Skip to content Skip to main navigation Skip to footer

Tag: Cyfin

v9.6.7 Release Notes for Cyfin

Enhancements

  • System
    • License
      • Updated the evaluation licensing system allowing the product to request trials for Firewall, O365, Defender, and VPN modules.
      • Updated EULA agreement. 
  • Log Configurations
    • CheckPoint
      • Updated CheckPoint configuration to make use of new session capabilities.
    • BlueCoat
      • Added new BlueCoat configuration using new parser system.
  • Reporting
    • Visualizer
      • Added event logging reporting for interface logons and report generation requests.  
    • Parser
      • Updated parser to allow for import of records that contain just application name and no URL.
      • Session
        • Updated parser to be able to identify and update log entries that belong to the same session. This includes updating the session end time and the number of bytes that was transferred for example.
      • Templates
        • Updated the template audit section to sort additional number fields as descending by default.
        • Added ability to filter based on session duration by seconds.
      • FortiGate
        • Added ability to disabled session tracking for faster start and stop time lookup.
        • Added throttling to prevent resource starvation when importing session data.
  • Data Management
    • Log Data Setup
      • Added ability to use epoch time in seconds instead of just milliseconds and nanoseconds.

Corrections

  • User Management
    • Groups and IDs
      • AD import
        • Changed Permission Group label to Security Group to align with industry standard.
      • Logon Accounts
        • Corrected 2-factor authentication issue with newly created AD accounts that prevent logging in.
  • Data Management
    • Log Data Setup
      • Fixed the date time configuration for data source to properly adjust the timezone based on the system default.
    • Logfile Viewer
      • Prevent screen from showing license upgrade required for older configurations.
  • Reporting
    • No longer not excluding category or application for configurations for records that do not contain URL.
    • Templates
      • Corrected issue that doubled the configured fields in the section when editing an Audit section.

v9.6.6.c Release Notes for Cyfin

Enhancements

  • Secure Communication
    • Added communication client to talk to Wavecrest App Center.
      • Added communication for requesting evaluation license for Reporting modules (Firewall, O365,etc etc).
  • Reporting
    • Templates
      • When creating audit section and sorting by Bytes, order by Bytes descending instead of default of Date ascending.
  • Log Configurations
    • Updated FortiGate parser to properly handle Web session logging in FortiGate where multiple URLs are visited during a single session. Byte field is calculated for each request during the session (if present). 
  • Firewall Reporting
    • Templates
      • Added FortiGate option for Data Type in Report Templates to create sections for FortiGate firewall data.
  • Data Management
    • Log Data Setup
      • Updated configuration wizard to allow customer to choose Wavecrest categories or the categories contained in the device log (if present).
      • Added ability to enable or disable firewall data collection.
        • If License upgrade is required for Firewall module, a link is provided to request a free trial using new Secure Communication component.
      • Added ability to define timezone when no timezone is configured in the device log.

Corrections

  • Reports
    • Fixed the total row in the Top Classifications table in Site Analysis report to display the word Total instead of Neutral.

Best Practices in Monitoring Employee Web Activity: The Role of Cyfin

Introduction

In today’s digital workplace, understanding and monitoring employee web activity is not just a matter of assessing productivity; it’s about ensuring security, compliance, and optimal use of resources. This document explores best practices in monitoring employee web activity, with a focus on the capabilities of Cyfin, a leading tool in this domain.

Defining ‘Activity’ in the Workplace

‘Activity’ in the context of employee web use encompasses a range of digital behaviors – from browsing patterns to the use of online tools and platforms. It’s vital to differentiate between productive activities that contribute to business objectives and non-productive activities that may pose risks or waste resources.

The Importance of Monitoring Employee Web Activity

Monitoring employee web activity is crucial for several reasons:

  • Ensuring Productivity: By understanding how employees use the web, organizations can optimize workflows and eliminate inefficiencies.
  • Protecting Company Resources: Monitoring helps in preventing the misuse of company resources and maintaining operational security.
  • Legal and Compliance Adherence: It ensures that employee web usage complies with relevant laws and industry regulations.

Cyfin’s Key Features

Cyfin stands out for its robust capabilities in monitoring and reporting employee web activity. Key features include:

  • Detailed Investigations: Cyfin excels in investigating web usage, offering insights into both regular and anomalous activities.
  • Activity Categorization: It categorizes web use into productive and non-productive, aiding in the analysis of employee efficiency.
  • Comprehensive Reporting: The tool provides clear and detailed reports, making it easier for management to understand web usage patterns.

Investigation and Analysis

Through Cyfin, organizations can conduct in-depth investigations into web activity, identifying potential security threats or policy violations. This level of analysis is critical in understanding employee behavior and safeguarding against various risks.

Data-Driven Policy Making

The insights provided by Cyfin are invaluable in shaping company policies related to web use. Policies can be tailored based on actual data, leading to more effective management and regulation of employee web activity.

Legal and Security Implications

Understanding employee web activity through Cyfin helps in identifying potential legal and security liabilities, such as data breaches or non-compliance with regulations. This knowledge is vital for proactive risk management.

