This article walks through the process of using WebSpy Vantage to create a comprehensive Remote Desktop Report by extracting information about remote desktop sessions (RDP) from your firewall log files. I'm using Firewall logs from Microsoft Forefront TMG, but you could just as easily use logs from other firewalls, such as the packet filter logs from Sophos UTM, or connection end events from Cisco ASA. The general process is the same. Let's get started.
When you register your WebSpy subscription license, the software will advise you how many days you have left on your current contract. When the contract expires, the software will stop at the splash-screen in the loading process. You will need to contact your WebSpy representative or reseller to purchase a subscription renewal in order to continue using the software. Once your subscription renewal has been processed by the WebSpy team the software you will need to request a new Unlock Code for your installation in order for it to continue working.
This is a guide for new customers to register their WebSpy Vantage Ultimate software for the first time. The process requires a few simple steps which will be outlined below, followed by some troubleshooting options if you get stuck along the way.
Today, I had the pleasure of attending Western Australian Internet Association’s first (out of four) breakfast events. The main topic on the agenda was E-Security and a panel of expert, representing commercial, government and educational bodies, were there to shed a light on the latest developments. […]
In previous blogs I have covered why internet access is so important in the workplace, why blocking and filtering should be minimized, and why monitoring is preferred. Today I thought I’d focus on the specific benefits of monitoring and reporting on log files. To some it might be obvious, but plenty of search queries used [...]
This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different [...]