4 04, 2011

Vantage Video Series: #3 Importing, Summaries & Aliases

By | 2011-04-04T13:27:00+00:00 April 4th, 2011|Aliases, How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis|0 Comments

This is the third of a series of videos showing you how to configure Vantage in detail. In this video we'll look at how to import some data into a storage, use the Summaries section, and start customizing Aliases. WebSpy Vantage Ultimate - Importing, Summaries and Aliases from Fastvue on Vimeo.

4 04, 2011

Vantage Video Series: #2 Preflight & Installation

By | 2011-04-04T13:16:01+00:00 April 4th, 2011|How To, Log File Analysis, System Administration, Tips and Best Practices, Uncategorized, Vantage, Web Module|0 Comments

This is the second of a series of videos showing you how to configure Vantage in detail. This video will take you through the system requirements, and the installation of Vantage and the Web Module. WebSpy Vantage Ultimate - Preflight and Installation from Fastvue on Vimeo.

22 12, 2010

Creating and Analyzing SonicWALL Log Files

By | 2010-12-22T15:28:52+00:00 December 22nd, 2010|Firewall Analysis, How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

I’ve put together a couple of quick videos to show you how to configure logging on your SonicWALL appliance, and how to import and analyze these log files in WebSpy Vantage. You can also read through these steps on this page: Analyzing SonicWALL log files with WebSpy. […]

10 12, 2010

Reporting on Astaro Security Gateway

By | 2010-12-10T15:23:54+00:00 December 10th, 2010|Astaro, Firewall Analysis, How To, Log File Analysis, Reports, Third Party, Tips and Best Practices, Uncategorized, Vantage, WebSpy|0 Comments

Astaro Security Gateway devices are capable of producing some very detailed log files including full URLs, usernames, categories, block action and reason which gives you some great reporting options in WebSpy Vantage. Take a look at our dedicated Astaro pages to get an idea of what can be achieved when analyzing Astaro Web Gateway log [...]

18 06, 2010

Video: How to use WebSpy Vantage to report on IronPort log files

By | 2010-06-18T02:01:16+00:00 June 18th, 2010|Aliases, Firewall Analysis, How To, IronPort, Log File Analysis, Reports, Scheduled Tasks, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, Web Module, WebSpy|0 Comments

I’ve produced a video on how to use WebSpy Vantage to report on IronPort’s Web Security Appliance’s access log files. It is quite a detailed look at the key tasks involved in setting up and using WebSpy Vantage with IronPort WSA access logs, and is therefore divided into several parts. The videos take you through [...]

7 04, 2010

Soho Alpha Release – Issues and Workarounds

By | 2010-04-07T06:28:06+00:00 April 7th, 2010|How To, Software Updates, Tips and Best Practices, Uncategorized, WebSpy Soho|0 Comments

It’s been a crazy few weeks but we’ve finally managed to get the first release of WebSpy Soho out the door. It is our intention to keep our Alpha testers up to date with our ongoing development. Right now, I’d like to inform you about some issues experienced by a handful of testers and how to go about resolving them.

8 02, 2010

8 Reasons NOT to Use Microsoft Forefront TMG's Reporting

By | 2010-02-08T06:48:39+00:00 February 8th, 2010|Aliases, Firewall Analysis, How To, Loaders, Log File Analysis, Microsoft ISA Server, Microsoft Threat Management Gateway, Reports, Tips and Best Practices, Uncategorized, Vantage, Web Browsing Analysis, Web Module, WebSpy|6 Comments

I've been having a look through the reporting functionality included in Microsoft Forefront Threat Management Gateway to find that not much has changed from ISA Server 2006. There is some new information regarding the newly implemented URL categorization and threat management technology, but there is very little flexibility or customization for those with reporting requirements beyond general overviews cluttered with irrelevant information. Here is what I consider to be the 8 main limitations of Microsoft Forefront TMG's reporting functionality.

11 08, 2009

Video: Setup a complete Internet monitoring solution in less than 15 minutes!

By | 2009-08-11T07:59:31+00:00 August 11th, 2009|Analyzer, How To, Live, Log File Analysis, Sentinel, Uncategorized, Web Browsing Analysis, WebSpy|0 Comments

Here's a video I put together demonstrating how to get up and running with a complete monitoring and reporting solution in less than 15 minutes. The video demonstrates three products: WebSpy Sentinel, for complete data capture, WebSpy Live for real time alerts, and WebSpy Analyzer Standard for analysis and reporting.

16 07, 2009

Video: How To Remove Clutter From Your Web Reports

By | 2009-07-16T09:10:02+00:00 July 16th, 2009|How To, Log File Analysis, Uncategorized, Vantage, Web Browsing Analysis, WebSpy|0 Comments

I was conducting a demonstration the other day on how to use a few tricks in WebSpy Vantage to filter out noise and clutter from web reports. If you have ever looked through the raw list of web sites visited by people in your organization, I'm sure you know what I mean. Watching a single video on YouTube will probably generate a list of about three to five sites such as lax-v41.lax.youtube.com, www.youtube.com, img.youtube.com, and so on. Your list of top sites also probably contains hits to ad servers and tracking servers, such as doubleclick.net, google-analytics.com and imrworldwide.com. All this clutter gets in the way of determining what sites were 'intentionally' visited.