For the best web experience, please use IE11+, Chrome, Firefox, or Safari

InTrust

Event log management software

Product overview of InTrust 07:08

Your organization’s most valuable asset is its data and the users who have access to it — but you’re only as secure as your user workstations. Collecting, storing and analyzing all user and privileged account data generally requires large amounts of storage, time-consuming collection of event data and in-house expertise about the event log data collected. That’s where we come in.

Quest InTrust is smart, scalable event log management software that lets you monitor all user workstation and administrator activity from logons to logoffs and everything in between. Slash storage costs with 20:1 data compression, and store years of event logs from Windows, UNIX/Linux servers, databases, applications and network devices. InTrust real-time log monitoring and alerting enables you to immediately respond to threats with automated responses to suspicious activity.

data compression
events per second
storage cost savings

Central log collection

How to collect custom applications and services logs 09:08

Central log collection

Collect and store all native or third-party workstation logs from various systems, devices and applications in one, searchable location with immediate availability for security and compliance reporting. Get a unified view of Windows event logs, UNIX/Linux, IIS and web application logs, PowerShell audit trails, endpoint protection systems, proxies and firewalls, virtualization platforms, network devices, custom text logs, as well as Quest Change Auditor events.

Event log compression

Event log management and compression

Event log compression

Collect and store years of data in a highly-compressed repository, 20:1 with indexing and 40:1 without, so you can save on storage costs by up to 60%, satisfy data retention policies and ensure continuous compliance with HIPAA, SOX, PCI, FISMA and more.

Simplified log analysis

Simplified log analysis - log monitoring tools

Simplified log analysis

Consolidate cryptic event logs from disparate sources into a simple, normalized format of who, what, when, where, where from and whom to help you make sense of the data. Unique, full-text indexing makes long-term event data easily searchable for fast reporting, troubleshooting and security investigation.

Alerting and response actions

Defend against PowerShell attacks with automated response actions 03:42

Alerting and response actions

Watch for unauthorized or suspicious user activity, such as file creation beyond threshold limits, using file extensions of known ransomware attacks, suspicious process launches or fishy PowerShell commands. Respond to threats immediately with real-time alerts. InTrust enables you to easily trigger automated responses to suspicious events, like blocking the activity, disabling the offending user, reversing the change and/or enabling emergency auditing.

SIEM integration

Filtering events forwarded to SIEM with InTrust 02:17

SIEM integration

InTrust delivers easy and reliable integration with Splunk, QRadar, ArcSight and any other SIEM supporting common Syslog formats (RFC 5424, JSON, Snare). With InTrust’s predictable per-user license model, you can collect and store as much data as you need for as long as you want. Then use pre-built filters based on industry best practices to forward only relevant log data and alerts to your SIEM solution for real-time, security analytics. This integration enables you to slash your annual SIEM licensing costs.

How much data are you sending to SIEM?

Try this ROI calculator to see how much money you can save your organization.

Additional features

User workstation log monitoring

Protect your workstations from modern cyberattacks, such as pass-the-hash, phishing or ransomware, by monitoring user and administrator activity — from logons to logoffs and everything in between. Collect and store all essential details of user access, such as who performed the action, what that action entailed, on which server it happened and from which workstation it originated.

Hyper scalability

One InTrust server can process up to 60,000 events per second with 10,000 agents or more writing event logs simultaneously, giving you more efficiency, scalability and substantial hardware cost savings. And for large, enterprise organizations who need more volume, you can simply add another InTrust server and divide the workload — scalability is virtually limitless.

Improved insights with IT Security Search

Leverage the valuable insights from all of your Quest security and compliance solutions in one place. With IT Security Search, you can correlate data from InTrust, Change AuditorEnterprise ReporterRecovery Manager for AD, and Active Roles in a responsive Google-like, IT search engine for faster security incident response and forensic analysis. Easily analyze user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Automated best practice reporting

Easily convert investigations into multiple report formats, including HTML, XML, PDF, CSV and TXT, as well as Microsoft Word, Visio and Excel. Schedule reports and automate distribution across teams or choose from a vast library of predefined best practice reports with built-in event log expertise. With data import and consolidation workflows, you can even automatically forward a subset of data to SQL Server for further advanced analysis.

