Capturing Barracuda Web Filter Activity in Reports

Size: px
Start display at page:

Download "Capturing Barracuda Web Filter Activity in Reports"

Transcription

1 Capturing Barracuda Web Filter Activity in Reports IT administrators require detailed information about Internet usage on the network. This helps budget computing resources and ensure adherence to corporate policies. In addition to its powerful Web filtering and malware protection capabilities, the Barracuda Web Filter allows administrators to generate more than 35 different reports on Internet activity. Reports can be generated on users Web browsing activity, by domains and content categories, by time spent online or by bandwidth consumption. Having a comprehensive, flexible and easy-to-use native reporting engine enables the Barracuda Web Filter to offer a fully integrated solution. Generating reports is simple. Select the time period, report type and format, and then generate the reports or schedule for automatic delivery. Additional filters can be applied to generate reports for a specific user/group, domain or category. Comprehensive Reports on all aspects of monitored online activity Reports can be anchored on User Activity, Domains, Categories or Action Web requests, bandwidth usage, policy violations and spyware activity presented in tabular and graphical form Applicable to IT Administrators, HR departments, executive management and other compliance functions Flexible Generate one-time reports or schedule automatic delivery on a daily, weekly or monthly basis HTML, PDF, Text or CSV formats Optional filtering by Source (Name, IP or User Group) of traffic or by Destination (Domain, Category) The Barracuda Web Filter also provides Content and Application Logs to track online activity in real-time Web traffic Syslog messages are recorded to a text file stored on the Barracuda Web Filter that can be exported Easy to Use Native reporting engine does not require separate clients or database management Simple and intuitive Web user interfaceweb filtering reports are typically used by human resources, information technology, executive management or other equivalent overseeing functions within an organization to regulate Internet access, maintain network security and improve productivity. Business Drivers for Reporting Network administrators are concerned with monitoring and optimizing computing and bandwidth resources across the organization. The vulnerability of the network to security risks is also a major concern. An administrator could be interested in monitoring how bandwidth is utilized, daily Internet usage patterns, infection activity and efficiency of Web filtering systems. On the other hand, human resources administrators are concerned with regulating Internet activity across the organization to minimize inappropriate content and loss of productivity. Human resources are often tasked to ensure users are protected against security risks and inadvertent misuse. The Barracuda Web Filter reports provide several views of user Internet activity. The reports can be generated per user, per client or per group, or aggregated across all users. Through these granular reports, administrators can monitor a variety of parameters such as Web usage patterns, bandwidth consumption and infection activity. The wide variety of reports provided by the Barracuda Web Filter is designed to satisfy the all aspects of an organization s monitoring requirements. 1

2 Web Usage by Requests Content filtering activity is one of the most common reports used to drill into an organization s overall Web activity. Administrators can identify domains or categories most often blocked and the type and frequency of actions taken by the Barracuda Web Filter when enforcing Internet access policy. These reports are useful to evaluate the effectiveness and efficiency of the content and application filtering engines. Report types include: Top Blocked Domains Top Warned Domains Top Blocked Categories Top Warned Categories List of domains most often blocked and the number of blocked requests. Domains very frequently blocked could indicate an overly restrictive filtering policy. List of domains with the most warnings issued and the number of corresponding requests. This report could indicate common policy violations. List of commonly blocked content categories and the number of blocked requests. List of categories with the most warnings issued and the number of corresponding requests. A major issue facing organizations and educational institutions today is the increasing level of leisure browsing from within the workplace. This can lead to a loss of productivity or even risk legal action from exposing users to objectionable content. The latter concern is particularly applicable to educational institutions who are legally obligated to regulate Internet access to inappropriate sites. The Barracuda Web Filter includes several reports for administrators to continuously monitor Internet activity for inappropriate usage, then prevent and correct such usage by configuring appropriate policies. These reports can be combined with other reports to get a detailed look at user Internet activity. For example, a school administrator could identify students who frequently access blocked content and also the Web site categories that these users frequent. Some applicable report types are: Top Users by Requests Top Monitored Users by Requests Top Blocked Users Top Warned Users List of top users ranked by the total number of Web requests made within a specified time period. List of top users ranked by the number of monitored Web requests. List of users who made the most requests to blocked content within a specified time period. This report is very commonly used to identify users who violate policy. List of users who made the most requests to warned content within a specified time period. While designing network usage policy, administrators have to often strike a balance between regulating access while not being overly restrictive. To do this, it is useful to understand which domains or categories are most popular among the users and then design policy to provide appropriate levels of access. For example, a network administrator could estimate the bandwidth usage is at a peak during certain hours and apply a restrictive policy but allow access to some popular leisure sites, like personal during off-peak hours. The following Barracuda Web Filter reports allow administrators to identify the most popular online content within their users: Top Web Sites by Requests Top Web Sites by Time Spent Top Categories by Requests Top Monitored Domains by Requests Top Monitored Categories by Requests List of Web sites ranked by the number of requests made. For each Web site, provide a list of users who made requests. List of the top Web sites ranked by the time spent by users. For each Web site, the report provides a list of users who made requests, identified host, number of requests and the start and end time for each browsing session. List of the top content categories ranked by the number of requests made. List of the top monitored domains ranked by the number of requests made. List of the top monitored categories ranked by the number of requests made. 2

