20 05, 2013

How to Report on Enterprise Storages – Vantage Guidelines

By | 2013-05-20T06:08:13+00:00 May 20th, 2013|How To, storages, Tips and Best Practices, Vantage|1 Comment

Vantage Giga can be a very effective tool for generating useful management reports on Internet, email, and network activity in large organizations. Because large organizations generally have a large volume of log data to report on, here are a few guidelines on how to report on enterprise storages to help make the reporting process as [...]

20 05, 2013

Management Employee Internet Reports – Enterprise Guidelines

By | 2013-05-20T06:08:02+00:00 May 20th, 2013|How To, Reports, Tips and Best Practices, Vantage|0 Comments

Vantage Ultimate can be a very effective tool for generating useful management employee internet reports on Internet, email, and network activity in large organizations. Because large organizations generally have a large volume of log data to report on, here are a few guidelines to help make the reporting process as efficient as possible. […]

22 04, 2013

How To: Reporting On File or Folder Accesses

By | 2013-04-22T11:25:44+00:00 April 22nd, 2013|How To, Log File Analysis, Reports, Uncategorized, Windows Event Logs|0 Comments

This article is designed to provide information about reporting on file and/or folder access. Confidential files that require protection generally require a sophisticated end point security or file auditing solution, however Microsoft provides a Windows Security Event log that can be configured to report on this information. […]

14 06, 2010

Government sanctioned ISP Filtering & Monitoring – Is Australia going Orweillian?

By | 2010-06-14T07:30:35+00:00 June 14th, 2010|Uncategorized, WebSpy News Update|0 Comments

It was a bright cold day in June, and the clocks were striking thirteen as I browsed Google Sci/Tech News and came across ZDNet’s ‘Govt wants ISPs to record browsing history’ article. The Australian Attorney-General’s Department recently confirmed ongoing discussions about implementing a data retention regime in Australia requiring ISPs to hold customers web browsing [...]

12 05, 2010

Dedicated WebSpy and Forefront TMG pages – Everything you need to know about TMG Log Reporting

By | 2010-05-12T04:14:53+00:00 May 12th, 2010|How To, Microsoft Threat Management Gateway, Reports, Sales and Marketing, Tips and Best Practices, Uncategorized, WebSpy|0 Comments

Microsoft Forefront Threat Management Gateway (TMG) popularity is starting to pick up. WebSpy added support for analyzing and reporting on TMG logs even before the public release and have been improving our compatibility ever since. […]