7 09, 2015

Optimizing Log File Size For Analysis And Reporting

By | 2015-09-07T17:13:06+00:00 September 7th, 2015|Astaro, ClearSwift, Email Analysis, Employee Internet Reports, Firewall Analysis, How To, Log File Analysis, Microsoft Exchange, Microsoft IIS, Microsoft ISA Server, Microsoft Threat Management Gateway, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSense, WebSpy, Windows Event Logs|Comments Off on Optimizing Log File Size For Analysis And Reporting

Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but [...]

19 05, 2013

How to Report on Custom Logged Data by adding a Custom Field Node

By | 2013-05-19T06:30:18+00:00 May 19th, 2013|How To, IronPort, Reports, Windows Event Logs|0 Comments

Some log formats contain message fields, or other free-form fields which are not easily displayed in reports and summaries, so although these fields are imported from the log files, they are not displayed in the standard summaries when you run an analysis or create a report template. However, you can still add these fields to [...]

22 04, 2013

How To: Reporting On File or Folder Accesses

By | 2013-04-22T11:25:44+00:00 April 22nd, 2013|How To, Log File Analysis, Reports, Uncategorized, Windows Event Logs|0 Comments

This article is designed to provide information about reporting on file and/or folder access. Confidential files that require protection generally require a sophisticated end point security or file auditing solution, however Microsoft provides a Windows Security Event log that can be configured to report on this information. […]

15 07, 2009

Business benefits from monitoring and reporting on Internet, email and network log files

By | 2009-07-15T04:21:42+00:00 July 15th, 2009|Articles, Email Analysis, Firewall Analysis, Log File Analysis, Sales and Marketing, Uncategorized, Web Browsing Analysis, Windows Event Logs|0 Comments

In previous blogs I have covered why internet access is so important in the workplace, why blocking and filtering should be minimized, and why monitoring is preferred. Today I thought I’d focus on the specific benefits of monitoring and reporting on log files. To some it might be obvious, but plenty of search queries used [...]