WebSpy Vantage 3.0 Now Available
WebSpy Vantage 3.0 is now available with improved performance, cleaner web usage reports, an updated user interface and more! Upgrade free today!
WebSpy Vantage 3.0 is now available with improved performance, cleaner web usage reports, an updated user interface and more! Upgrade free today!
Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but [...]
Some log formats contain message fields, or other free-form fields which are not easily displayed in reports and summaries, so although these fields are imported from the log files, they are not displayed in the standard summaries when you run an analysis or create a report template. However, you can still add these fields to [...]
This article is designed to provide information about reporting on file and/or folder access. Confidential files that require protection generally require a sophisticated end point security or file auditing solution, however Microsoft provides a Windows Security Event log that can be configured to report on this information. […]
Event logs have been a feature of the MS Operating System (Windows) since the original release of Windows NT in1993. Designed to provide an audit trail of system use, event logging records the actions that occur within the system, such as users logging in, failure of a component to start, or an attempt to print [...]
In previous blogs I have covered why internet access is so important in the workplace, why blocking and filtering should be minimized, and why monitoring is preferred. Today I thought I’d focus on the specific benefits of monitoring and reporting on log files. To some it might be obvious, but plenty of search queries used [...]
I'm frequently asked about the best way to setup and report on file or folder accesses. In other words, I have a bunch of confidential files sitting on my network and I want to know who is accessing them. So here it is (you might want to grab a coffee first!).