Report Templates: What Makes Up a Node?
In this blog we will look at the construction of a node within the report template, and what you can customize on it. […]
In this blog we will look at the construction of a node within the report template, and what you can customize on it. […]
This is the first in a series of articles on customizing report templates in Vantage. The first step is opening up the existing templates to all of the fields available in your log files, rather than just the base fields, giving you more data to work with. […]
I’ve put together a couple of quick videos to show you how to configure logging on your SonicWALL appliance, and how to import and analyze these log files in WebSpy Vantage. You can also read through these steps on this page: Analyzing SonicWALL log files with WebSpy. […]
Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]
Google recently announced a change to their search process: Google Instant. With Google Instant, users get results as they are typing and watch the results change as their search query changes without ever pressing enter. […]
WebSpy has been working closely with Cisco and the IronPort team over the past few years to develop what we believe is the most intuitive, flexible and fastest reporting solution for Cisco IronPort users. We’ve just completed our ‘WebSpy Reporting for Cisco IronPort’ video. Although this video is aimed at the Cisco channel we’d thought [...]
One of the most common questions we get asked by users of Microsoft TMG and ISA is why there is so much traffic attributed to the Anonymous user. Even though unauthenticated access to the web has been disabled, they still see the ‘Anonymous’ user as one of the top users in their reports. So let’s [...]
Today I was speaking to a customer that had the following reporting request. "I would like to know how much of my bandwidth is being eaten by each protocol. I will then use this information to determine if circuit may need to be increased due to increased traffic". This customer was collecting syslog messages from a Cisco Firewall, then using WebSpy Vantage to generate reports. There's a simpler method.
I’m frequently asked how WebSpy Vantage utilizes a systems CPU resources. Sometimes you may notice Vantage utilizing 100% of your machine's CPU power, and other times it will be hardly touched. So here is an overview of how the software works internally so you can understand when your CPUs will and won’t be pushed.
To set things straight from the get-go, this is not a plug about our partner program, margin structure or reseller support. All the ingredients necessary to bake a successful partner cake are present (and being improved…get ready for some exciting partner announcement in the coming weeks). No, this is simply a very factual overview of [...]