Balancing Monitoring with Privacy

It’s important to balance the need for monitoring with respecting employee privacy. This includes being transparent about monitoring practices and ensuring compliance with legal standards for employee monitoring.

Best Practices in Implementation

For effective implementation of Cyfin or similar tools, organizations should:

  • Obtain necessary permissions and ensure legal compliance.
  • Train relevant teams on using and interpreting the monitoring data.
  • Regularly review and update the monitoring process.

Continuous Improvement and Adaptation

Finally, it’s important to continually assess and improve the monitoring process. As technologies and workplace dynamics evolve, so should the strategies for monitoring employee web activity.

Conclusion

Effective monitoring of employee web activity is key to maintaining a productive, secure, and compliant workplace. Tools like Cyfin play a crucial role in achieving these objectives, offering detailed insights and aiding in informed decision-making.

User Behavior Analytics (UBA) Offers Significant Benefits to Management and HR Teams

Cyfin - User Behavior Analytics tools

User Behavior Analytics (UBA) tools, like Cyfin, offer significant benefits to management and HR teams, especially in providing insights into how the workforce is using the internet and IT resources. These benefits extend beyond traditional cybersecurity applications, aiding in understanding and optimizing workforce behaviors and compliance.

For Management:

  1. Productivity Insights: Tools like Cyfin can track how employees use company resources, including internet and software applications. This data reveals trends in productivity, identifying peak productive hours, frequently used tools, or areas where employees might struggle.
  2. Resource Optimization: Understanding which tools and applications are most used, management can make informed decisions about resource allocation, system upgrades, or scaling back underutilized services, guided by data from tools like Cyfin.
  3. Policy Compliance: Cyfin can monitor compliance with company policies regarding internet and resource usage, flagging deviations to ensure adherence to guidelines.
  4. Risk Management: Identifying risky behaviors, such as accessing unsecured websites or improper data transmission, Cyfin helps in mitigating potential risks.
  5. Decision Support: Cyfin provides data-driven insights to support better decision-making regarding workforce management, IT investments, and operational strategies.

For HR:

  1. Employee Behavior Analysis: Cyfin provides HR with insights into employee behavior patterns, including interaction with various company platforms and potential misuse of resources.
  2. Enhanced Onboarding and Training: Insights from Cyfin can help HR tailor onboarding and training programs to be more effective and relevant.
  3. Employee Well-being: Monitoring for signs of burnout or overwork, Cyfin aids HR in addressing employee well-being proactively.
  4. Conflict Resolution and Investigations: In cases of alleged misconduct, Cyfin provides objective data to aid in investigations and conflict resolution.
  5. Talent Management: Analysis from Cyfin can assist HR in talent management, identifying high performers and areas needing additional support.

In summary, UBA tools such as Cyfin offer comprehensive benefits to both management and HR by providing deep insights into employee internet usage and behavior. This understanding aids in better resource management, policy enforcement, and overall organizational efficiency, while also supporting employee well-being and productivity. For non-technical staff, it’s important to present Cyfin and similar UBA tools in a context that emphasizes their practical applications and benefits in a straightforward, relatable manner.

Reporting Issue

Issue

Report returns with zero visits

Resolution

  • Repair and download the latest list
    • Screen Path (‘Categorization – URL list – Repair’ and click the ‘Submit’ button)
  • Delete imported data with issue
    • Screen Path (‘Data Management – Report Database – Delete – Manual’) 
  • Re-import data with issue
    • Screen Path (‘Data Management – Report Database – Import – Manual’)

If this didn’t resolve the issue please call or email support

  • 321-953-5351 ext. 4
  • support@wavecrest.net

v9.6.6 Release Notes for Cyfin

Enhancements

  • Categorization
    • Customize
      • URLs
        • Added ability to customize Application/Sites categorization by either editing existing Application/Sites urls or creating a custom Application/Site.
  • User Management
    • Logon Accounts
      • Added 2-factor authentication to logon accounts. When enabled for an account using the edit Logon Account screen, an email code is sent to the corresponding email address each time that user logs on.
  • Reports
    • Application/Sites Sessions
      • New Web Session reporting. Added web data analyzer to identify user Web Sessions based on a user’s activity to an application. Analyzer is scheduled to run daily to identify sessions for the previous day. Added session fields of Session Start Time, Session Stop time and Session Hits to template reporting and pre-configured Dashboard and panels to Visualizer to display User Session information.
  • Settings
    • Session Analyzer
      • Added new screen to adjust the configurations used by the Session Analyzer. In addition, you can also re-analyze the web data for a given configuration.
  • Data Management
    • Log Types
      • Updated CheckPoint parser to be able to parse additional types of records.
      • Updated Zscaler to:
        • parse CSV export and Event format.
        • include additional fields like Super Category.
        • Removed None as valid application.
        • Removed default browser value.
        • Added Tunnel protocol mapping to https
      • Updated Palo Alto parser to include better header record matching. Prevents issues where URL field is misconfigured.
    • Parser
      • Updated parser to properly handle records that have duplicate keys by validating the value.
      • Updated parser to allow protocol mapping to convert field value to http or https protocol.