Tamper-proof logs

Protect event log data from tampering or destruction by creating a cached location on each remote server where logs can be duplicated as they are created.

    Real-time log collection

  • Automate real-time gathering of event logs from a single console with our event log management software. 

    Real-time log collection
  • Pre-defined searches

  • Use pre-defined searches to zero in on critical event data with our log monitoring tool

    Pre-defined searches with our event log management software
  • SIEM event forwarding

  • Use best practice filters to selectively forward only relevant data to your SIEM to reduce costs, minimize event noise and improve threat hunting efficiency and effectiveness.

    SIEM event forwarding
  • Unix/Linux log management

  • Collect, store and search events from Unix and Linux syslog with our event log management software.

    Event Log Management Software for Unix/Linux
  • Syslog parsing

  • Syslog data differs drastically between applications. With InTrust, you can detect structured data inside syslog events and parse this data correctly.

    Syslog parsing with our log monitoring tool
  • Interactive user sessions

  • Monitor user session activity — from logons to logoffs and everything in between.

    Interactive user sessions with our event log management software
  • Password spray alerts

  • Pre-defined alerts watch for suspicious user activity with our event log management software

    Password spray alerts
  • PowerShell monitoring

  • Automated response actions can minimize the impact of modern PowerShell-based attacks such as pass-the-hash with our event log management software

    PowerShell monitoring with our event log management software
  • Dynamic operators

  • Send email notifications to specific users and their managers with our log monitoring tools

    Dynamic operators
  • Export built-in reports

  • Export built-in reports for troubleshooting and review.

    Export built-in reports with our event log management software
  • IT Security Search

  • Find everything associated with a user or object using simple search terms. View results in a simple format of who, what, when, where, whom and workstation.

    IT Security Search with our log monitoring tool

Specifications

Resources

InTrust English
Datasheet
InTrust English
InTrust English
Securely collect, store and receive event data from Windows, Unix and Linux systems
Read Datasheet
How to Improve your SIEM’s ROI and Threat-Hunting Potential
White Paper
How to Improve your SIEM’s ROI and Threat-Hunting Potential
How to Improve your SIEM’s ROI and Threat-Hunting Potential
Are you getting maximum value from your SIEM? Probably not — 54 percent of cybersecurity pros say that their SIEM detects less than half of all security incidents, and many organizations have had to dial back monitoring to control SIEM costs. The root of the problem isn’t your SIEM. Most
Read White Paper
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
White Paper
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
SIEM Integration Best Practices: Making the Most of Your Security Event Logs
The key to breaking free of this conundrum is recognizing that you don't have to send every log you collect to your SIEM. Download this white paper today and learn about a log data collection and processing model that will enable you to
Read White Paper
Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs
E-book
Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs
Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs
Improve endpoint security and log management. Learn the top 3 workstation logs to monitor and how Quest InTrust and IT Security Search simplify the process.
Read E-book
5 Best Practices for Endpoint Log Monitoring
On Demand Webcast
5 Best Practices for Endpoint Log Monitoring
5 Best Practices for Endpoint Log Monitoring
Your organization’s data – and the users who have access to it – are only as secure as your endpoints, which are increasingly susceptible to cyberattacks. Workstation users, in particular, fall victim to drive-by downloads from websites they think they can trust, leading to ransomw
Watch Webcast
Key Issues to Consider in Endpoint Security
On Demand Webcast
Key Issues to Consider in Endpoint Security
Key Issues to Consider in Endpoint Security
Watch this on-demand webcast and join security experts as they explore the need for better endpoint log management, which current solutions are not working, and how to achieve more robust endpoint security.
Watch Webcast
Retailer Ensures PCI DSS Compliance
Case Study
Retailer Ensures PCI DSS Compliance
Retailer Ensures PCI DSS Compliance
Any retailer that wants to continue accepting credit cards needs to maintain compliance with PCI DSS standards — and prove it during annual audits. One of the PCI DSS requirements can be particularly tough to meet: storing a whole year’s worth of audit data. Discover how one large retail
Read Case Study
Integrated change auditing and event log management for strong security
White Paper
Integrated change auditing and event log management for strong security
Integrated change auditing and event log management for strong security
This white paper explores how you can use Change Auditor and InTrust, either alone or in combination with your SIEM, to improve security and compliance while reducing costs.
Read White Paper

