22 12, 2010

Creating and Analyzing SonicWALL Log Files

By | 2010-12-22T15:28:52+00:00 December 22nd, 2010|Firewall Analysis, How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

I’ve put together a couple of quick videos to show you how to configure logging on your SonicWALL appliance, and how to import and analyze these log files in WebSpy Vantage. You can also read through these steps on this page: Analyzing SonicWALL log files with WebSpy. […]

10 12, 2010

Reporting on Astaro Security Gateway

By | 2010-12-10T15:23:54+00:00 December 10th, 2010|Astaro, Firewall Analysis, How To, Log File Analysis, Reports, Third Party, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]

2 09, 2010

Advantages of using WebSpy with Cisco IronPort – New Video

By | 2010-09-02T05:55:08+00:00 September 2nd, 2010|IronPort, Uncategorized, Vantage|0 Comments

WebSpy has been working closely with Cisco and the IronPort team over the past few years to develop what we believe is the most intuitive, flexible and fastest reporting solution for Cisco IronPort users. We’ve just completed our ‘WebSpy Reporting for Cisco IronPort’ video. Although this video is aimed at the Cisco channel we’d thought [...]

19 07, 2010

Why there is so much anonymous traffic in Microsoft TMG and ISA logs

By | 2010-07-19T03:18:29+00:00 July 19th, 2010|Aliases, Firewall Analysis, How To, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|5 Comments

One of the most common questions we get asked by users of Microsoft TMG and ISA is why there is so much traffic attributed to the Anonymous user. Even though unauthenticated access to the web has been disabled, they still see the ‘Anonymous’ user as one of the top users in their reports. So let’s [...]

27 05, 2010

How to report on bandwidth utilization using Cisco devices

By | 2010-05-27T07:59:13+00:00 May 27th, 2010|Firewall Analysis, FlowMonitor, How To, Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|1 Comment

Today I was speaking to a customer that had the following reporting request. "I would like to know how much of my bandwidth is being eaten by each protocol. I will then use this information to determine if circuit may need to be increased due to increased traffic". This customer was collecting syslog messages from a Cisco Firewall, then using WebSpy Vantage to generate reports. There's a simpler method.

21 05, 2010

How WebSpy Vantage uses your CPUs

By | 2010-05-21T07:02:32+00:00 May 21st, 2010|Reports, System Administration, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

I’m frequently asked how WebSpy Vantage utilizes a systems CPU resources. Sometimes you may notice Vantage utilizing 100% of your machine's CPU power, and other times it will be hardly touched. So here is an overview of how the software works internally so you can understand when your CPUs will and won’t be pushed.

16 04, 2010

3 Simple Reasons Why Resellers Want WebSpy

By | 2010-04-16T07:48:58+00:00 April 16th, 2010|Log File Analysis, Microsoft ISA Server, Partners, Reports, Sales and Marketing, Uncategorized|0 Comments

To set things straight from the get-go, this is not a plug about our partner program, margin structure or reseller support. All the ingredients necessary to bake a successful partner cake are present (and being improved…get ready for some exciting partner announcement in the coming weeks). No, this is simply a very factual overview of [...]