27 03, 2017

Analyzing Blocked Traffic in Log Files for Suspicious Activity

By | 2017-03-27T02:14:54+00:00 March 27th, 2017|Firewall Analysis, How To, Log File Analysis, Sophos, System Administration, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|Comments Off on Analyzing Blocked Traffic in Log Files for Suspicious Activity

Using log file analysis to report on blocked traffic can help troubleshoot issues with website and application behavior, and potential security issues. This article shows how to use WebSpy Vantage to identify suspicious activity from blocked traffic log events.

7 09, 2015

Optimizing Log File Size For Analysis And Reporting

By | 2015-09-07T17:13:06+00:00 September 7th, 2015|Astaro, ClearSwift, Email Analysis, Employee Internet Reports, Firewall Analysis, How To, Log File Analysis, Microsoft Exchange, Microsoft IIS, Microsoft ISA Server, Microsoft Threat Management Gateway, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSense, WebSpy, Windows Event Logs|Comments Off on Optimizing Log File Size For Analysis And Reporting

Firewalls and proxies generate a lot of log data. Multiple gigabytes per day are commonplace now. The log files themselves are generally simple flat text files. Their size comes from the sheer volume of entries, not from being rich data types. The log file size not only consumes disk space during logging, storing, and archiving, but [...]