Capturing Barracuda Web Filter Activity in Reports
|
|
- Cory Bryant
- 8 years ago
- Views:
Transcription
1 Capturing Barracuda Web Filter Activity in Reports IT administrators require detailed information about Internet usage on the network. This helps budget computing resources and ensure adherence to corporate policies. In addition to its powerful Web filtering and malware protection capabilities, the Barracuda Web Filter allows administrators to generate more than 35 different reports on Internet activity. Reports can be generated on users Web browsing activity, by domains and content categories, by time spent online or by bandwidth consumption. Having a comprehensive, flexible and easy-to-use native reporting engine enables the Barracuda Web Filter to offer a fully integrated solution. Generating reports is simple. Select the time period, report type and format, and then generate the reports or schedule for automatic delivery. Additional filters can be applied to generate reports for a specific user/group, domain or category. Comprehensive Reports on all aspects of monitored online activity Reports can be anchored on User Activity, Domains, Categories or Action Web requests, bandwidth usage, policy violations and spyware activity presented in tabular and graphical form Applicable to IT Administrators, HR departments, executive management and other compliance functions Flexible Generate one-time reports or schedule automatic delivery on a daily, weekly or monthly basis HTML, PDF, Text or CSV formats Optional filtering by Source (Name, IP or User Group) of traffic or by Destination (Domain, Category) The Barracuda Web Filter also provides Content and Application Logs to track online activity in real-time Web traffic Syslog messages are recorded to a text file stored on the Barracuda Web Filter that can be exported Easy to Use Native reporting engine does not require separate clients or database management Simple and intuitive Web user interfaceweb filtering reports are typically used by human resources, information technology, executive management or other equivalent overseeing functions within an organization to regulate Internet access, maintain network security and improve productivity. Business Drivers for Reporting Network administrators are concerned with monitoring and optimizing computing and bandwidth resources across the organization. The vulnerability of the network to security risks is also a major concern. An administrator could be interested in monitoring how bandwidth is utilized, daily Internet usage patterns, infection activity and efficiency of Web filtering systems. On the other hand, human resources administrators are concerned with regulating Internet activity across the organization to minimize inappropriate content and loss of productivity. Human resources are often tasked to ensure users are protected against security risks and inadvertent misuse. The Barracuda Web Filter reports provide several views of user Internet activity. The reports can be generated per user, per client or per group, or aggregated across all users. Through these granular reports, administrators can monitor a variety of parameters such as Web usage patterns, bandwidth consumption and infection activity. The wide variety of reports provided by the Barracuda Web Filter is designed to satisfy the all aspects of an organization s monitoring requirements. 1
2 Web Usage by Requests Content filtering activity is one of the most common reports used to drill into an organization s overall Web activity. Administrators can identify domains or categories most often blocked and the type and frequency of actions taken by the Barracuda Web Filter when enforcing Internet access policy. These reports are useful to evaluate the effectiveness and efficiency of the content and application filtering engines. Report types include: Top Blocked Domains Top Warned Domains Top Blocked Categories Top Warned Categories List of domains most often blocked and the number of blocked requests. Domains very frequently blocked could indicate an overly restrictive filtering policy. List of domains with the most warnings issued and the number of corresponding requests. This report could indicate common policy violations. List of commonly blocked content categories and the number of blocked requests. List of categories with the most warnings issued and the number of corresponding requests. A major issue facing organizations and educational institutions today is the increasing level of leisure browsing from within the workplace. This can lead to a loss of productivity or even risk legal action from exposing users to objectionable content. The latter concern is particularly applicable to educational institutions who are legally obligated to regulate Internet access to inappropriate sites. The Barracuda Web Filter includes several reports for administrators to continuously monitor Internet activity for inappropriate usage, then prevent and correct such usage by configuring appropriate policies. These reports can be combined with other reports to get a detailed look at user Internet activity. For example, a school administrator could identify students who frequently access blocked content