8 02, 2010

8 Reasons NOT to Use Microsoft Forefront TMG's Reporting

By | 2010-02-08T06:48:39+00:00 February 8th, 2010|Aliases, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, Web Module, WebSpy|6 Comments

I've been having a look through the reporting functionality included in Microsoft Forefront Threat Management Gateway to find that not much has changed from ISA Server 2006. There is some new information regarding the newly implemented URL categorization and threat management technology, but there is very little flexibility or customization for those with reporting requirements beyond general overviews cluttered with irrelevant information. Here is what I consider to be the 8 main limitations of Microsoft Forefront TMG's reporting functionality.

16 12, 2009

Microsoft TMG and UAG Released! What is the difference?

By | 2009-12-16T07:31:02+00:00 December 16th, 2009|Firewall Analysis, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Software Updates, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

Most of our customers using Microsoft ISA server are probably aware by now that Microsoft have released the new version of ISA server, which is now re-branded as Microsoft Forefront Threat Management Gateway (TMG). In addition to this, Microsoft has also re-branded its Internet Access Gateway (IAG) to Unified Access Gateway (UAG). […]

23 10, 2009

How should Employees use Social Media?

By | 2009-10-23T07:24:32+00:00 October 23rd, 2009|Sales and Marketing, Tips and Best Practices, Uncategorized|0 Comments

WebProNews is an online news site covering the latest developments in search engines, SEO, social media marketing and online advertising and I have been subscribing to them for many odd years. Recently they have been posting interviews, surveys and comments in relation to the use of social media. New research from Robert Half Technology indicates [...]

14 10, 2009

Microsoft Forefront TMG Release Candidate now available

By | 2009-10-14T01:00:34+00:00 October 14th, 2009|Firewall Analysis, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Third Party, Uncategorized, Vantage, Web Browsing Analysis, WebSpy, WebSpy News Update|0 Comments

Microsoft have announced the availability of Microsoft Forefront Threat Management Gateway (TMG) Release Candidate (RC). This is the final public release of TMG before it is made available to purchase. If you're considering upgrading your ISA Server to TMG, this means that you can start your deployment using the Release Candidate, and simply switch it to a licenced version with no additional configuration changes once the full release is available.

11 08, 2009

Video: Setup a complete Internet monitoring solution in less than 15 minutes!

By | 2009-08-11T07:59:31+00:00 August 11th, 2009|Analyzer, How To, Live, Log File Analysis, Sentinel, Uncategorized, Web Browsing Analysis, WebSpy|0 Comments

Here's a video I put together demonstrating how to get up and running with a complete monitoring and reporting solution in less than 15 minutes. The video demonstrates three products: WebSpy Sentinel, for complete data capture, WebSpy Live for real time alerts, and WebSpy Analyzer Standard for analysis and reporting.

16 07, 2009

Video: How To Remove Clutter From Your Web Reports

By | 2009-07-16T09:10:02+00:00 July 16th, 2009|How To, Log File Analysis, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

I was conducting a demonstration the other day on how to use a few tricks in WebSpy Vantage to filter out noise and clutter from web reports. If you have ever looked through the raw list of web sites visited by people in your organization, I'm sure you know what I mean. Watching a single video on YouTube will probably generate a list of about three to five sites such as lax-v41.lax.youtube.com, www.youtube.com, img.youtube.com, and so on. Your list of top sites also probably contains hits to ad servers and tracking servers, such as doubleclick.net, google-analytics.com and imrworldwide.com. All this clutter gets in the way of determining what sites were 'intentionally' visited.

9 07, 2009

Unlocking the Value of your Log Data. 10 tips to help you get started

By | 2009-07-09T03:40:58+00:00 July 9th, 2009|Articles, Uncategorized|0 Comments

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different [...]