3 Web Usage by Time The Barracuda Web Filter includes detailed Time Based reports. These reports provide information on users, domains and categories ranked by total time spent browsing as well as the time spent on individual browsing sessions. In general, a browsing session is considered terminated when there is no user activity for 5 minutes. Top Users by Time Spent Top Users by Session Time Top Web Sites by Time Spent Top Web Sites by Session Time Top Categories by Time Spent Top Categories by Session Time Sessions by Domain Sessions by Dategory List of the top users ranked by total time spent browsing. List of the top users ranked by individual browsing sessions. A browsing session ends when there is no activity for 5 minutes. List of the top domains ranked by the total browsing time spent on each domain. List of the top domains ranked by individual browsing sessions. List of the top content categories ranked by the total time spent browsing. List of the top content categories ranked by individual browsing sessions. Browsing session breakdown per domain requested. Browsing session breakdown by content category. Quality of Service Quality of Service is generally a function of how bandwidth is utilized across all Internet users in the organization. By reporting on bandwidth utilization ranked by Web requests for users, domains and categories, the Barracuda Web Filter makes it easy to monitor and tune the network as well as design policies to optimize resource usage and allocation. For example, an administrator can identify Web sites that consume the most bandwidth and regulate access to them if there is no adverse impact on overall productivity. Some applicable report types are: Top Web Sites by Bandwidth Top Monitored Domains by Bandwidth Top Monitored Categories by Bandwidth Top Users by Bandwidth Top Monitored Users by Bandwidth List of requested domains ranked by bandwidth consumed within a specified time period. The Barracuda Web Filter allows administrators to monitor traffic to Web sites rather than allow unrestricted access or completely block access. Monitoring allows administrators to flag policy violations without actually blocking access. This report provides a list of monitored domains ranked by most bandwidth consumed within a specified time period. List of content categories of monitored domains ranked by most bandwidth consumed. List of top users ranked by total number of Web requests made within a specified time period. List of top users ranked by bandwidth consumed for monitored Web requests. 3

4 Trends Trend reports provide details on Internet traffic patterns allowing network administrators to profile Internet activity trends. By looking at the trends, administrations can appropriately allocate bandwidth and other resources as well as configure policies to maintain network usage within acceptable limits. For example, identifying peak Internet usage periods can help an administrator budget bandwidth and other resource requirements. Some applicable report types are: Bandwidth by Hour Bandwidth by Time of Day Requests by Hour Line graphs detailing the bandwidth consumed in hourly intervals over a specified time period. Line graph detailing the bandwidth consumed on an hourly basis in a 24 hour period. Line graphs detailing the number of Web requests made in hourly intervals over a specified time period. Requests by Time of Day Line graph detailing the number of Web requests made on an hourly basis in a 24 hour period. Actions by Hour Actions by Time of Day Spyware Infection Activity List of the number and types of actions taken by the policy and filtering engines over a specified time period. You can find the number of block, allow, warn or monitoring actions taken in hourly intervals over the specified time period. List of the number and types of actions taken by the policy and filtering engines in a 24-hour period. You can find the number of block, allow, warn or monitoring actions taken in hourly intervals during the 24 hour period. A major concern for network administrators is network security and protection from Web-based malware attacks. The Barracuda Web Filter prevents harmful downloads from the Internet as well as detects spyware activity from infected client machines. Spyware Infection Activity reports detail any detected spyware infections on client computers as well as harmful downloads that were prevented by the Barracuda Web Filter. Using these reports, network administrators can monitor the health of their network, detect vulnerabilities early and design preventive and corrective measures. Some applicable report types are: Top Users by Spyware Requests Infection Activity Top Infected clients List of users who made the most number of requests for content with potential to cause malware infections. Details aggregated infection activity. Identifies client computers with spyware infections. Summary Reports To summarize information provided in the detailed reports, the Barracuda Web Filter provides aggregated views of user and domain activity. The following report types provide summary statistics typically useful in obtaining a snapshot of user Internet activity: Requests by User Domains by User User Report User Activity Lists all Web sites visited by a user in chronological order. Aggregated report detailing domains visited, number of requests and bandwidth. Summary statistics for the top Web sites by requests, requests by hour, bandwidth by hour and top domains by bandwidth. Summary of user activity showing the number of requests, allowed requests, blocked requests and time last request was made for users logged through the Barracuda Web Filter. 4

