Getting Started

Introduction

In today`s rapidly evolving digital landscape, enterprises face increasing challenges in monitoring, analyzing, and securing their network infrastructure. Logger emerges as a comprehensive solution, combining powerful logging capabilities, intelligent analytics, and robust hotspot management in a single platform that seamlessly operates across Windows, Linux, and Container environments.

Core Capabilities ✨

Advanced Logging & AI-Powered Analytics 🧠

Logger sets new standards in network monitoring with its sophisticated log collection and analysis capabilities:

  • Universal Device Integration: Seamlessly collects logs from leading UTM devices including Fortigate, Sophos, SonicWall, and Palo Alto, as well as network infrastructure components like routers, switches, and access points.
  • Intelligent Log Processing: Our advanced parsing engine extracts and analyzes critical data points including:
  • Source and Target IP addresses
  • Hostnames and URLs
  • Port information and protocols
  • VPN access patterns
  • DHCP activities
  • MAC addresses
  • AI-Enhanced Security Analysis: Leverages artificial intelligence to:
  • Interpret log entries in real-time
  • Identify potential security threats
  • Provide actionable insights on network behavior
  • Analyze traffic patterns and usage trends
  • Secure Log Management:
  • SHA256 encryption for all stored logs
  • Automated daily log exports with compression
  • Free TÜBİTAK KAMUSM timestamp certification (compliant with Law No. 5651)

Comprehensive Reporting & Analysis 📶

  • Aggregate Intelligence:
  • Combines log data to generate insightful summary reports
  • Tracks user-specific bandwidth consumption
  • Monitors VPN session durations
  • Analyzes blocked request patterns
  • AI-Powered Reporting:
  • Natural language interpretation of complex reports
  • Automated insights generation
  • Trend analysis and pattern recognition
  • Object-Focused Analysis:
  • Unified view of all reports related to specific objects
  • Detailed traffic analysis for individual domains or services
  • Custom report generation for specific network entities

Enterprise-Grade Hotspot Management 🛜

Secure and flexible authentication options for Wi-Fi networks:

  • National ID verification
  • SMS verification
  • Captive Portal authentication
  • LDAP integration
  • Social Media authentication
  • Branded authentication screens
  • Seamless user experience
  • Enterprise-specific customization options

Technical Specifications & Compliance ♻️

Technical

  • Windows (with Docker Engine and WSL)
  • Native Linux installation
  • Container deployment (Docker standalone & Swarm)
  • Cluster management capability
  • Enterprise-ready architecture
  • High-availability options
  • Load balancing support

Compliance

  • Full compliance with Law No. 5651
  • Verifiable log proof system
  • Secure data retention
  • Network traffic analysis
  • Guest & Employee Wi-Fi authentication
  • Identity management
  • Access control

Why Choose Logger? 🚀

Transform your network monitoring and security infrastructure with Logger - the intelligent choice for enterprise network management.

  • Platform Independence: Deploy anywhere - Windows, Linux, or Container infrastructure
  • Comprehensive Integration: Works with all major UTM devices and network equipment
  • Advanced Security: AI-powered threat detection and analysis
  • Regulatory Compliance: Built-in compliance with relevant regulations
  • Enterprise-Ready: Designed for large-scale deployments and complex networks
  • Intelligent Analytics: AI-enhanced reporting and analysis capabilities

For detailed information about implementation and capabilities, please refer to our comprehensive documentation.

Below you can examine how the Logger software works through the flow diagram.

flowchart TB
    subgraph Sources[Data Sources]
        direction LR
        FW[Firewall]
        AG[Agent]
        RT[(Router)]
        SW[Switch]
    end

    subgraph Collector[Data Collector]
        direction TB
        INPUT[Input Handler]
        VALID[Validator]
        TRANS[Transformer]
        BUFF[Buffer]
    end

    subgraph Processing[Veri İşleme]
        direction TB
        FILTER[Data Filter]
        ENRICH[Data Enrichment]
        AGG[Aggregator]
    end

    subgraph Storage[Veri Depolama]
        direction LR
        CACHE[(Cache)]
        DWH[(Data Warehouse)]
        LAKE[(Data Lake)]
    end

    %% Bağlantılar
    Sources --> |514/UDP| Collector
    FW --> INPUT
    AG --> INPUT
    RT --> INPUT
    SW --> INPUT
    
    INPUT --> VALID
    VALID --> TRANS
    TRANS --> BUFF
    
    BUFF --> FILTER
    FILTER --> ENRICH
    ENRICH --> AGG
    
    AGG --> CACHE
    AGG --> DWH
    AGG --> LAKE

    class FW,AG,RT,SW source
    class INPUT,VALID,TRANS,BUFF collector
    class FILTER,ENRICH,AGG process
    class CACHE,DWH,LAKE storage