iptables log with this program. iptables logviewer is a simple java based log viewer to view iptables log no depedency and small and portablesRequirements:
* Java ...

Squid Analog Suite  v.1.0

Java Squid Log Analizer with PHP Web Viewer.At this stage a tool called log2sql is already available a can load squid access.log files into a normalized DB. Tester are welcome..

Netwrix Event Log Manager  v.4.032.263

Event log data is a critical source of information for security audit, compliance, and troubleshooting purposes. Major compliance regulations require event log audit data to be archived for up to 7 years.

Netwrix Event Log Archiver is a free ...

The Lock

Provides user audit, access, Internet and system security for any computer running Windows 2000, 2003, XP, and Vista. User security is group based and Meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Stand-alone, ...

The Lock XP  v.5.06.0102

Provides user audit, access, Internet and system security. User security is group based and meets requirements outlined in NISPOM, Chapter 8, as well as Sarbanes-Oxley and HIPPA. Standalone or multi-system network use is supported. Restrict access to ...

Systemhound-client  v.6.0.0.201

Any defunct PCs can be deleted from the database with an audit log automatically maintained.
- Systemhound utilizes Microsoft MSI installer technology and can be deployed from the central server to all/some PCs in the enterprise ...

OmniAudit  v.1.12.0.472

Simply select the tables and columns you want to audit, and OmniAudit does everything for you. OmniAudit captures changes regardless of the application used to change the data: a commercial software package, an in-house application, or even the native ...

Crypt-o  v.2.4.180



Every user action is logged to the Audit log. Privileged users can keep an eye on the program's usage.

Crypt-o can autofill web pages, registration forms, logon windows, etc. This feature is compatible with Microsoft Internet Explorer, ...

Today Timesheet  v.2.2


Timer Control/ Stop Watch

Expense Tracking
Track expenses and mileage as common records
Mark expenses as billable, reimbursable
Full multi-currency expense tracking

Other Features
Mobile compatible (Web responsive layout)
CSV, Excel, Word, PSD Export and MS Project, QuickBooks Import/ Export
Full multi-currency time and expense management
DCCA/Sarbanes-Oxley Compliance with audit log
Fully rebrand ...

Netwrix Privileged Account Manager  v.4.132.145

When someone from your IT team needs a password for one of the accounts, the system checks it out from the storage, logging an audit log entry. When done using the password, the person checks in the password back to the storage, and the system automatically ...

Pages : 1 | 2 >
Newest Reviews