About admin

This author has not yet filled in any details.
So far admin has created 52 blog entries.
11 11, 2009

Lessons learned from a hacked Twitter account

By | 2009-11-11T07:09:12+00:00 November 11th, 2009|Articles, Cyber Crime, How To, Tips and Best Practices, Uncategorized, WebSpy, WebSpy News Update|0 Comments

If you follow @WebSpy on Twitter, you would have received a very strange Direct Message (DM) from us yesterday. Something along the lines of "rofl this you?" or "you're on this vid!" or "I found you on here!" Unfortunately, the WebSpy Twitter account fell victim to a phishing scam, and as a result sent phishing spam to all our Twitter followers. We are embarrassed by the incident and we apologize to all of our followers, especially the ones that clicked the link in the DM and were caught by the phishing scam themselves. Here's a rundown of the event in the hope that it will help others know what to look out for.

15 10, 2009

Where does Vantage store data and how do I change it?

By | 2009-10-15T08:05:02+00:00 October 15th, 2009|How To, Log File Analysis, storages, Uncategorized, Vantage, Web Module|0 Comments

In the log file analysis world, we're always dealing with large volumes of data. By default, WebSpy Vantage stores its data, including the storages that you import log files into, somewhere on your c: drive. Changing this location to somewhere with more disk space is therefore one of the first steps that customers like to perform, so I thought I'd write a quick blog to explain the locations you should be aware of and how to change them.

14 10, 2009

Microsoft Forefront TMG Release Candidate now available

By | 2009-10-14T01:00:34+00:00 October 14th, 2009|Firewall Analysis, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Third Party, Uncategorized, Vantage, Web Browsing Analysis, WebSpy, WebSpy News Update|0 Comments

Microsoft have announced the availability of Microsoft Forefront Threat Management Gateway (TMG) Release Candidate (RC). This is the final public release of TMG before it is made available to purchase. If you're considering upgrading your ISA Server to TMG, this means that you can start your deployment using the Release Candidate, and simply switch it to a licenced version with no additional configuration changes once the full release is available.

9 09, 2009

Exciting New Features in Vantage Update

By | 2009-09-09T07:27:29+00:00 September 9th, 2009|Loaders, Log File Analysis, Microsoft Threat Management Gateway, Scheduled Tasks, Software Updates, Uncategorized, Vantage, WebSpy, WebSpy News Update|0 Comments

Attention all Vantage customers (and triallers). We've just released build as an auto-update. This build includes new features such as scheduled data purge, support for Microsoft Forefront Threat Management Gateway, and scheduling CSV imports into your Organizational structure.

14 08, 2009

Increase importing speed by utilizing dates in log file names

By | 2009-08-14T06:21:10+00:00 August 14th, 2009|How To, Log File Analysis, Uncategorized, Vantage, WebSpy|0 Comments

Using Date Modifiers in file masks are a great way to increase the speed of your imports as they remove all the logs you don’t care about from the import list. If you're using WebSpy Vantage, you are probably interested in filtering your log file imports by date (only import files from the month of June for example). The obvious way to do this is to specify a date filter using the filters page in the Input Wizard. The problem is Vantage will still check every record in every log file being imported to see if it matches the date filter. If you have months or years worth of logs in the folder being imported, that's a lot of data that Vantage has to pointlessly sift through. The good news is, if your log files contain the date in their file name, then you can use file masks to instruct Vantage to never touch these unwanted files.

11 08, 2009

Video: Setup a complete Internet monitoring solution in less than 15 minutes!

By | 2009-08-11T07:59:31+00:00 August 11th, 2009|Analyzer, How To, Live, Log File Analysis, Sentinel, Uncategorized, Web Browsing Analysis, WebSpy|0 Comments

Here's a video I put together demonstrating how to get up and running with a complete monitoring and reporting solution in less than 15 minutes. The video demonstrates three products: WebSpy Sentinel, for complete data capture, WebSpy Live for real time alerts, and WebSpy Analyzer Standard for analysis and reporting.

20 07, 2009

Convert Microsoft ISA 2006 MSDE logs to WebSpy compatible text logs

By | 2009-07-20T04:23:25+00:00 July 20th, 2009|Analyzer, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Third Party, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|2 Comments

A few customers have experienced some issues converting their ISA MSDE logs to text format using Microsofts MSDEToText.vbs script for ISA 2006. We've therefore created a modified version of the script that creates compatible log files for WebSpy software.