12 05, 2010

Dedicated WebSpy and Forefront TMG pages – Everything you need to know about TMG Log Reporting

By | 2010-05-12T04:14:53+00:00 May 12th, 2010|How To, Microsoft Threat Management Gateway, Reports, Sales and Marketing, Tips and Best Practices, Uncategorized, WebSpy|0 Comments

Microsoft Forefront Threat Management Gateway (TMG) popularity is starting to pick up. WebSpy added support for analyzing and reporting on TMG logs even before the public release and have been improving our compatibility ever since. […]

11 05, 2010

How and When WebSpy Vantage’s Web Server Reporting Beats Google Analytics

By | 2010-05-11T10:36:01+00:00 May 11th, 2010|How To, Sales and Marketing, Tips and Best Practices, Uncategorized|0 Comments

I’m actually not trying to compare WebSpy Vantage with Google Analytics (GA), it’s like comparing apples and oranges. Both solutions provide powerful ways of tracking how visitors find your site and how they navigate through it, ideally giving you rich insights into your website traffic and marketing effectiveness. However, GA is a pure web analytics [...]

14 04, 2010

Web Module Update Errors and Workaround

By | 2010-04-14T05:53:57+00:00 April 14th, 2010|How To, Software Updates, Uncategorized, Web Module|1 Comment

We have just issued an automatic update for the Vantage range of products, including Vantage Ultimate and the Web Module. Unfortunately there are two issues with the Web Module auto update process. Everyone on a 64 bit operating system machines will encounter issue #1 (Unable to locate installation location), and some of you may encounter issue #2 (System.IO.FileLoadException).

7 04, 2010

Soho Alpha Release – Issues and Workarounds

By | 2010-04-07T06:28:06+00:00 April 7th, 2010|How To, Software Updates, Tips and Best Practices, Uncategorized, WebSpy Soho|0 Comments

It’s been a crazy few weeks but we’ve finally managed to get the first release of WebSpy Soho out the door. It is our intention to keep our Alpha testers up to date with our ongoing development. Right now, I’d like to inform you about some issues experienced by a handful of testers and how to go about resolving them.

8 02, 2010

8 Reasons NOT to Use Microsoft Forefront TMG's Reporting

By | 2010-02-08T06:48:39+00:00 February 8th, 2010|Aliases, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, Web Module, WebSpy|6 Comments

I've been having a look through the reporting functionality included in Microsoft Forefront Threat Management Gateway to find that not much has changed from ISA Server 2006. There is some new information regarding the newly implemented URL categorization and threat management technology, but there is very little flexibility or customization for those with reporting requirements beyond general overviews cluttered with irrelevant information. Here is what I consider to be the 8 main limitations of Microsoft Forefront TMG's reporting functionality.

7 12, 2009

How Do I Transfer Reports to a Different User in the Web Module?

By | 2009-12-07T03:40:57+00:00 December 7th, 2009|How To, Reports, Uncategorized, Vantage, Web Module|0 Comments

Today I was asked how to transfer one report in the web module to a different user. The obvious reason for this is when someone leaves your company, the reports they had access to need to be transfered to the new person taking over their role. Unfortunately there’s not an easy way to do this via the user interface yet, but it is a planned feature. In the mean time, you can do it by editing an XML file manually.

27 11, 2009

Another Reason Organizations Should Avoid Excessive Internet Blocking

By | 2009-11-27T07:52:01+00:00 November 27th, 2009|How To, Sales and Marketing, Tips and Best Practices, Uncategorized, Web Browsing Analysis|0 Comments

Google Alerts have become an invaluable tool to keep track of WebSpy’s online presence and mentions. I’m also alerted on keywords related to other players in the Internet Security Industry. The last couple of weeks I have noticed quite a steep increase in alerts on a well-known internet blocking and filtering vendor. Majority of these [...]

11 11, 2009

Lessons learned from a hacked Twitter account

By | 2009-11-11T07:09:12+00:00 November 11th, 2009|Articles, Cyber Crime, How To, Tips and Best Practices, Uncategorized, WebSpy, WebSpy News Update|0 Comments

If you follow @WebSpy on Twitter, you would have received a very strange Direct Message (DM) from us yesterday. Something along the lines of "rofl this you?" or "you're on this vid!" or "I found you on here!" Unfortunately, the WebSpy Twitter account fell victim to a phishing scam, and as a result sent phishing spam to all our Twitter followers. We are embarrassed by the incident and we apologize to all of our followers, especially the ones that clicked the link in the DM and were caught by the phishing scam themselves. Here's a rundown of the event in the hope that it will help others know what to look out for.

15 10, 2009

Where does Vantage store data and how do I change it?

By | 2009-10-15T08:05:02+00:00 October 15th, 2009|How To, Log File Analysis, storages, Uncategorized, Vantage, Web Module|0 Comments

In the log file analysis world, we're always dealing with large volumes of data. By default, WebSpy Vantage stores its data, including the storages that you import log files into, somewhere on your c: drive. Changing this location to somewhere with more disk space is therefore one of the first steps that customers like to perform, so I thought I'd write a quick blog to explain the locations you should be aware of and how to change them.