Videos

Cut costs, increase storage with InTrust and SIEM integration
Cut costs, increase storage with InTrust and SIEM integration

11:16

Video
Cut costs, increase storage with InTrust and SIEM integration
Listen in as Quest product experts Ghazwan Khairi, Bryan Patton and Robert Tovar discuss how InTrust seamlessly integrates with your SIEM solutions for real-time security analytics and lower annual SIEM costs.
Watch Video
User logon session auditing with Quest InTrust
User logon session auditing with Quest InTrust

04:39

Video
User logon session auditing with Quest InTrust
Learn about user logon session auditing with Quest InTrust.
Watch Video
Filtering events forwarded to SIEM with InTrust
Filtering events forwarded to SIEM with InTrust

02:17

Video
Filtering events forwarded to SIEM with InTrust
Take a look at the new SIEM forwarding enhancements coming to InTrust 11.4.1 in this brief demo.
Watch Video
Defend against PowerShell attacks with automated response actions
Defend against PowerShell attacks with automated response actions

03:42

Video
Defend against PowerShell attacks with automated response actions
In this demo, watch how you can use InTrust's automated response actions to minimize the impact of modern PowerShell-based attacks such as Pass the Hash.
Watch Video
Ransomware attack mitigation with InTrust and Change Auditor
Ransomware attack mitigation with InTrust and Change Auditor

03:31

Video
Ransomware attack mitigation with InTrust and Change Auditor
This demo shows how you can use InTrust and Change Auditor to minimize the damage of a ransomware attack, without a specialized malware detection solution in place.
Watch Video
Collecting Microsoft IIS logs with Quest InTrust
Collecting Microsoft IIS logs with Quest InTrust

03:11

Video
Collecting Microsoft IIS logs with Quest InTrust
Watch a step-by-step tutorial on how to collect Microsoft IIS logs using InTrust.
Watch Video
How to collect custom applications and services logs
How to collect custom applications and services logs

09:08

Video
How to collect custom applications and services logs
Watch you how can collect custom applications and services logs with InTrust.
Watch Video
Reporting on members of specific groups with Quest InTrust
Reporting on members of specific groups with Quest InTrust

05:41

Video
Reporting on members of specific groups with Quest InTrust
In this demo, you will learn how to customize InTrust failed logon reporting to focus on members of a specific group.
Watch Video

Blogs

Top 3 logs to spot and stop COVID-19 workstation attacks for your remote workforce

Top 3 logs to spot and stop COVID-19 workstation attacks for your remote workforce

COVID-19 phishing and malware attacks start on user workstations. Monitor these three logs to stop and spot these attacks: Windows security log, Sysmon log, and the PowerShell log.

Rising RDP attacks as an avenue for ransomware; and mitigation strategies

Rising RDP attacks as an avenue for ransomware; and mitigation strategies

Learn about the recent connection between Remote Desktop Protocol (RDP) and ransomware attacks, as well as how you can limit your exposure.

Remote Workforce Productivity: Give Managers the Tools to Help Overwhelmed Users Manage Their Workload

Remote Workforce Productivity: Give Managers the Tools to Help Overwhelmed Users Manage Their Workload

Discover how IT admins can give managers the tools they need to help overwhelmed users manage their workload in the growing remote workforce.

New in Quest InTrust - Suspicious process creation detection

New in Quest InTrust - Suspicious process creation detection

In recently released Update 1 for InTrust 11.4.1 there is a hidden gem – Suspicious process was started rule, it allows detection of hidden steps that ransomware and malware would do to achieve persistence, hide their tracks and disable protect...

Want to see if someone is attempting a known CVE in your infrastructure? Just collect logs

Want to see if someone is attempting a known CVE in your infrastructure? Just collect logs

Something really cool about honeypots and deception technology, in general, is that you can see a hacker or a penetration tester in action with very little false positive notifications. Deception also can help with detecting yet unknown threats that ...

New in Quest InTrust - Real-Time alert notification in the Event Log

New in Quest InTrust - Real-Time alert notification in the Event Log

Quest InTrust is a very powerful log management framework which also contains a lot of possible ways to notify about triggered alerts: Email alertsSCOM connector

Get started now

Monitor user activity. Slash storage costs. Respond to threats quickly.

Support & services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.