5 Barracuda Web Filter: Report Comparison Information Filtering Options Web Usage by Requests Top Blocked Domains Top Warned Domains Top Blocked Categories Top Warned Categories Top Blocked Users Top Warned Users Top Users by Requests Top Monitored Users by Requests Top Web sites by Requests Top Web sites by Time Spent Top Categories by Requests Top Monitored Domains by Requests Top Monitored Categories by Requests Web Usage by Time Top Users by Time Spent Top Users by Session Time Top Web Sites by Time Spent Top Web Sites by Session Time Top Categories by Time Spent Top Categories by Session Time Sessions by Domain Sessions by Category Quality of Service Top Web sites by Bandwidth Top Monitored Domains by Bandwidth Top Monitored Categories by Bandwidth Top Categories by Bandwidth Top Users by Bandwidth Top Monitored Users by Bandwidth Trends Bandwidth by hour Bandwidth by Time of Day Requests by Hour Requests by Time of Day Actions by Hour Actions by Time of Day Spyware Infection Activity Top Users by Spyware Requests Infection Activity Top Infected Clients Summary Reports User Report User Activity Requests by User Domains by User Blocked domains requested most often Warned domains requested most often Blocked Content Categories requested most often Warned Content Categories requested most often Users that made the most requests to blocked content Users that received the most warnings Users that made the most number of Web requests Users that made the most number of Monitored Requests Domains requested most often Domains on which users spent the most time browsing Content Categories requested most often Monitored Domains requested most often Monitored Content Categories of domains that requested most often Users spending most time overall Users with the longest browsing sessions Web sites on which most time is spent overall Web sites with longest browsing sessions Categories on which most time is spent overall Categories with the longest browsing sessions Session breakdown by domains Session breakdown by Category Web sites that consumed the most Bandwidth Monitored Domains that consumed the most Bandwidth Monitored Content Categories that consumed the most Bandwidth Content Categories that consumed the most Bandwidth Users that consumed the most bandwidth Users that made Monitored Requests that consumed the most Bandwidth Bandwidth usage in hourly intervals over the reporting period Bandwidth usage hourly in 24 hour period Requests made in hourly intervals over the reporting period Line Graph of Requests made hourly in 24 hour period Actions taken in hourly intervals over the reporting period Actions taken hourly in 24 hour period Infection by User Infections Infections by IP Summary report for content requests Summary for user activity Domains visited in chronological order Domains visited, number of requests and bandwidth Source Destination Login IP Group Domain Category 5 5

6 Sample Reports: 6

7 For more information on the Barracuda Web Filter, please visit webfilter or call a Barracuda Networks regional sales representative at ANTI-SPAM for a free 30-day evaluation. About Barracuda Networks, Inc. Barracuda Networks Inc. is the worldwide leader in and Web security appliances. Barracuda Networks also provides world-class IM protection, application server load balancing, Web application security and message archiving appliances. Coca- Cola, FedEx, Harvard University, IBM, L Oreal and Europcar are amongst the 70,000 organizations protecting their networks with Barracuda Networks solutions. Barracuda Networks success is due to its ability to deliver easy to use, comprehensive solutions that solve the most serious issues facing customer networks without unnecessary add-ons, maintenance, lengthy installations or per user license fees. Barracuda Networks is privately held with its headquarters in Campbell, Calif. Barracuda Networks has offices in eight international locations and distributors in more than 80 countries worldwide. For more information, please visit 7

Capturing Barracuda Web Filter Activity in Reports

Capturing Barracuda Web Filter Activity in Reports Capturing Barracuda Web Filter Activity in Reports IT and HR administrators often require detailed information about the Internet usage behavior of users in the network to budget computing resources and

More information

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware

More information

Web Security Monitor. I R O N P O R T S - S E R I E S F e a t u r e Overview

Web Security Monitor. I R O N P O R T S - S E R I E S F e a t u r e Overview I R O N P O R T S - S E R I E S F e a t u r e Overview I r o n P o r t Web Security Monitor I n s ta n t ly a s s e s s a n d p r o t e c t a g a i n s t a r a n g e o f W e b s e c u r i t y t h r e at

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online

More information

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security

More information

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0 Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...

