CyBlock can be deployed in VMware and Hyper-V environments. Installation instructions are available in the admin guides for your particular setup. Click the appropriate Admin Guide link below.
Added 2-factor authentication to logon accounts. When enabled for an account using the edit Logon Account screen, an email code is sent to the corresponding email address each time that user logs on.
Corrections
User Management
Logon Accounts
Corrected issue when editing logon accounts that leads to password being reset.
Added ability to customize Application/Sites categorization by either editing existing Application/Sites urls or creating a custom Application/Site.
User Management
Logon Accounts
Added 2-factor authentication to logon accounts. When enabled for an account using the edit Logon Account screen, an email code is sent to the corresponding email address each time that user logs on.
Reports
Application/Sites Sessions
New Web Session reporting. Added web data analyzer to identify user Web Sessions based on a user’s activity to an application. Analyzer is scheduled to run daily to identify sessions for the previous day. Added session fields of Session Start Time, Session Stop time and Session Hits to template reporting and pre-configured Dashboard and panels to Visualizer to display User Session information.
Settings
Session Analyzer
Added new screen to adjust the configurations used by the Session Analyzer. In addition, you can also re-analyze the web data for a given configuration.
Corrections
Health
Corrected problem with lingering connections to metric server leading to performance degradation.
Arrays
Fixed product update instructions to propagating to array members.
In the realm of cybersecurity, not all categorization lists carry equal weight. Most firewall and web filtering tools come equipped with these lists, primarily aimed at filtering out websites that pose security threats or legal liabilities, aligning with a company’s usage policy.
However, it’s crucial to be discerning when employing these lists for evaluating employee web usage activity. A common shortfall of conventional lists lies in their narrow focus on security and legal liability, often resulting in a lack of comprehensive categorization. Consequently, they may inadequately represent the full spectrum of employee web activity, frequently leading to mis-categorizations, especially in non-security related categories.
In today’s landscape, website categorization is often perceived as a standardized commodity, with many assuming that all lists render uniform information. This assumption holds if the sole purpose is to filter out malicious content or legal liability sites. However, a multitude of companies necessitate extensive employee web usage reports for intricate purposes such as investigations, managerial oversight, and HR monitoring. These reports are pivotal in identifying areas for augmenting productivity and mitigating prospective legal vulnerabilities.
Overlooking the nuanced differences in categorization lists can inadvertently foster inaccurate reporting, culminating in misguided managerial decisions, compromised investigations, and heightened susceptibility to legal complications.
Since 1996, Wavecrest has been at the forefront, cultivating a categorization system emblematic of comprehensiveness and accuracy. Our unwavering commitment is to furnish a holistic view of web usage. In scenarios necessitating nuanced reporting, it becomes indispensable to consider our meticulously crafted products, Cyfin and CyBlock. These tools are instrumental in facilitating informed decisions, fostering enhanced productivity, and safeguarding against legal pitfalls.
Conclusion: Elevate Your Web Usage Insight with Wavecrest
In a digital ecosystem where precision and comprehensiveness are paramount, settling for a generic categorization list is no longer sufficient. The nuanced demands of modern businesses necessitate a tool that stands resilient against the shortcomings of mis-categorization and incomplete web usage portrayal. Wavecrest’s legacy of innovation and meticulous development has fostered products that transcend the conventional, providing a multi-dimensional view of web activity essential for informed decision-making. With Cyfin and CyBlock, embrace a realm of categorization that is robust, nuanced, and tailored to meet the intricate demands of contemporary web usage monitoring. Opt for Wavecrest, and unlock a wealth of insights that empower your organization to thrive securely and efficiently in the digital landscape.
The Session Settings Screen allows you to customize, run, and analyze your session algorithm against specific log file configurations and defined timespans. Built with adaptability in mind, you can modify session algorithm parameters to better align with the unique requirements of any customer environment.
Go to Settings – Reports – Sessions. The Session screen is displayed
Session Analyzer
To manually run the session algorithm go to the Session Analyzer section
Select Log File Configuration: Use the dropdown to select the log files you’d like to include in your analysis.
Define Your Timespan: Using the calendar tool, select your desired start and end dates and times.
Press the button labeled ‘Analyze’ on the screen to initiate the session algorithm.
Session Analyzer Configuration
If you’re familiar with the specifics of the session algorithm and wish to fine-tune it, use the input boxes to adjust the default parameters. If unsure, it’s recommended to consult the definition below or contact our support team for assistance.