and also the Web site categories that these users frequent. Some applicable report types are: Top Users by Requests Top Monitored Users by Requests Top Blocked Users Top Warned Users List of top users ranked by the total number of Web requests made within a specified time period. List of top users ranked by the number of monitored Web requests. List of users who made the most requests to blocked content within a specified time period. This report is very commonly used to identify users who violate policy. List of users who made the most requests to warned content within a specified time period. While designing network usage policy, administrators have to often strike a balance between regulating access while not being overly restrictive. To do this, it is useful to understand which domains or categories are most popular among the users and then design policy to provide appropriate levels of access. For example, a network administrator could estimate the bandwidth usage is at a peak during certain hours and apply a restrictive policy but allow access to some popular leisure sites, like personal during off-peak hours. The following Barracuda Web Filter reports allow administrators to identify the most popular online content within their users: Top Web Sites by Requests Top Web Sites by Time Spent Top Categories by Requests Top Monitored Domains by Requests Top Monitored Categories by Requests List of Web sites ranked by the number of requests made. For each Web site, provide a list of users who made requests. List of the top Web sites ranked by the time spent by users. For each Web site, the report provides a list of users who made requests, identified host, number of requests and the start and end time for each browsing session. List of the top content categories ranked by the number of requests made. List of the top monitored domains ranked by the number of requests made. List of the top monitored categories ranked by the number of requests made. 2
3 Web Usage by Time The Barracuda Web Filter includes detailed Time Based reports. These reports provide information on users, domains and categories ranked by total time spent browsing as well as the time spent on individual browsing sessions. In general, a browsing session is considered terminated when there is no user activity for 5 minutes. Top Users by Time Spent Top Users by Session Time Top Web Sites by Time Spent Top Web Sites by Session Time Top Categories by Time Spent Top Categories by Session Time Sessions by Domain Sessions by Dategory List of the top users ranked by total time spent browsing. List of the top users ranked by individual browsing sessions. A browsing session ends when there is no activity for 5 minutes. List of the top domains ranked by the total browsing time spent on each domain. List of the top domains ranked by individual browsing sessions. List of the top content categories ranked by the total time spent browsing. List of the top content categories ranked by individual browsing sessions. Browsing session breakdown per domain requested. Browsing session breakdown by content category. Quality of Service Quality of Service is generally a function of how bandwidth is utilized across all Internet users in the organization. By reporting on bandwidth utilization ranked by Web requests for users, domains and categories, the Barracuda Web Filter makes it easy to monitor and tune the network as well as design policies to optimize resource usage and allocation. For example, an administrator can identify Web sites that consume the most bandwidth and regulate access to them if there is no adverse impact on overall productivity. Some applicable report types are: Top Web Sites by Bandwidth Top Monitored Domains by Bandwidth Top Monitored Categories by Bandwidth Top Users by Bandwidth Top Monitored Users by Bandwidth List of requested domains ranked by bandwidth consumed within a specified time period. The Barracuda Web Filter allows administrators to monitor traffic to Web sites rather than allow unrestricted access or completely block access. Monitoring allows administrators to flag policy violations without actually blocking access. This report provides a list of monitored domains ranked by most bandwidth consumed within a specified time period. List of content categories of monitored domains ranked by most bandwidth consumed. List of top users ranked by total number of Web requests made within a specified time period. List of top users ranked by bandwidth consumed for monitored Web requests. 3
