25 01, 2011

Running Multiple Instances of Vantage

By | 2011-01-25T10:20:43+00:00 January 25th, 2011|How To, Reports, storages, Uncategorized, Vantage, WebSpy|0 Comments

In the latest Vantage auto-update (2.2.0.68), we’ve included an experimental feature to allow multiple instances of WebSpy Vantage to run on the same operating system. The goal here is to run reports at the same time using multiple instances of the application. To do this, we have also include a second experimental feature to disable [...]

10 12, 2010

Reporting on Astaro Security Gateway

By | 2010-12-10T15:23:54+00:00 December 10th, 2010|Astaro, Firewall Analysis, How To, Log File Analysis, Reports, Third Party, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]

29 07, 2010

Vantage Update 2.2.0.48 – New Loaders, Features and Fixes

By | 2010-07-29T06:43:53+00:00 July 29th, 2010|IronPort, Loaders, Microsoft Threat Management Gateway, Reports, Software Updates, Uncategorized, Vantage, Web Module, WebSpy, WebSpy News Update|0 Comments

We’ve just released an update to the Vantage range of application, including the Web Module. This release will be welcomed with open arms by many customers for the following reasons: General usability improvements in the Web Module Multi-select / delete options, Ajax progress indicators to avoid page refreshes, export from Dynamics Report tab and more [...]

29 07, 2010

Microsoft Forefront TMG logs size fields the wrong way around

By | 2010-07-29T04:49:04+00:00 July 29th, 2010|Firewall Analysis, Log File Analysis, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

If you’re using Microsoft Forefront Threat Management Gateway, there is a bug in the logging that causes Bytes Sent and Bytes Received to be logged in reverse. This seems to only affect the Web Proxy logs – both SQL and W3c . We noticed in a few web reports, that people were generally uploading a [...]

19 07, 2010

Why there is so much anonymous traffic in Microsoft TMG and ISA logs

By | 2010-07-19T03:18:29+00:00 July 19th, 2010|Aliases, Firewall Analysis, How To, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|5 Comments

One of the most common questions we get asked by users of Microsoft TMG and ISA is why there is so much traffic attributed to the Anonymous user. Even though unauthenticated access to the web has been disabled, they still see the ‘Anonymous’ user as one of the top users in their reports. So let’s [...]

18 06, 2010

Video: How to use WebSpy Vantage to report on IronPort log files

By | 2010-06-18T02:01:16+00:00 June 18th, 2010|Aliases, Firewall Analysis, How To, IronPort, Log File Analysis, Reports, Scheduled Tasks, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, Web Module, WebSpy|0 Comments

I’ve produced a video on how to use WebSpy Vantage to report on IronPort’s Web Security Appliance’s access log files. It is quite a detailed look at the key tasks involved in setting up and using WebSpy Vantage with IronPort WSA access logs, and is therefore divided into several parts. The videos take you through [...]

27 05, 2010

How to report on bandwidth utilization using Cisco devices

By | 2010-05-27T07:59:13+00:00 May 27th, 2010|Firewall Analysis, FlowMonitor, How To, Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|1 Comment

Today I was speaking to a customer that had the following reporting request. "I would like to know how much of my bandwidth is being eaten by each protocol. I will then use this information to determine if circuit may need to be increased due to increased traffic". This customer was collecting syslog messages from a Cisco Firewall, then using WebSpy Vantage to generate reports. There's a simpler method.

21 05, 2010

How WebSpy Vantage uses your CPUs

By | 2010-05-21T07:02:32+00:00 May 21st, 2010|Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

I’m frequently asked how WebSpy Vantage utilizes a systems CPU resources. Sometimes you may notice Vantage utilizing 100% of your machine's CPU power, and other times it will be hardly touched. So here is an overview of how the software works internally so you can understand when your CPUs will and won’t be pushed.

12 05, 2010

Dedicated WebSpy and Forefront TMG pages – Everything you need to know about TMG Log Reporting

By | 2010-05-12T04:14:53+00:00 May 12th, 2010|How To, Microsoft Threat Management Gateway, Reports, Sales and Marketing, Tips and Best Practices, Uncategorized, WebSpy|0 Comments

Microsoft Forefront Threat Management Gateway (TMG) popularity is starting to pick up. WebSpy added support for analyzing and reporting on TMG logs even before the public release and have been improving our compatibility ever since. […]

16 04, 2010

3 Simple Reasons Why Resellers Want WebSpy

By | 2010-04-16T07:48:58+00:00 April 16th, 2010|Log File Analysis, Microsoft ISA Server, Partners, Reports, Sales and Marketing, Uncategorized|0 Comments

To set things straight from the get-go, this is not a plug about our partner program, margin structure or reseller support. All the ingredients necessary to bake a successful partner cake are present (and being improved…get ready for some exciting partner announcement in the coming weeks). No, this is simply a very factual overview of [...]