Optimizing Log File Size For Analysis And Reporting

Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but …

How I used log file analysis to safely retire a legacy web site

Legacy applications and websites remain in place for longer than they should, often because there is a suspicion that they are still being used. Meanwhile, the application is hanging around consuming IT resources that could be put towards a more useful purpose. To safely decommission a web site or service, you need to be sure …

How to Educate your Workforce and Strengthen Security with Internet Monitoring

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large …

Convert Microsoft ISA 2006 MSDE logs to WebSpy compatible text logs

A few customers have experienced some issues converting their ISA MSDE logs to text format using Microsofts MSDEToText.vbs script for ISA 2006. We’ve therefore created a modified version of the script that creates compatible log files for WebSpy software.

Unlocking the Value of your Log Data. 10 tips to help you get started

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different …