Getting Started
Introduction
In today`s rapidly evolving digital landscape, enterprises face increasing challenges in monitoring, analyzing, and securing their network infrastructure. Logger emerges as a comprehensive solution, combining powerful logging capabilities, intelligent analytics, and robust hotspot management in a single platform that seamlessly operates across Windows, Linux, and Container environments.
Core Capabilities ✨
Advanced Logging & AI-Powered Analytics 🧠
Logger sets new standards in network monitoring with its sophisticated log collection and analysis capabilities:
- Universal Device Integration: Seamlessly collects logs from leading UTM devices including Fortigate, Sophos, SonicWall, and Palo Alto, as well as network infrastructure components like routers, switches, and access points.
- Intelligent Log Processing: Our advanced parsing engine extracts and analyzes critical data points including:
- Source and Target IP addresses
- Hostnames and URLs
- Port information and protocols
- VPN access patterns
- DHCP activities
- MAC addresses
- AI-Enhanced Security Analysis: Leverages artificial intelligence to:
- Interpret log entries in real-time
- Identify potential security threats
- Provide actionable insights on network behavior
- Analyze traffic patterns and usage trends
- Secure Log Management:
- SHA256 encryption for all stored logs
- Automated daily log exports with compression
- Free TÜBİTAK KAMUSM timestamp certification (compliant with Law No. 5651)
Comprehensive Reporting & Analysis 📶
- Aggregate Intelligence:
- Combines log data to generate insightful summary reports
- Tracks user-specific bandwidth consumption
- Monitors VPN session durations
- Analyzes blocked request patterns
- AI-Powered Reporting:
- Natural language interpretation of complex reports
- Automated insights generation
- Trend analysis and pattern recognition
- Object-Focused Analysis:
- Unified view of all reports related to specific objects
- Detailed traffic analysis for individual domains or services
- Custom report generation for specific network entities
Enterprise-Grade Hotspot Management 🛜
Secure and flexible authentication options for Wi-Fi networks:
- National ID verification
- SMS verification
- Captive Portal authentication
- LDAP integration
- Social Media authentication
- Branded authentication screens
- Seamless user experience
- Enterprise-specific customization options
Technical Specifications & Compliance ♻️
Technical
- Windows (with Docker Engine and WSL)
- Native Linux installation
- Container deployment (Docker standalone & Swarm)
- Cluster management capability
- Enterprise-ready architecture
- High-availability options
- Load balancing support
Compliance
- Full compliance with Law No. 5651
- Verifiable log proof system
- Secure data retention
- Network traffic analysis
- Guest & Employee Wi-Fi authentication
- Identity management
- Access control
Why Choose Logger? 🚀
Transform your network monitoring and security infrastructure with Logger - the intelligent choice for enterprise network management.
- Platform Independence: Deploy anywhere - Windows, Linux, or Container infrastructure
- Comprehensive Integration: Works with all major UTM devices and network equipment
- Advanced Security: AI-powered threat detection and analysis
- Regulatory Compliance: Built-in compliance with relevant regulations
- Enterprise-Ready: Designed for large-scale deployments and complex networks
- Intelligent Analytics: AI-enhanced reporting and analysis capabilities
For detailed information about implementation and capabilities, please refer to our comprehensive documentation.
Below you can examine how the Logger software works through the flow diagram.
flowchart TB
subgraph Sources[Data Sources]
direction LR
FW[Firewall]
AG[Agent]
RT[(Router)]
SW[Switch]
end
subgraph Collector[Data Collector]
direction TB
INPUT[Input Handler]
VALID[Validator]
TRANS[Transformer]
BUFF[Buffer]
end
subgraph Processing[Veri İşleme]
direction TB
FILTER[Data Filter]
ENRICH[Data Enrichment]
AGG[Aggregator]
end
subgraph Storage[Veri Depolama]
direction LR
CACHE[(Cache)]
DWH[(Data Warehouse)]
LAKE[(Data Lake)]
end
%% Bağlantılar
Sources --> |514/UDP| Collector
FW --> INPUT
AG --> INPUT
RT --> INPUT
SW --> INPUT
INPUT --> VALID
VALID --> TRANS
TRANS --> BUFF
BUFF --> FILTER
FILTER --> ENRICH
ENRICH --> AGG
AGG --> CACHE
AGG --> DWH
AGG --> LAKE
class FW,AG,RT,SW source
class INPUT,VALID,TRANS,BUFF collector
class FILTER,ENRICH,AGG process
class CACHE,DWH,LAKE storage