A few customers have experienced some issues converting their ISA MSDE logs to text format using Microsofts MSDEToText.vbs script for ISA 2006. We’ve therefore created a modified version of the script that creates compatible log files for WebSpy software.
I was conducting a demonstration the other day on how to use a few tricks in WebSpy Vantage to filter out noise and clutter from web reports. If you have ever looked through the raw list of web sites visited by people in your organization, I’m sure you know what I mean.
Watching a single video on YouTube will probably generate a list of about three to five sites such as lax-v41.lax.youtube.com, www.youtube.com, img.youtube.com, and so on. Your list of top sites also probably contains hits to ad servers and tracking servers, such as doubleclick.net, google-analytics.com and imrworldwide.com. All this clutter gets in the way of determining what sites were ‘intentionally’ visited.
In previous blogs I have covered why internet access is so important in the workplace, why blocking and filtering should be minimized, and why monitoring is preferred. Today I thought I’d focus on the specific benefits of monitoring and reporting on log files. To some it might be obvious, but plenty of search queries used …
A couple of weeks ago I posted a blog regarding Microsoft’s upcoming Beta 3 release of Forefront Threat Management Gateway (TMG) which will be replacing Microsoft ISA server. Well, it’s now been released and can be downloaded from the Microsoft Download Center.
It sounds like Threat Management Gateway (TMG), the new re-branded version of ISA Server, has been a popular topic at this years TechEd event in the US.
According to the latest blog from TMG’s Product Unit Manager, David B. Cross, Beta 3 will be released in the next couple of weeks. As for the full release, David says that they are still on track for Q4 this calendar year.
We’ve made a modification to Analyzer’s Sophos loader so that it takes the value from the action field to determine blocked/allowed.
The fix can be applied to WebSpy Analyzer Giga 2.3, Analyzer Premium 4.3 or Analyzer Standard 4.3
I’m frequently asked about the best way to setup and report on file or folder accesses. In other words, I have a bunch of confidential files sitting on my network and I want to know who is accessing them. So here it is (you might want to grab a coffee first!).