More information

SonicWALL Global Management System Reporting Guide Standard Edition

SonicWALL Global Management System Reporting Guide Standard Edition SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described

More information

Barracuda Intrusion Detection and Prevention System

Barracuda Intrusion Detection and Prevention System Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques

More information

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted

More information

McAfee Web Reporter Turning volumes of data into actionable intelligence

McAfee Web Reporter Turning volumes of data into actionable intelligence McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access

More information

SonicWALL Global Management System Reporting User Guide. Version 2.5

SonicWALL Global Management System Reporting User Guide. Version 2.5 SonicWALL Global Management System Reporting User Guide Version 2.5 Copyright Information 2003 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described within,

More information

SonicWALL Global Management System ViewPoint Guide. Version 2.1

SonicWALL Global Management System ViewPoint Guide. Version 2.1 SonicWALL Global Management System ViewPoint Guide Version 2.1 Copyright Information 2001 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described within, may

More information

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Cyan Networks Secure Web vs. Websense Security Gateway Battle card URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database

More information

Edge Configuration Series Reporting Overview

Edge Configuration Series Reporting Overview Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed

More information

THE OPEN UNIVERSITY OF TANZANIA

THE OPEN UNIVERSITY OF TANZANIA THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather

More information

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

Protecting the Infrastructure: Symantec Web Gateway

Protecting the Infrastructure: Symantec Web Gateway Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options

More information

PROPALMS TSE 6.0 March 2008

PROPALMS TSE 6.0 March 2008 PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...

More information

Sonicwall Reporting Server

Sonicwall Reporting Server Sonicwall Reporting Server How to access the reporting server: Navigate to https://swreports.hitechsupport.com.au, and enter your username and password provided. After you have logged in, click on the

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

SonicWALL Global Management System Reporting Guide Standard Edition

SonicWALL Global Management System Reporting Guide Standard Edition SonicWALL Global Management System Reporting Guide Standard Edition Version 2.8 Copyright Information 2004 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described

More information

Putting Web Threat Protection and Content Filtering in the Cloud

Putting Web Threat Protection and Content Filtering in the Cloud Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Data Services and Web Applications

Data Services and Web Applications Data Services and Web Applications The Ibexis MSP solution includes a range of data services and web applications. Included in our monthly data charges are all cellular data charges, sensor data hosting

More information

SurfProtect User Activity Reporting

SurfProtect User Activity Reporting SurfProtect User Activity Reporting CONTENTS Document Aim 3 What are my options?... 3 Active Reports... 4 NetASQ Realtime Monitor & Event Reporter... 4 Where can I download the Windows Reporting tools

More information

Internet Safety for Kids and Adults

Internet Safety for Kids and Adults Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and

More information

The Business Case for Data Governance

The Business Case for Data Governance Contents of This White Paper Data Governance...1 Why Today s Solutions Fall Short...2 Use Cases...3 Reviewing Data Permissions... 3 Reviewing Data Permissions with Varonis... 3 Reviewing User and Group

More information

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6.

SECURE ICAP Gateway. Blue Coat Implementation Guide. Technical note. Version 1.0 23/12/13. Product Information. Version & Platform SGOS 6. Technical note Version 1.0 23/12/13 Product Information Partner Name Web Site Product Name Blue Coat Systems, Inc. www.bluecoat.com ProxySG Version & Platform SGOS 6.5 Product Description Blue Coat ProxySG

More information

Analysis of Network Beaconing Activity for Incident Response

Analysis of Network Beaconing Activity for Incident Response Analysis of Network Beaconing Activity for Incident Response FloCon2008 Peter Balland, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under

More information

Company and Product Presentation

Company and Product Presentation Company and Product Presentation Company Background Mission Deliver easy to use and cost effective appliances for protecting organizations Founded December 2002 Research and development since 2001 Barracuda

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

Best Practices for Controlling Skype within the Enterprise > White Paper

Best Practices for Controlling Skype within the Enterprise > White Paper > White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it