To override the system defaults use the below input boxes to adjust the default parameters.
Press the button labeled ‘Update Configuration’ to apply Session algorithm parameter changes.
Session Parameter Definitions
Minimum Duration (minutes): The least amount of continuous Web activity to a particular Application/Site required to constitute a session.
Inactivity Cutoff (minutes): The amount of time since the last activity to an Application/Site for a session to be considered complete. Future activity will start a new Session.
Minimum Session Hit Count: The minimum amount of Web activity (log hits) required to each Application/Site for the activity to constitute a Session.
Maximum Session Duration(hours): A hard limit in hours for acitvity to single Application/Site.
Required Browser User-Agent: When enabled Log records containing known browser types will be analyzed.
Notes:
Keeping the checkbox enabled allows for a more refined and relevant session analysis by focusing on known browser types.
Users who wish to view all log records, regardless of browser type, should disable the checkbox. However, please note that disabling this option will affect the accuracy of the session analysis.
Disabling this checkbox might be necessary if SSL inspection is not enabled on your firewall. Without SSL inspection, the session analysis may not only be inaccurate but could also return without any results because the user agent field would be empty.
In our ever-evolving digital landscape, the focus on cybersecurity and data integrity has never been higher. SSL inspection, which is the process of decrypting and inspecting HTTPS traffic to monitor and regulate web content, is one way organizations aim to boost their cybersecurity posture. Many businesses trust their firewalls to undertake this task, but as technology advances, this approach presents several challenges:
1. Strain on Firewall Performance
The computational load required to perform SSL inspection can be demanding, and this additional burden may affect a firewall’s core functions. If a firewall is overtaxed with decrypting and inspecting traffic, its primary responsibility—shielding your network from threats—may suffer.
2. Limited SSL Inspection Capabilities
Not all firewalls are created equal. While some might possess robust SSL inspection capabilities, others might offer limited functionality or none at all. If you’re relying on a firewall without the necessary capabilities, your organization’s web traffic remains largely unseen.
3. Emerging Encryption Technologies
With encrypted DNS (DoH) and Encrypted Client Hello becoming increasingly popular, firewalls will find it increasingly challenging to intercept and examine traffic. These encryption advancements can limit the efficacy of even the most sophisticated firewalls, rendering them less effective for SSL inspection.
Given these challenges, many experts suggest looking beyond firewalls for SSL inspection.
Proxy-Based Solutions: The Way Forward
For environments seeking comprehensive SSL inspection without overloading their firewall, proxy-based solutions are often the ideal answer. These solutions are specifically crafted to execute SSL inspection tasks, offering detailed monitoring and reporting on employee web activity.
One of the trusted names in this arena is Wavecrest Computing. With nearly three decades in the field, Wavecrest has designed tools like Cyfin and CyBlock to address the specific challenges of SSL inspection.
CyBlock stands out as a premium choice for those in need. Not only does it offer the extensive monitoring and reporting features found in Cyfin, but it can also filter web access in real-time if desired. For businesses solely seeking SSL inspection, monitoring, and reporting, CyBlock fits the bill perfectly.
In Conclusion
Relying solely on a firewall for SSL inspection can lead to potential vulnerabilities and performance issues. As encrypted web traffic becomes the norm and emerging encryption technologies come into play, the challenges will only increase. Solutions like Cyfin and CyBlock from Wavecrest Computing can help businesses rise to these challenges, ensuring robust cybersecurity while providing detailed insights into web activity. If your current setup falls short or you’re aiming to optimize SSL inspection without taxing your firewall, Wavecrest offers the specialized solutions you need.
Added new Health status page to display the current state of different components in the product through Health Modules. These modules can be configured to trigger notification alert emails when an error is detected. The following modules are currently available:
License Expiration – Checks the number of days left on the license and can trigger warning and error notifications based on days left.
Syslog Inactivity – Checks active syslog ports for data being sent and triggers alert when no data is received in a configurable time period. Module also checks for valid data being received instead of just any data and triggers different error alert accordingly.
Reporting
Dashboard
Visualizer
Added an extensive library of preconfigured charts for users to select when creating new panels.
Library
Updated product to use most recent MySQL library (8.0.33).
Corrections
Dashboard
Removed “AVG Daily Usage” and “AVG Daily Ingestion” tiles because metric is not useful when combined with metric data removal as it is currently. Results include large possible negative numbers.