About Etienne

Based in Cape Town, South Africa, Etienne is an IT Professional working in various environments building, testing and maintaining systems for a large national retail chain. An IT professional since 1996, Etienne has worked in various environments and is certified by (ISC)2, Comptia, Dell and Microsoft. Etienne is the technical blogger and primary technical consultant for FixMyITsystem.com a solutions provider company based in Cape Town with a global client base.
27 03, 2017

Analyzing Blocked Traffic in Log Files for Suspicious Activity

By | 2017-03-27T02:14:54+00:00 March 27th, 2017|Firewall Analysis, How To, Log File Analysis, Sophos, System Administration, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|Comments Off on Analyzing Blocked Traffic in Log Files for Suspicious Activity

Using log file analysis to report on blocked traffic can help troubleshoot issues with website and application behavior, and potential security issues. This article shows how to use WebSpy Vantage to identify suspicious activity from blocked traffic log events.

14 12, 2015

A Complete Guide to Useful Reverse Proxy Reporting

By | 2015-12-14T09:26:41+00:00 December 14th, 2015|Aliases, How To, Log File Analysis, Microsoft Threat Management Gateway, Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|Comments Off on A Complete Guide to Useful Reverse Proxy Reporting

Reverse proxy reporting (using WebSpy Vantage Ultimate) is a great way to gain insight to how the Internet is using your published web sites or web applications. Forward proxy reporting is all about the users accessing content on the Internet from within your corporate network. Reverse proxy reporting is the opposite. When you have a [...]

5 10, 2015

Simple Network Monitoring With Windows Firewall Logging And Reporting

By | 2015-10-05T16:49:07+00:00 October 5th, 2015|Firewall Analysis, How To, Log File Analysis, Reports, Scheduled Tasks, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|Comments Off on Simple Network Monitoring With Windows Firewall Logging And Reporting

The Windows native firewall has been around for some time now. It first made its appearance in Windows XP as the Internet Connection Sharing Firewall, which was a basic inbound firewall. In Windows XP SP2 it was turned on by default and in Windows Vista, it had grown up to be both in and outbound [...]

7 09, 2015

Optimizing Log File Size For Analysis And Reporting

By | 2015-09-07T17:13:06+00:00 September 7th, 2015|Astaro, ClearSwift, Email Analysis, Employee Internet Reports, Firewall Analysis, How To, Log File Analysis, Microsoft Exchange, Microsoft IIS, Microsoft ISA Server, Microsoft Threat Management Gateway, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSense, WebSpy, Windows Event Logs|Comments Off on Optimizing Log File Size For Analysis And Reporting

Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but [...]

22 09, 2014

Aliases are awesome. See why you should use them!

By | 2014-09-22T23:51:04+00:00 September 22nd, 2014|Aliases, Employee Internet Reports, How To, Log File Analysis, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|Comments Off on Aliases are awesome. See why you should use them!

What is an Alias? As defined by Google, in computing terms, an alias is: An alternative name or label that refers to a file, command, address, or other item, and can be used to locate or access it. When it comes to WebSpy Vantage, an alias takes log data that does not make sense and [...]

27 08, 2014

How I used log file analysis to safely retire a legacy web site

By | 2014-08-27T07:30:05+00:00 August 27th, 2014|Firewall Analysis, Log File Analysis, Microsoft IIS, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|Comments Off on How I used log file analysis to safely retire a legacy web site

Legacy applications and websites remain in place for longer than they should, often because there is a suspicion that they are still being used. Meanwhile, the application is hanging around consuming IT resources that could be put towards a more useful purpose. To safely decommission a web site or service, you need to be sure [...]

25 08, 2014

Rethinking Log Storage and Archiving with Data Deduplication

By | 2014-08-25T07:51:10+00:00 August 25th, 2014|Log File Analysis, Microsoft Threat Management Gateway, storages, System Administration, Uncategorized, Vantage, WebSpy|Comments Off on Rethinking Log Storage and Archiving with Data Deduplication

As a typical IT department, we log a lot data. Loads of it. Thanks to various regulatory requirements, we need to log more and more data from more and more sources. That's a lot of mores! We are also required to mine more information from those logs, and need keep these logs in their original form for [...]