More information

How To Use The Reports Manager On Pc Or Mac Or Mac (For Mac)

How To Use The Reports Manager On Pc Or Mac Or Mac (For Mac) 800 782 3762 www.stbernard.com Reporting Guide Version 6.4 2001 2009 St. Bernard Software Inc. All rights reserved. The St. Bernard Software logo, iprism and iguard are trademarks of St. Bernard Software

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0 GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Before you set up your account, you may want to spend a few minutes thinking about what you want to get out of Flextivity. Of course, Flextivity helps you successfully manage basic

More information

CRGroup Whitepaper: Digging through the Data. www.crgroup.com. Reporting Options in Microsoft Dynamics GP

CRGroup Whitepaper: Digging through the Data. www.crgroup.com. Reporting Options in Microsoft Dynamics GP CRGroup Whitepaper: Digging through the Data Reporting Options in Microsoft Dynamics GP The objective of this paper is to provide greater insight on each of the reporting options available to you within

More information

Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... Table of Contents WELCOME TO ADAUDIT PLUS... 3 Release Notes... 4 Contact ZOHO Corp.... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... 8 System Requirements... 9 Installing ADAudit Plus... 10 Working

More information

Cisco ASA 5500 Series Business Edition

Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

CARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4

CARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4 Table Of Contents INTRODUCTION... 4 About Cyberoam Aggregated Reporting and Logging... 5 INSTALLATION AND SETUP... 6 System Requirements... 6 Prerequisites... 8 Installing and Uninstalling... 10 Starting

More information

How Web Security Improves Productivity and Compliance

How Web Security Improves Productivity and Compliance How Web Security Improves Productivity and Compliance Why business managers, HR, legal, compliance and IT all like content filtering and web policy controls Contents Introduction: Web Security Is Not Just

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These

More information

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

Forcepoint Stonesoft Management Center

Forcepoint Stonesoft Management Center Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT

More information

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86% Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity

More information

Challenges and Solutions

Challenges and Solutions IT for 21st-Century K-12 Organizations: Challenges and Solutions Best Updated Product Awards Barracuda Web Filter Barracuda Message Archiver Emerging IT Challenges for K-12 Organizations The adoption of

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008) KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE (Updated April 14, 2008) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium

More information

Compact Contact Center V5 Reporter

Compact Contact Center V5 Reporter Compact Contact Center V5 Reporter 40DHB0002USDP Issue 1c (10th April 2007) Contents Introduction...7 Reporter - Introduction... 7 Reports... 8 Collective Reports... 9 Targeted Reports... 10 Individual

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control

Endpoint web control overview guide. Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control Endpoint web control overview guide Sophos Web Appliance Sophos Enterprise Console Sophos Endpoint Security and Control Document date: December 2011 Contents 1 Endpoint web control...3 2 Enterprise Console

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Analyzer 7.1 Administrator s Guide

Analyzer 7.1 Administrator s Guide Analyzer 7.1 Administrator s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

inet Enterprise Features Fact Sheet

inet Enterprise Features Fact Sheet 2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

Cloud Relay Solution. Whitepaper

Cloud Relay Solution. Whitepaper Cloud Relay Solution Whitepaper Abstract Cloud-based email is an attractive solution for organizations looking to provide optimum email service for their users at predictable costs. However, cloud-based

More information

Burst Technology. bt-loganalyzer User Guide

Burst Technology. bt-loganalyzer User Guide Burst Technology presents bt-loganalyzer User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com

More information

McAfee Security. Management Client

McAfee Security. Management Client Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation

More information

Unified network traffic monitoring for physical and VMware environments

Unified network traffic monitoring for physical and VMware environments Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers

More information

Enforcive /Cross-Platform Audit

Enforcive /Cross-Platform Audit Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)

More information

Understanding Syslog Messages for the Barracuda Web Filter

Understanding Syslog Messages for the Barracuda Web Filter Understanding Syslog Messages for the Barracuda Web Filter Overview This document describes each element of a syslog message so you can better analyze why your Barracuda Web Filter performs a particular

More information

Reports, Features and benefits of ManageEngine ADAudit Plus

Reports, Features and benefits of ManageEngine ADAudit Plus Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that

More information

PRODUCTIVITY IN FOCUS PERFORMANCE MANAGEMENT SOFTWARE FOR MAILROOM AND SCANNING OPERATIONS

PRODUCTIVITY IN FOCUS PERFORMANCE MANAGEMENT SOFTWARE FOR MAILROOM AND SCANNING OPERATIONS PRODUCTIVITY IN FOCUS PERFORMANCE MANAGEMENT SOFTWARE FOR MAILROOM AND SCANNING OPERATIONS Machine Productivity Track equipment productivity by active run time and total wall clock time. Compare machine