4 Trends Trend reports provide details on Internet traffic patterns allowing network administrators to profile Internet activity trends. By looking at the trends, administrations can appropriately allocate bandwidth and other resources as well as configure policies to maintain network usage within acceptable limits. For example, identifying peak Internet usage periods can help an administrator budget bandwidth and other resource requirements. Some applicable report types are: Bandwidth by Hour Bandwidth by Time of Day Requests by Hour Line graphs detailing the bandwidth consumed in hourly intervals over a specified time period. Line graph detailing the bandwidth consumed on an hourly basis in a 24 hour period. Line graphs detailing the number of Web requests made in hourly intervals over a specified time period. Requests by Time of Day Line graph detailing the number of Web requests made on an hourly basis in a 24 hour period. Actions by Hour Actions by Time of Day Spyware Infection Activity List of the number and types of actions taken by the policy and filtering engines over a specified time period. You can find the number of block, allow, warn or monitoring actions taken in hourly intervals over the specified time period. List of the number and types of actions taken by the policy and filtering engines in a 24-hour period. You can find the number of block, allow, warn or monitoring actions taken in hourly intervals during the 24 hour period. A major concern for network administrators is network security and protection from Web-based malware attacks. The Barracuda Web Filter prevents harmful downloads from the Internet as well as detects spyware activity from infected client machines. Spyware Infection Activity reports detail any detected spyware infections on client computers as well as harmful downloads that were prevented by the Barracuda Web Filter. Using these reports, network administrators can monitor the health of their network, detect vulnerabilities early and design preventive and corrective measures. Some applicable report types are: Top Users by Spyware Requests Infection Activity Top Infected clients List of users who made the most number of requests for content with potential to cause malware infections. Details aggregated infection activity. Identifies client computers with spyware infections. Summary Reports To summarize information provided in the detailed reports, the Barracuda Web Filter provides aggregated views of user and domain activity. The following report types provide summary statistics typically useful in obtaining a snapshot of user Internet activity: Requests by User Domains by User User Report User Activity Lists all Web sites visited by a user in chronological order. Aggregated report detailing domains visited, number of requests and bandwidth. Summary statistics for the top Web sites by requests, requests by hour, bandwidth by hour and top domains by bandwidth. Summary of user activity showing the number of requests, allowed requests, blocked requests and time last request was made for users logged through the Barracuda Web Filter. 4
5 Barracuda Web Filter: Report Comparison Information Filtering Options Web Usage by Requests Top Blocked Domains Top Warned Domains Top Blocked Categories Top Warned Categories Top Blocked Users Top Warned Users Top Users by Requests Top Monitored Users by Requests Top Web sites by Requests Top Web sites by Time Spent Top Categories by Requests Top Monitored Domains by Requests Top Monitored Categories by Requests Web Usage by Time Top Users by Time Spent Top Users by Session Time Top Web Sites by Time Spent Top Web Sites by Session Time Top Categories by Time Spent Top Categories by Session Time Sessions by Domain Sessions by Category Quality of Service Top Web sites by Bandwidth Top Monitored Domains by Bandwidth Top Monitored Categories by Bandwidth Top Categories by Bandwidth Top Users by Bandwidth Top Monitored Users by Bandwidth Trends Bandwidth by hour Bandwidth by Time of Day Requests by Hour Requests by Time of Day Actions by Hour Actions by Time of Day Spyware Infection Activity Top Users by Spyware Requests Infection Activity Top Infected Clients Summary Reports User Report User Activity Requests by User Domains by User Blocked domains requested most often Warned domains requested most often Blocked Content Categories requested most often Warned Content Categories requested most often Users that made the most requests to blocked content Users that received the most warnings Users that made the most number of Web requests Users that made the most number of Monitored Requests Domains requested most often Domains on which users spent the most time browsing Content Categories requested most often Monitored Domains requested most often Monitored Content Categories of domains that requested most often Users spending most time overall Users with the longest browsing sessions Web sites on which most time is spent overall Web sites with longest browsing sessions Categories on which most time is spent overall Categories with the longest browsing sessions Session breakdown by domains Session breakdown by Category Web sites that consumed the most Bandwidth Monitored Domains that consumed the most Bandwidth Monitored Content Categories that consumed the most Bandwidth Content Categories that consumed the most Bandwidth Users that consumed the most bandwidth Users that made Monitored Requests that consumed the most Bandwidth Bandwidth usage in hourly intervals over the reporting period Bandwidth usage hourly in 24 hour period Requests made in hourly intervals over the reporting period Line Graph of Requests made hourly in 24 hour period Actions taken in hourly intervals over the reporting period Actions taken hourly in 24 hour period Infection by User Infections Infections by IP Summary report for content requests Summary for user activity Domains visited in chronological order Domains visited, number of requests and bandwidth Source Destination Login IP Group Domain Category 5 5
