10 12, 2010

Detecting a distributed reflected DNS attack

By | 2010-12-10T15:52:57+00:00 December 10th, 2010|Cyber Crime, Firewall Analysis, How To, Log File Analysis, System Administration, Uncategorized, Vantage|0 Comments

The other night as I was getting ready to sleep, I received an email from the host of my personal Linux VPS saying that I had exceeded my monthly transfer quota. I didn't pay much mind to the warning, as the excess transfer was insignificant, and at that time I was too tired to care. I closed my email, got into bed and fell asleep.

10 12, 2010

Reporting on Astaro Security Gateway

By | 2010-12-10T15:23:54+00:00 December 10th, 2010|Astaro, Firewall Analysis, How To, Log File Analysis, Reports, Third Party, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]

27 10, 2010

Watch your TMG's waist line. Switch log format and reduce fat now!

By | 2010-10-27T04:57:46+00:00 October 27th, 2010|Firewall Analysis, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, storages, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

We often recommend customers using Microsoft ISA or TMG switch their logging to W3C text file, in order to get the best possible import speed, and also because the text logs are much easier to access from a remote machine (see my previous article on accessing TMG’s SQL Express Log database). Logging to the default [...]

12 10, 2010

Vantage Update 2.2.0.55 (Clearswift, Palo Alto Networks, WatchGuard and more)

By | 2010-10-12T07:25:56+00:00 October 12th, 2010|cisco, ClearSwift, Firewall Analysis, FlowMonitor, IronPort, Loaders, Log File Analysis, Microsoft ISA Server, Partners, Software Updates, Third Party, Uncategorized, Vantage, WebSpy News Update|0 Comments

We’ve just released an auto update for the Vantage software range. This release includes some new log format additions, and some fixes to existing formats. […]

29 07, 2010

Microsoft Forefront TMG logs size fields the wrong way around

By | 2010-07-29T04:49:04+00:00 July 29th, 2010|Firewall Analysis, Log File Analysis, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

If you’re using Microsoft Forefront Threat Management Gateway, there is a bug in the logging that causes Bytes Sent and Bytes Received to be logged in reverse. This seems to only affect the Web Proxy logs – both SQL and W3c . We noticed in a few web reports, that people were generally uploading a [...]

19 07, 2010

Why there is so much anonymous traffic in Microsoft TMG and ISA logs

By | 2010-07-19T03:18:29+00:00 July 19th, 2010|Aliases, Firewall Analysis, How To, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|5 Comments

One of the most common questions we get asked by users of Microsoft TMG and ISA is why there is so much traffic attributed to the Anonymous user. Even though unauthenticated access to the web has been disabled, they still see the ‘Anonymous’ user as one of the top users in their reports. So let’s [...]

18 06, 2010

Video: How to use WebSpy Vantage to report on IronPort log files

By | 2010-06-18T02:01:16+00:00 June 18th, 2010|Aliases, Firewall Analysis, How To, IronPort, Log File Analysis, Reports, Scheduled Tasks, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, Web Module, WebSpy|0 Comments

I’ve produced a video on how to use WebSpy Vantage to report on IronPort’s Web Security Appliance’s access log files. It is quite a detailed look at the key tasks involved in setting up and using WebSpy Vantage with IronPort WSA access logs, and is therefore divided into several parts. The videos take you through [...]

11 06, 2010

Accessing Microsoft Forefront TMG's Log Files (SQL Express)

By | 2010-06-11T06:54:59+00:00 June 11th, 2010|Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft Threat Management Gateway, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|1 Comment

If you need to analyze and report on Microsoft Forefront Threat Management Gateway log files, the most common stumbling block is enabling access to the default SQL Express databases that contains the firewall and web proxy log files. The log databases are stored in an SQL Express instance named MSFW. By default these databases cannot [...]

27 05, 2010

How to report on bandwidth utilization using Cisco devices

By | 2010-05-27T07:59:13+00:00 May 27th, 2010|Firewall Analysis, FlowMonitor, How To, Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|1 Comment

Today I was speaking to a customer that had the following reporting request. "I would like to know how much of my bandwidth is being eaten by each protocol. I will then use this information to determine if circuit may need to be increased due to increased traffic". This customer was collecting syslog messages from a Cisco Firewall, then using WebSpy Vantage to generate reports. There's a simpler method.

12 03, 2010

Vantage Update 2.2.0.29 – New Fields for IronPort

By | 2010-03-12T06:55:01+00:00 March 12th, 2010|Firewall Analysis, IronPort, Loaders, Log File Analysis, Software Updates, System Administration, Uncategorized, Vantage, Web Browsing Analysis|0 Comments

We have just added support for the 'Group' field in IronPort's access logs. You can add this field to your logs by adding %g in the 'Custom Fields' edit box. We have also added support for the custom fields Body Request Size and Body Response Size.