More information

DOCAVE REPORT CENTER FOR MICROSOFT SHAREPOINT REPORTING

DOCAVE REPORT CENTER FOR MICROSOFT SHAREPOINT REPORTING Technical Overview DOCAVE REPORT CENTER FOR MICROSOFT SHAREPOINT REPORTING Manage. Report. Gain a comprehensive understanding through customizable reports of Microsoft SharePoint Server performance, security,

More information

WhatsUp Gold vs. Orion

WhatsUp Gold vs. Orion Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,

More information

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Stopping secure Web traffic from bypassing your content filter. BLACK BOX Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...

More information

Safeguard Your Remote Employees With CyBlock Hybrid

Safeguard Your Remote Employees With CyBlock Hybrid WavecrestTechBrief Safeguard Your Remote Employees With CyBlock Hybrid www.wavecrest.net For organizations that are composed of a main office, branch offices, and remote and mobile users, there is a certain

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

How To Manage Sourcefire From A Command Console

How To Manage Sourcefire From A Command Console Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security

More information

efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace

efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace efolder White Paper: Three Network Security Tools to Block Dropbox in the Workplace December 2014 Copyright 2014, efolder, Inc. Introduction Bring your own device (BYOD) has been on the rise as employees

More information

BUSINESS FOCUSED EXCHANGE REPORTING. Guide To Successful Microsoft Exchange Reporting & Analysis

BUSINESS FOCUSED EXCHANGE REPORTING. Guide To Successful Microsoft Exchange Reporting & Analysis BUSINESS FOCUSED EXCHANGE REPORTING Guide To Successful Microsoft Exchange Reporting & Analysis Understanding Business-focused Exchange Reporting Most organizations today rely heavily on email and have

More information

Dell SonicWALL report portfolio

Dell SonicWALL report portfolio Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer

More information

Scalability in Log Management

Scalability in Log Management Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:

More information

ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...

ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW... TABLE OF CONTENTS WELCOME TO EXCHANGE REPORTER PLUS... 4 CONTACT ZOHO CORP.... 5 GETTING STARTED... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OF EXCHANGE REPORTER PLUS... 9 HOW EXCHANGE REPORTER PLUS WORKS...

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

Reports. Quick Reference Card. Option Group. Date Settings. Time Options. Agent and Queue Selection. Call Types

Reports. Quick Reference Card. Option Group. Date Settings. Time Options. Agent and Queue Selection. Call Types s Quick Reference Card Introduction to s The s module empowers Zeacom Communications Center users to run customized reports about their contact center agents, call handling, and Zeacom CTI Server system

More information

Features and benefits guide for partners and their customers

Features and benefits guide for partners and their customers and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Call Management. V6 User Guide

Call Management. V6 User Guide Call Management V6 User Guide 1 Page Overview 3 Call Management 3 My Reports Dashboard 4 Standard Widgets 5 Custom Widgets 6 Call Recordings 6-7 Reports Catalogue 7 Time Interval Reports 7 Extension Reports

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Call Logging Quick Reference User Guide

Call Logging Quick Reference User Guide Call Logging provides companywide call records, comparison and analytical tools for tracking and improving the efficiency and effectiveness of business communications. An intuitive, feature rich interface

More information

The University of Information Technology Management System

The University of Information Technology Management System IT Monitoring Code of Practice 1.4 University of Ulster Code of Practice Cover Sheet Document Title IT Monitoring Code of Practice 1.4 Custodian Approving Committee Deputy Director of Finance and Information

More information

Network Visiblity and Performance Solutions Online Demo Guide

Network Visiblity and Performance Solutions Online Demo Guide Network Visiblity and Performance Solutions Online Demo Guide Organizations rely heavily upon their networks and their ability to deliver business services and information. Any degradation or interruption

More information

Exporting IBM i Data to Syslog

Exporting IBM i Data to Syslog Exporting IBM i Data to Syslog A White Paper from Safestone Technologies By Nick Blattner, System Engineer www.safestone.com Contents Overview... 2 Safestone... 2 SIEM consoles... 2 Parts and Pieces...

More information

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity

More information

VMware vcenter Log Insight User's Guide

VMware vcenter Log Insight User's Guide VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information