Watch your TMG’s waist line. Switch log format and reduce fat now!

We often recommend customers using Microsoft ISA or TMG switch their logging to W3C text file, in order to get the best possible import speed, and also because the text logs are much easier to access from a remote machine (see my previous article on accessing TMG’s SQL Express Log database). Logging to the default …

Hit and Miss – Are you Missing out on Important Hit Data?

Today I thought I’d cover some interesting hit information and explain how you can get more out of your data by ensuring your hits are accurately reported on. As the term ‘hit’ can sometimes be confusing, let’s start off by properly define hits.

Microsoft Forefront TMG logs size fields the wrong way around

If you’re using Microsoft Forefront Threat Management Gateway, there is a bug in the logging that causes Bytes Sent and Bytes Received to be logged in reverse. This seems to only affect the Web Proxy logs – both SQL and W3c . We noticed in a few web reports, that people were generally uploading a …

Why there is so much anonymous traffic in Microsoft TMG and ISA logs

One of the most common questions we get asked by users of Microsoft TMG and ISA is why there is so much traffic attributed to the Anonymous user. Even though unauthenticated access to the web has been disabled, they still see the ‘Anonymous’ user as one of the top users in their reports. So let’s …

Video: How to use WebSpy Vantage to report on IronPort log files

I’ve produced a video on how to use WebSpy Vantage to report on IronPort’s Web Security Appliance’s access log files. It is quite a detailed look at the key tasks involved in setting up and using WebSpy Vantage with IronPort WSA access logs, and is therefore divided into several parts. The videos take you through …

How to report on bandwidth utilization using Cisco devices

Today I was speaking to a customer that had the following reporting request. “I would like to know how much of my bandwidth is being eaten by each protocol. I will then use this information to determine if circuit may need to be increased due to increased traffic”. This customer was collecting syslog messages from a Cisco Firewall, then using WebSpy Vantage to generate reports. There’s a simpler method.

How WebSpy Vantage uses your CPUs

I’m frequently asked how WebSpy Vantage utilizes a systems CPU resources. Sometimes you may notice Vantage utilizing 100% of your machine’s CPU power, and other times it will be hardly touched. So here is an overview of how the software works internally so you can understand when your CPUs will and won’t be pushed.

Vantage Update

We’ve just released an auto update for WebSpy Vantage (Premium, Giga and Ultimate) as well as the Web Module. This is a great update for Vantage Ultimate users as we’ve introduced a new feature/tab into the Web Module called ‘Dynamic Reports’.

Here’s the full list of changes since the last auto update ( on the 14th April 2010).

How and When WebSpy Vantage’s Web Server Reporting Beats Google Analytics

I’m actually not trying to compare WebSpy Vantage with Google Analytics (GA), it’s like comparing apples and oranges. Both solutions provide powerful ways of tracking how visitors find your site and how they navigate through it, ideally giving you rich insights into your website traffic and marketing effectiveness. However, GA is a pure web analytics …