6 Sample Reports: 6
7 For more information on the Barracuda Web Filter, please visit webfilter or call a Barracuda Networks regional sales representative at ANTI-SPAM for a free 30-day evaluation. About Barracuda Networks, Inc. Barracuda Networks Inc. is the worldwide leader in and Web security appliances. Barracuda Networks also provides world-class IM protection, application server load balancing, Web application security and message archiving appliances. Coca- Cola, FedEx, Harvard University, IBM, L Oreal and Europcar are amongst the 70,000 organizations protecting their networks with Barracuda Networks solutions. Barracuda Networks success is due to its ability to deliver easy to use, comprehensive solutions that solve the most serious issues facing customer networks without unnecessary add-ons, maintenance, lengthy installations or per user license fees. Barracuda Networks is privately held with its headquarters in Campbell, Calif. Barracuda Networks has offices in eight international locations and distributors in more than 80 countries worldwide. For more information, please visit 7
Capturing Barracuda Web Filter Activity in Reports
Capturing Barracuda Web Filter Activity in Reports IT and HR administrators often require detailed information about the Internet usage behavior of users in the network to budget computing resources and
More informationBarracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware
More informationWeb Security Monitor. I R O N P O R T S - S E R I E S F e a t u r e Overview
I R O N P O R T S - S E R I E S F e a t u r e Overview I r o n P o r t Web Security Monitor I n s ta n t ly a s s e s s a n d p r o t e c t a g a i n s t a r a n g e o f W e b s e c u r i t y t h r e at
More informationWhen Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationBarracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
More informationCisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
More informationSophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
More informationSonicWALL Global Management System Reporting Guide Standard Edition
SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described
More informationBarracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
More informationWhite Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses
White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted
More informationMcAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
More informationSonicWALL Global Management System Reporting User Guide. Version 2.5
SonicWALL Global Management System Reporting User Guide Version 2.5 Copyright Information 2003 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described within,
More informationSonicWALL Global Management System ViewPoint Guide. Version 2.1
SonicWALL Global Management System ViewPoint Guide Version 2.1 Copyright Information 2001 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described within, may
More informationCyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
More informationEdge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
More informationTHE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
More informationHow To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
More informationCALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
More informationProtecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
More informationPROPALMS TSE 6.0 March 2008
PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...
More informationSonicwall Reporting Server
Sonicwall Reporting Server How to access the reporting server: Navigate to https://swreports.hitechsupport.com.au, and enter your username and password provided. After you have logged in, click on the
More informationBarracuda Message Archiver Vx Deployment. Whitepaper
Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft
More informationSonicWALL Global Management System Reporting Guide Standard Edition
SonicWALL Global Management System Reporting Guide Standard Edition Version 2.8 Copyright Information 2004 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described
More informationPutting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationData Services and Web Applications
Data Services and Web Applications The Ibexis MSP solution includes a range of data services and web applications. Included in our monthly data charges are all cellular data charges, sensor data hosting
More informationSurfProtect User Activity Reporting
SurfProtect User Activity Reporting CONTENTS Document Aim 3 What are my options?... 3 Active Reports... 4 NetASQ Realtime Monitor & Event Reporter... 4 Where can I download the Windows Reporting tools
More informationInternet Safety for Kids and Adults
Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and
More informationThe Business Case for Data Governance
Contents of This White Paper Data Governance...1 Why Today s Solutions Fall Short...2 Use Cases...3 Reviewing Data Permissions... 3 Reviewing Data Permissions with Varonis... 3 Reviewing User and Group
More informationSECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.
Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG
More informationAnalysis of Network Beaconing Activity for Incident Response
Analysis of Network Beaconing Activity for Incident Response FloCon2008 Peter Balland, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under
More informationCompany and Product Presentation
Company and Product Presentation Company Background Mission Deliver easy to use and cost effective appliances for protecting organizations Founded December 2002 Research and development since 2001 Barracuda
More informationSonicWALL GMS Custom Reports
SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview
More informationBest Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
More informationHow To Use The Reports Manager On Pc Or Mac Or Mac (For Mac)
800 782 3762 www.stbernard.com Reporting Guide Version 6.4 2001 2009 St. Bernard Software Inc. All rights reserved. The St. Bernard Software logo, iprism and iguard are trademarks of St. Bernard Software
More informationAn Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
More informationContents. Platform Compatibility. GMS SonicWALL Global Management System 5.0
GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationGetting Started Guide
Getting Started Guide Before you set up your account, you may want to spend a few minutes thinking about what you want to get out of Flextivity. Of course, Flextivity helps you successfully manage basic
More informationCRGroup Whitepaper: Digging through the Data. www.crgroup.com. Reporting Options in Microsoft Dynamics GP
CRGroup Whitepaper: Digging through the Data Reporting Options in Microsoft Dynamics GP The objective of this paper is to provide greater insight on each of the reporting options available to you within
More informationTable of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...
Table of Contents WELCOME TO ADAUDIT PLUS... 3 Release Notes... 4 Contact ZOHO Corp.... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... 8 System Requirements... 9 Installing ADAudit Plus... 10 Working
More informationCisco ASA 5500 Series Business Edition
Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive
More informationBarracuda Message Archiver Vx Deployment. Whitepaper
Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft
More informationCARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4
Table Of Contents INTRODUCTION... 4 About Cyberoam Aggregated Reporting and Logging... 5 INSTALLATION AND SETUP... 6 System Requirements... 6 Prerequisites... 8 Installing and Uninstalling... 10 Starting
More informationHow Web Security Improves Productivity and Compliance
How Web Security Improves Productivity and Compliance Why business managers, HR, legal, compliance and IT all like content filtering and web policy controls Contents Introduction: Web Security Is Not Just
More informationData Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)
Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,
More informationUser Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts
DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These
More informationLog Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security
Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an
More informationHow To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
More informationForcepoint Stonesoft Management Center
Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT
More informationSimplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%
Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity
More informationChallenges and Solutions
IT for 21st-Century K-12 Organizations: Challenges and Solutions Best Updated Product Awards Barracuda Web Filter Barracuda Message Archiver Emerging IT Challenges for K-12 Organizations The adoption of
More informationKERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)
KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE (Updated April 14, 2008) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium
More informationCompact Contact Center V5 Reporter
Compact Contact Center V5 Reporter 40DHB0002USDP Issue 1c (10th April 2007) Contents Introduction...7 Reporter - Introduction... 7 Reports... 8 Collective Reports... 9 Targeted Reports... 10 Individual
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationEndpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control
Endpoint web control overview guide Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control Document date: December 2011 Contents 1 Endpoint web control...3 2 Enterprise Console
More informationGuidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationF-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
More informationAnalyzer 7.1 Administrator s Guide
Analyzer 7.1 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage
More informationMailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
More informationinet Enterprise Features Fact Sheet
2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationisheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
More informationCloud Relay Solution. Whitepaper
Cloud Relay Solution Whitepaper Abstract Cloud-based email is an attractive solution for organizations looking to provide optimum email service for their users at predictable costs. However, cloud-based
More informationBurst Technology. bt-loganalyzer User Guide
Burst Technology presents bt-loganalyzer User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
