15 02, 2016

Creating a Remote Desktop Report (RDP Connections) with WebSpy Vantage

By | 2016-02-15T06:31:35+00:00 February 15th, 2016|Articles, Firewall Analysis, How To, Log File Analysis, Microsoft Threat Management Gateway, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|Comments Off on Creating a Remote Desktop Report (RDP Connections) with WebSpy Vantage

This article walks through the process of using WebSpy Vantage to create a comprehensive Remote Desktop Report by extracting information about remote desktop sessions (RDP) from your firewall log files. I'm using Firewall logs from Microsoft Forefront TMG, but you could just as easily use logs from other firewalls, such as the packet filter logs from Sophos UTM, or connection end events from Cisco ASA. The general process is the same. Let's get started.

13 02, 2012

Renewing Your WebSpy License

By | 2012-02-13T17:22:12+00:00 February 13th, 2012|Articles, How To, Partners, Software Updates, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Module, WebSpy, WebSpy News Update|0 Comments

When you register your WebSpy subscription license, the software will advise you how many days you have left on your current contract. When the contract expires, the software will stop at the splash-screen in the loading process. You will need to contact your WebSpy representative or reseller to purchase a subscription renewal in order to continue using the software. Once your subscription renewal has been processed by the WebSpy team the software you will need to request a new Unlock Code for your installation in order for it to continue working.

13 02, 2012

Registering WebSpy Vantage Ultimate – Step by Step

By | 2012-02-13T16:50:54+00:00 February 13th, 2012|Articles, How To, Software Updates, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Module, WebSpy, WebSpy News Update|0 Comments

This is a guide for new customers to register their WebSpy Vantage Ultimate software for the first time. The process requires a few simple steps which will be outlined below, followed by some troubleshooting options if you get stuck along the way.

11 11, 2009

Lessons learned from a hacked Twitter account

By | 2009-11-11T07:09:12+00:00 November 11th, 2009|Articles, Cyber Crime, How To, Tips and Best Practices, Uncategorized, WebSpy, WebSpy News Update|0 Comments

If you follow @WebSpy on Twitter, you would have received a very strange Direct Message (DM) from us yesterday. Something along the lines of "rofl this you?" or "you're on this vid!" or "I found you on here!" Unfortunately, the WebSpy Twitter account fell victim to a phishing scam, and as a result sent phishing spam to all our Twitter followers. We are embarrassed by the incident and we apologize to all of our followers, especially the ones that clicked the link in the DM and were caught by the phishing scam themselves. Here's a rundown of the event in the hope that it will help others know what to look out for.

15 07, 2009

Business benefits from monitoring and reporting on Internet, email and network log files

By | 2009-07-15T04:21:42+00:00 July 15th, 2009|Articles, Email Analysis, Firewall Analysis, Log File Analysis, Sales and Marketing, Uncategorized, Web Browsing Analysis, Windows Event Logs|0 Comments

In previous blogs I have covered why internet access is so important in the workplace, why blocking and filtering should be minimized, and why monitoring is preferred. Today I thought I’d focus on the specific benefits of monitoring and reporting on log files. To some it might be obvious, but plenty of search queries used [...]

9 07, 2009

Unlocking the Value of your Log Data. 10 tips to help you get started

By | 2009-07-09T03:40:58+00:00 July 9th, 2009|Articles, Uncategorized|0 Comments

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different [...]