How to report on who accessed a file or folder
I’m frequently asked about the best way to setup and report on file or folder accesses. In other words, I have a bunch of confidential files sitting on my network and I want to know who is accessing...
View ArticleUsing Date Modifiers in File Masks – New Features
We’ve recently added two new features to WebSpy Vantage (all flavours) to deal with a specific issue setting up automated importing tasks using date modifiers in file masks. A common setup is to have a...
View ArticleCounting Emails with Microsoft Exchange 2007 Tracking Logs
Today I’ve been poking at Microsoft Exchange 2007 tracking logs, asking them the very simple question of ‘How many emails have I sent?’. Unfortunately, Exchange 2007 tracking logs are not used to...
View ArticleUpdates to Vantage, Analyzer & Live
We’ve issued a bunch of auto updates for nearly all WebSpy products today Of particular note is a fix to the Vantage range: Fix: Improved partition matching when filtering by a date range This will...
View ArticleVantage now with multi-processing!
We’ve been doing some work lately to make Vantage take advantage of multi-cpu and multi-core processors. It looks like we’ve improved the performance of importing multiple log files by around 50%, and...
View ArticleDiagnostic Tracing in Vantage
Diagnostic Tracing is a way to find out the details of what Vantage does when performing a variety of actions such as importing logs, generating a report, and so on. Sometimes an error may occur during...
View ArticleMigrating WebSpy Vantage to a different machine
Imagine you’ve just spent the last six months setting up storages, aliases, profiles, scheduled tasks and so on, and you need to migrate all this to another machine. Of course you could go to the...
View ArticleMicrosoft to announce Beta 3 for Threat Management Gateway (the new ISA Server)
It sounds like Threat Management Gateway (TMG), the new re-branded version of ISA Server, has been a popular topic at this years TechEd event in the US. According to the latest blog from TMG’s Product...
View ArticleForefront Threat Management Gateway Beta 3 Now available
A couple of weeks ago I posted a blog regarding Microsoft’s upcoming Beta 3 release of Forefront Threat Management Gateway (TMG) which will be replacing Microsoft ISA server. Well, it’s now been...
View ArticleVantage 2.2 now available!
I’m happy to announce the release of Vantage 2.2! Download Vantage 2.2 here. All three products in the Vantage range (Premium, Giga and Ultimate) have been updated with the following features:...
View ArticleVideo: How To Remove Clutter From Your Web Reports
I was conducting a demonstration the other day on how to use a few tricks in WebSpy Vantage to filter out noise and clutter from web reports. If you have ever looked through the raw list of web sites...
View ArticleConvert Microsoft ISA 2006 MSDE logs to WebSpy compatible text logs
Some customers have experienced issues converting their ISA MSDE logs to text using Microsoft’s MSDEToText.vbs script for ISA 2006 (available at...
View ArticleIncrease importing speed by utilizing dates in log file names
Using Date Modifiers in file masks are a great way to increase the speed of your imports as they remove all the logs you don’t care about from the import list. If you’re using WebSpy Vantage, you are...
View ArticleRemove Username-Password Prompts from the Web Module with Windows Authentication
A great feature of Vantage Ultimate is its ability to publish reports and storages to the Web Module so that users can login, view their reports and analyze data. But no one wants to have to remember...
View ArticleExciting New Features in Vantage Update 2.2.0.10
Attention all Vantage customers (and evaluators). We’ve just released build 2.2.0.10 as an auto-update. This build includes support for Microsoft Forefront Threat Management Gateway, and new features...
View ArticleHow to Educate your Workforce and Strengthen Security with Internet Monitoring
Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring...
View ArticleSubnet Representations and Aliases
Anybody who has manually configured their network settings has had to enter a subnet mask, usually in the form of “#.#.#.#”. The most familiar subnet value for many is 255.255.255.0, representing that...
View ArticleMicrosoft Forefront TMG Release Candidate now available
Microsoft has announced the availability of Microsoft Forefront Threat Management Gateway (TMG) Release Candidate (RC). This is the final public release of TMG before it is made available to purchase....
View ArticleWhere does Vantage store data and how do I change it?
In the log file analysis world, we’re always dealing with large volumes of data. By default, WebSpy Vantage stores its data, including the storages that you import log files into, somewhere on your c:\...
View ArticleWebSpy on Windows 7
Now that Microsoft have officially released the long awaited Windows 7 Operating System, I thought I’d write a quick blog on WebSpy’s current support for Windows 7. Supported on Windows 7 The following...
View Article
More Pages to Explore .....