More informationMcAfee Security. Management Client
Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation
More informationUnified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
More informationEnforcive /Cross-Platform Audit
Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)
More informationUnderstanding Syslog Messages for the Barracuda Web Filter
Understanding Syslog Messages for the Barracuda Web Filter Overview This document describes each element of a syslog message so you can better analyze why your Barracuda Web Filter performs a particular
More informationReports, Features and benefits of ManageEngine ADAudit Plus
Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that
More informationPRODUCTIVITY IN FOCUS PERFORMANCE MANAGEMENT SOFTWARE FOR MAILROOM AND SCANNING OPERATIONS
PRODUCTIVITY IN FOCUS PERFORMANCE MANAGEMENT SOFTWARE FOR MAILROOM AND SCANNING OPERATIONS Machine Productivity Track equipment productivity by active run time and total wall clock time. Compare machine
More informationDOCAVE REPORT CENTER FOR MICROSOFT SHAREPOINT REPORTING
Technical Overview DOCAVE REPORT CENTER FOR MICROSOFT SHAREPOINT REPORTING Manage. Report. Gain a comprehensive understanding through customizable reports of Microsoft SharePoint Server performance, security,
More informationWhatsUp Gold vs. Orion
Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,
More informationStopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
More informationSafeguard Your Remote Employees With CyBlock Hybrid
WavecrestTechBrief Safeguard Your Remote Employees With CyBlock Hybrid www.wavecrest.net For organizations that are composed of a main office, branch offices, and remote and mobile users, there is a certain
More informationINTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
More informationHow To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
More informationefolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace
efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace December 2014 Copyright 2014, efolder, Inc. Introduction Bring your own device (BYOD) has been on the rise as employees
More informationBUSINESS FOCUSED EXCHANGE REPORTING. Guide To Successful Microsoft Exchange Reporting & Analysis
BUSINESS FOCUSED EXCHANGE REPORTING Guide To Successful Microsoft Exchange Reporting & Analysis Understanding Business-focused Exchange Reporting Most organizations today rely heavily on email and have
More informationDell SonicWALL report portfolio
Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer
More informationScalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
More informationManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...
TABLE OF CONTENTS WELCOME TO EXCHANGE REPORTER PLUS... 4 CONTACT ZOHO CORP.... 5 GETTING STARTED... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OF EXCHANGE REPORTER PLUS... 9 HOW EXCHANGE REPORTER PLUS WORKS...
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationAVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
More informationReports. Quick Reference Card. Option Group. Date Settings. Time Options. Agent and Queue Selection. Call Types
s Quick Reference Card Introduction to s The s module empowers Zeacom Communications Center users to run customized reports about their contact center agents, call handling, and Zeacom CTI Server system
More informationFeatures and benefits guide for partners and their customers
and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus
More informationGet Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
More informationCall Management. V6 User Guide
Call Management V6 User Guide 1 Page Overview 3 Call Management 3 My Reports Dashboard 4 Standard Widgets 5 Custom Widgets 6 Call Recordings 6-7 Reports Catalogue 7 Time Interval Reports 7 Extension Reports
More informationSemantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
More informationCall Logging Quick Reference User Guide
Call Logging provides companywide call records, comparison and analytical tools for tracking and improving the efficiency and effectiveness of business communications. An intuitive, feature rich interface
More informationThe University of Information Technology Management System
IT Monitoring Code of Practice 1.4 University of Ulster Code of Practice Cover Sheet Document Title IT Monitoring Code of Practice 1.4 Custodian Approving Committee Deputy Director of Finance and Information
More informationNetwork Visiblity and Performance Solutions Online Demo Guide
Network Visiblity and Performance Solutions Online Demo Guide Organizations rely heavily upon their networks and their ability to deliver business services and information. Any degradation or interruption
More informationExporting IBM i Data to Syslog
Exporting IBM i Data to Syslog A White Paper from Safestone Technologies By Nick Blattner, System Engineer www.safestone.com Contents Overview... 2 Safestone... 2 SIEM consoles... 2 Parts and Pieces...
More informationHow to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity
More informationVMware vcenter Log Insight User's Guide
VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationWhen Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior
More informationData Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex
More informationTop 10 Features: Clearswift SECURE Email Gateway
Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can
More information