7 10, 2009

How to Improve Public Proxy Management and Control

By | 2009-10-07T04:28:28+00:00 October 7th, 2009|How To, Tips and Best Practices, Uncategorized|0 Comments

Using public proxies generally involves browsing to a public proxy website to request access to another site, usually blocked or prohibited by organizational policy. When accessing sites in this fashion, firewalls, filtering devices and monitoring solutions are only aware that an employee, or student, has accessed the public proxy site, and not the actual end [...]

29 09, 2009

How to Educate your Workforce and Strengthen Security with Internet Monitoring

By | 2009-09-29T08:03:38+00:00 September 29th, 2009|How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage|0 Comments

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large [...]

14 08, 2009

Increase importing speed by utilizing dates in log file names

By | 2009-08-14T06:21:10+00:00 August 14th, 2009|How To, Log File Analysis, Uncategorized, Vantage, WebSpy|0 Comments

Using Date Modifiers in file masks are a great way to increase the speed of your imports as they remove all the logs you don’t care about from the import list. If you're using WebSpy Vantage, you are probably interested in filtering your log file imports by date (only import files from the month of June for example). The obvious way to do this is to specify a date filter using the filters page in the Input Wizard. The problem is Vantage will still check every record in every log file being imported to see if it matches the date filter. If you have months or years worth of logs in the folder being imported, that's a lot of data that Vantage has to pointlessly sift through. The good news is, if your log files contain the date in their file name, then you can use file masks to instruct Vantage to never touch these unwanted files.

11 08, 2009

Video: Setup a complete Internet monitoring solution in less than 15 minutes!

By | 2009-08-11T07:59:31+00:00 August 11th, 2009|Analyzer, How To, Live, Log File Analysis, Sentinel, Uncategorized, Web Browsing Analysis, WebSpy|0 Comments

Here's a video I put together demonstrating how to get up and running with a complete monitoring and reporting solution in less than 15 minutes. The video demonstrates three products: WebSpy Sentinel, for complete data capture, WebSpy Live for real time alerts, and WebSpy Analyzer Standard for analysis and reporting.

20 07, 2009

Convert Microsoft ISA 2006 MSDE logs to WebSpy compatible text logs

By | 2009-07-20T04:23:25+00:00 July 20th, 2009|Analyzer, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Third Party, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|2 Comments

A few customers have experienced some issues converting their ISA MSDE logs to text format using Microsofts MSDEToText.vbs script for ISA 2006. We've therefore created a modified version of the script that creates compatible log files for WebSpy software.

16 07, 2009

Video: How To Remove Clutter From Your Web Reports

By | 2009-07-16T09:10:02+00:00 July 16th, 2009|How To, Log File Analysis, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

I was conducting a demonstration the other day on how to use a few tricks in WebSpy Vantage to filter out noise and clutter from web reports. If you have ever looked through the raw list of web sites visited by people in your organization, I'm sure you know what I mean. Watching a single video on YouTube will probably generate a list of about three to five sites such as lax-v41.lax.youtube.com, www.youtube.com, img.youtube.com, and so on. Your list of top sites also probably contains hits to ad servers and tracking servers, such as doubleclick.net, google-analytics.com and imrworldwide.com. All this clutter gets in the way of determining what sites were 'intentionally' visited.

14 05, 2009

Migrating WebSpy Vantage to a different machine

By | 2009-05-14T15:39:45+00:00 May 14th, 2009|How To, Scheduled Tasks, Uncategorized, Vantage, WebSpy|0 Comments

Imagine you've just spent the last six months setting up storages, aliases, profiles, scheduled tasks and so on, and you need to migrate all this to another machine. Of course you could go to the Aliases screen and click 'Save Aliases', then go to the new machine and click 'Open Aliases', and repeat for every setting you want to move across. But there is an easier way.

25 03, 2009

Disabling time synchronization between guest and host in Microsoft Virtual PC

By | 2009-03-25T07:29:02+00:00 March 25th, 2009|How To, Third Party, Uncategorized|5 Comments

Microsoft Virtual PC synchronizes the time between the guest and host operating systems. This is great until you have the need to set the clock forward or backwards in your VM, as it snaps back to the current time after about 5 seconds. I went hunting through the options in the Virtual PC UI but didn't find anything related to disabling this option. A bit of googling later and I've got it disabled by adding a few lines of XML to the .vmc file.

11 03, 2009

Counting Emails with Microsoft Exchange 2007 Tracking Logs

By | 2009-03-11T05:45:01+00:00 March 11th, 2009|Email Analysis, How To, Log File Analysis, Microsoft Exchange, Uncategorized, Vantage, WebSpy|0 Comments

Today I've been poking at Microsoft Exchange 2007 tracking logs, asking them the very simple question of 'How many emails have I sent?'. Unforunately, Exchange 2007 tracking logs are not used to simple questions, and are likely to return a complicated and / or misleading answer. But the confusion it seems, all comes down to definitions. Once you understand these definintions, things start to make a bit more sense.