29 06, 2012

Microsoft TMG SQL to Text Script

By | 2012-06-29T14:44:38+00:00 June 29th, 2012|How To, Microsoft Threat Management Gateway, Third Party, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis|0 Comments

Microsoft Forefront TMG logs activity to it's internal SQL Express database. In addition to the extra steps you need to perform to access this database from a remote server, importing data into Vantage is much slower than importing from W3C Text logs. You can easily change the logging from SQL Express to W3C text logs [...]

10 12, 2010

Reporting on Astaro Security Gateway

By | 2010-12-10T15:23:54+00:00 December 10th, 2010|Astaro, Firewall Analysis, How To, Log File Analysis, Reports, Third Party, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]

12 11, 2010

How much do IronPort WSA Appliances eat?

By | 2010-11-12T05:32:47+00:00 November 12th, 2010|cisco, IronPort, Log File Analysis, storages, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

If you are thinking about deploying IronPort Web Security Appliances you probably want to plan how much disk space to budget for with regards to logging and reporting. Every organization is different with regards to the volume of logs it creates, but I’ve averaged three data sets submitted to us by customers to produce the [...]

27 05, 2010

How to report on bandwidth utilization using Cisco devices

By | 2010-05-27T07:59:13+00:00 May 27th, 2010|Firewall Analysis, FlowMonitor, How To, Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|1 Comment

Today I was speaking to a customer that had the following reporting request. "I would like to know how much of my bandwidth is being eaten by each protocol. I will then use this information to determine if circuit may need to be increased due to increased traffic". This customer was collecting syslog messages from a Cisco Firewall, then using WebSpy Vantage to generate reports. There's a simpler method.

16 12, 2009

Microsoft TMG and UAG Released! What is the difference?

By | 2009-12-16T07:31:02+00:00 December 16th, 2009|Firewall Analysis, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Software Updates, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

Most of our customers using Microsoft ISA server are probably aware by now that Microsoft have released the new version of ISA server, which is now re-branded as Microsoft Forefront Threat Management Gateway (TMG). In addition to this, Microsoft has also re-branded its Internet Access Gateway (IAG) to Unified Access Gateway (UAG). […]

20 07, 2009

Convert Microsoft ISA 2006 MSDE logs to WebSpy compatible text logs

By | 2009-07-20T04:23:25+00:00 July 20th, 2009|Analyzer, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Third Party, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|2 Comments

A few customers have experienced some issues converting their ISA MSDE logs to text format using Microsofts MSDEToText.vbs script for ISA 2006. We've therefore created a modified version of the script that creates compatible log files for WebSpy software.

9 07, 2009

Unlocking the Value of your Log Data. 10 tips to help you get started

By | 2009-07-09T03:40:58+00:00 July 9th, 2009|Articles, Uncategorized|0 Comments

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different [...]

18 05, 2009

Microsoft to announce Beta 3 for Threat Management Gateway (the new ISA Server)

By | 2009-05-18T15:51:32+00:00 May 18th, 2009|Analyzer, Firewall Analysis, Live, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Software Updates, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

It sounds like Threat Management Gateway (TMG), the new re-branded version of ISA Server, has been a popular topic at this years TechEd event in the US. According to the latest blog from TMG's Product Unit Manager, David B. Cross, Beta 3 will be released in the next couple of weeks. As for the full release, David says that they are still on track for Q4 this calendar year.