Submit a ticketCall us

Get a crash course on Network Monitoring delivered right to your inbox
This free 7-day email course provides a primer to the philosophy, theory, and fundamental concepts involved in IT monitoring. Lessons will explain not only how to perform various monitoring tasks, but why and when you should use them. Sign up now.

Home > Success Center > Log & Event Manager (LEM) > SolarWinds LEM 6.3 User Guide > Introduction to LEM

Introduction to LEM

Table of contents

In this section:

SolarWinds® Log & Event Manager (LEM) is a virtual appliance that provides real-time analysis reporting of log data generated by hardware and software resource events in your network. Distributed to several points of presence throughout your network, SolarWinds LEM collects log data related to trends, threats, and attacks in your network and converts this data into information you can view in a Web console for troubleshooting and active response. You can also use the collected data for scheduled and ad hoc reporting from both the LEM Console and standalone LEM Reports console.

Using the tools and resources available in Log & Event Manager, you can:

  • Correlate network traffic from a variety of sources using filters and rules
  • Visualize log data in dynamic graphs, charts, and other widgets
  • Monitor USB mass storage device activity on network agents
  • Respond to countless threats, attacks and other vulnerabilities with point-and-click and automated active responses
  • Search normalized log data for events of interest
  • Configure change management and other security-related reporting for management and auditors

See SolarWinds Log & Event Manager (LEM) Use Cases for additional feature information.



Last modified
12:09, 21 Feb 2017