How To: Reporting On File or Folder Accesses

This article is designed to provide information about reporting on file and/or folder access. Confidential files that require protection generally require a sophisticated end point security or file auditing solution, however Microsoft provides a Windows Security Event log that can be configured to report on this information.

Vantage Update 2.2.0.83

We have released an automatic update for the Vantage range of applications. This update includes some new loader formats as well minor fixes and improvements. Of note, this release includes support for the new format of IronPort, Palo Alto Threat and URL filtering, Clearswift Email Appliance, and Infoblox NIOS DNS queries; as well as improvements …

Vantage Video Series: #4 Profiles & Site Categorization

This is the fourth of a series of videos showing you how to configure Vantage in detail. This video follows on from #3, and will cover the Profiles section of the software, and how to use site categorization. WebSpy Vantage Ultimate – Profiles from Fastvue on Vimeo.

Vantage Video Series: #3 Importing, Summaries & Aliases

This is the third of a series of videos showing you how to configure Vantage in detail. In this video we’ll look at how to import some data into a storage, use the Summaries section, and start customizing Aliases. WebSpy Vantage Ultimate – Importing, Summaries and Aliases from Fastvue on Vimeo.

Vantage Video Series: #2 Preflight & Installation

This is the second of a series of videos showing you how to configure Vantage in detail. This video will take you through the system requirements, and the installation of Vantage and the Web Module. WebSpy Vantage Ultimate – Preflight and Installation from Fastvue on Vimeo.

Vantage Video Series: #1 Overview

This is the first of a series of videos showing you how to configure Vantage in detail. This video is a high level overview, giving you a general insight into the software and its different parts. WebSpy Vantage Ultimate Overview from Fastvue on Vimeo.

Creating and Analyzing SonicWALL Log Files

I’ve put together a couple of quick videos to show you how to configure logging on your SonicWALL appliance, and how to import and analyze these log files in WebSpy Vantage. You can also read through these steps on this page: Analyzing SonicWALL log files with WebSpy.

Detecting a distributed reflected DNS attack

The other night as I was getting ready to sleep, I received an email from the host of my personal Linux VPS saying that I had exceeded my monthly transfer quota. I didn’t pay much mind to the warning, as the excess transfer was insignificant, and at that time I was too tired to care. I closed my email, got into bed and fell asleep.

Reporting on Astaro Security Gateway

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log …

How much do IronPort WSA Appliances eat?

If you are thinking about deploying IronPort Web Security Appliances you probably want to plan how much disk space to budget for with regards to logging and reporting. Every organization is different with regards to the volume of logs it creates, but I’ve averaged three data sets submitted to us by customers to produce the …