13 12, 2017

WebSpy Vantage 3.0 Now Available

By | 2017-12-13T03:06:17+00:00 December 13th, 2017|Employee Internet Reports, IronPort, Log File Analysis, Organization, Palo Alto Networks, Reports, Software Updates, System Administration, Vantage, Web Browsing Analysis, Web Module, WebSpy, WebSpy News Update, Windows Event Logs|Comments Off on WebSpy Vantage 3.0 Now Available

WebSpy Vantage 3.0 is now available with improved performance, cleaner web usage reports, an updated user interface and more! Upgrade free today!

27 03, 2017

Analyzing Blocked Traffic in Log Files for Suspicious Activity

By | 2017-03-27T02:14:54+00:00 March 27th, 2017|Firewall Analysis, How To, Log File Analysis, Sophos, System Administration, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|Comments Off on Analyzing Blocked Traffic in Log Files for Suspicious Activity

Using log file analysis to report on blocked traffic can help troubleshoot issues with website and application behavior, and potential security issues. This article shows how to use WebSpy Vantage to identify suspicious activity from blocked traffic log events.

3 02, 2016

Distributing Web Activity Reports to Managers Using WebSpy Vantage

By | 2016-02-03T06:28:11+00:00 February 3rd, 2016|Employee Internet Reports, Firewall Analysis, How To, Log File Analysis, Reports, System Administration, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|Comments Off on Distributing Web Activity Reports to Managers Using WebSpy Vantage

This video takes you through some new features in WebSpy Vantage to help distribute web activity reports to managers throughout your organization. These new features include: Manually Assigned Group Managers Redesigned Separation and Permission workflow Manager Reports Manually Assigned Group Managers WebSpy Vantage has always had the ability to report on Departments, Cities, or any [...]

15 12, 2015

Web Activity Reporting with Palo Alto Firewall Log Files

By | 2015-12-15T08:06:15+00:00 December 15th, 2015|Employee Internet Reports, Firewall Analysis, How To, Log File Analysis, Palo Alto Networks, Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|Comments Off on Web Activity Reporting with Palo Alto Firewall Log Files

Using WebSpy Vantage to analyze and report across your Palo Alto Firewall deployment is a great way to keep on top of web usage throughout your organization. This guide will take you through the process of configuring Palo Alto Firewalls and WebSpy Vantage to produce accurate and meaningful web activity reports that can be utilized [...]

7 09, 2015

Optimizing Log File Size For Analysis And Reporting

By | 2015-09-07T17:13:06+00:00 September 7th, 2015|Astaro, ClearSwift, Email Analysis, Employee Internet Reports, Firewall Analysis, How To, Log File Analysis, Microsoft Exchange, Microsoft IIS, Microsoft ISA Server, Microsoft Threat Management Gateway, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSense, WebSpy, Windows Event Logs|Comments Off on Optimizing Log File Size For Analysis And Reporting

Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but [...]

22 09, 2014

Aliases are awesome. See why you should use them!

By | 2014-09-22T23:51:04+00:00 September 22nd, 2014|Aliases, Employee Internet Reports, How To, Log File Analysis, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|Comments Off on Aliases are awesome. See why you should use them!

What is an Alias? As defined by Google, in computing terms, an alias is: An alternative name or label that refers to a file, command, address, or other item, and can be used to locate or access it. When it comes to WebSpy Vantage, an alias takes log data that does not make sense and [...]