7 09, 2015

Optimizing Log File Size For Analysis And Reporting

By | 2015-09-07T17:13:06+00:00 September 7th, 2015|Astaro, ClearSwift, Email Analysis, Employee Internet Reports, Firewall Analysis, How To, Log File Analysis, Microsoft Exchange, Microsoft IIS, Microsoft ISA Server, Microsoft Threat Management Gateway, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSense, WebSpy, Windows Event Logs|Comments Off on Optimizing Log File Size For Analysis And Reporting

Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but [...]

27 08, 2014

How I used log file analysis to safely retire a legacy web site

By | 2014-08-27T07:30:05+00:00 August 27th, 2014|Firewall Analysis, Log File Analysis, Microsoft IIS, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|Comments Off on How I used log file analysis to safely retire a legacy web site

Legacy applications and websites remain in place for longer than they should, often because there is a suspicion that they are still being used. Meanwhile, the application is hanging around consuming IT resources that could be put towards a more useful purpose. To safely decommission a web site or service, you need to be sure [...]

29 09, 2009

How to Educate your Workforce and Strengthen Security with Internet Monitoring

By | 2009-09-29T08:03:38+00:00 September 29th, 2009|How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage|0 Comments

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large [...]

20 07, 2009

Convert Microsoft ISA 2006 MSDE logs to WebSpy compatible text logs

By | 2009-07-20T04:23:25+00:00 July 20th, 2009|Analyzer, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Third Party, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|2 Comments

A few customers have experienced some issues converting their ISA MSDE logs to text format using Microsofts MSDEToText.vbs script for ISA 2006. We've therefore created a modified version of the script that creates compatible log files for WebSpy software.

9 07, 2009

Unlocking the Value of your Log Data. 10 tips to help you get started

By | 2009-07-09T03:40:58+00:00 July 9th, 2009|Articles, Uncategorized|0 Comments

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different [...]