Optimizing Log File Size For Analysis And Reporting

Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but …

How to Report on Custom Logged Data by adding a Custom Field Node

Some log formats contain message fields, or other free-form fields which are not easily displayed in reports and summaries, so although these fields are imported from the log files, they are not displayed in the standard summaries when you run an analysis or create a report template. However, you can still add these fields to …

How To: Reporting On File or Folder Accesses

This article is designed to provide information about reporting on file and/or folder access. Confidential files that require protection generally require a sophisticated end point security or file auditing solution, however Microsoft provides a Windows Security Event log that can be configured to report on this information.

Event Log Reporting using Vantage

Event logs have been a feature of the MS Operating System (Windows) since the original release of Windows NT in1993. Designed to provide an audit trail of system use, event logging records the actions that occur within the system, such as users logging in, failure of a component to start, or an attempt to print …

How to report on who accessed a file or folder

I’m frequently asked about the best way to setup and report on file or folder accesses. In other words, I have a bunch of confidential files sitting on my network and I want to know who is accessing them. So here it is (you might want to grab a coffee first!).