Corrections

  • Health
    • Corrected problem with lingering connections to metric server leading to performance degradation.
  • Arrays
    • Fixed product update instructions to propagating to array members.

Unlock Comprehensive Web Usage Insights with Advanced Categorization

In the realm of cybersecurity, not all categorization lists carry equal weight. Most firewall and web filtering tools come equipped with these lists, primarily aimed at filtering out websites that pose security threats or legal liabilities, aligning with a company’s usage policy.

However, it’s crucial to be discerning when employing these lists for evaluating employee web usage activity. A common shortfall of conventional lists lies in their narrow focus on security and legal liability, often resulting in a lack of comprehensive categorization. Consequently, they may inadequately represent the full spectrum of employee web activity, frequently leading to mis-categorizations, especially in non-security related categories.

In today’s landscape, website categorization is often perceived as a standardized commodity, with many assuming that all lists render uniform information. This assumption holds if the sole purpose is to filter out malicious content or legal liability sites. However, a multitude of companies necessitate extensive employee web usage reports for intricate purposes such as investigations, managerial oversight, and HR monitoring. These reports are pivotal in identifying areas for augmenting productivity and mitigating prospective legal vulnerabilities.

Overlooking the nuanced differences in categorization lists can inadvertently foster inaccurate reporting, culminating in misguided managerial decisions, compromised investigations, and heightened susceptibility to legal complications.

Since 1996, Wavecrest has been at the forefront, cultivating a categorization system emblematic of comprehensiveness and accuracy. Our unwavering commitment is to furnish a holistic view of web usage. In scenarios necessitating nuanced reporting, it becomes indispensable to consider our meticulously crafted products, Cyfin and CyBlock. These tools are instrumental in facilitating informed decisions, fostering enhanced productivity, and safeguarding against legal pitfalls.

Conclusion: Elevate Your Web Usage Insight with Wavecrest

In a digital ecosystem where precision and comprehensiveness are paramount, settling for a generic categorization list is no longer sufficient. The nuanced demands of modern businesses necessitate a tool that stands resilient against the shortcomings of mis-categorization and incomplete web usage portrayal. Wavecrest’s legacy of innovation and meticulous development has fostered products that transcend the conventional, providing a multi-dimensional view of web activity essential for informed decision-making. With Cyfin and CyBlock, embrace a realm of categorization that is robust, nuanced, and tailored to meet the intricate demands of contemporary web usage monitoring. Opt for Wavecrest, and unlock a wealth of insights that empower your organization to thrive securely and efficiently in the digital landscape.

Unlocking Human Insights from Network Logs: The Role of Specialized Analytical Tools

Abstract

Understanding employee web usage is pivotal for organizations aiming to optimize productivity and ensure policy compliance. Network activity logs, while rich in data, are cluttered with automated and miscellaneous activities that cloud the clarity of human actions. This necessitates the employment of advanced tools capable of fine-tuning the analysis to focus on genuine human interactions. Cyfin stands out in this domain, enabling organizations to derive meaningful, actionable insights from network logs, enhancing decision-making and policy enforcement processes.

Introduction

Navigating through network activity logs to decipher actual employee internet usage presents a complex challenge. The logs are a blend of human-initiated actions and automated processes, making it tough to isolate meaningful user activity. A specialized tool is essential for sifting through this data to reveal the actual patterns of internet usage by employees.

The Need for Enhanced Analytical Tools

Traditional tools often struggle to differentiate between human actions and automated processes in network logs. To accurately interpret employee web usage, a more refined tool is required—one that can sift through the complexities and focus on actual human interactions.

Cyfin: Elevating Analytical Precision

Cyfin emerges as a dedicated solution, uniquely crafted to concentrate on human-oriented activities within network logs. Its design focuses on filtering out the noise, spotlighting genuine user interactions, thus providing a more accurate representation of employee internet usage.

Impact of Cyfin’s Advanced Analysis

Utilizing Cyfin’s nuanced analysis provides numerous benefits to organizations. It minimizes the risk of misinterpreting employee activities, thus avoiding unjust accusations and ensuring that organizational policies are adhered to more effectively.

Conclusion

For a nuanced understanding of employee web usage, a tool like Cyfin, which offers a refined approach to network log analysis, is essential. Cyfin provides the necessary clarity and precision, enabling organizations to make informed decisions based on accurate interpretations of employee internet interactions.

Sessions

The Session Settings Screen allows you to customize, run, and analyze your session algorithm against specific log file configurations and defined timespans. Built with adaptability in mind, you can modify session algorithm parameters to better align with the unique requirements of any customer environment.

Go to Settings – Reports – Sessions. The Session screen is displayed

Session Analyzer

  1. To manually run the session algorithm go to the Session Analyzer section
  2. Select Log File Configuration: Use the dropdown to select the log files you’d like to include in your analysis.
  3. Define Your Timespan: Using the calendar tool, select your desired start and end dates and times.
  4. Press the button labeled ‘Analyze’ on the screen to initiate the session algorithm.

Session Analyzer Configuration

If you’re familiar with the specifics of the session algorithm and wish to fine-tune it, use the input boxes to adjust the default parameters. If unsure, it’s recommended to consult the definition below or contact our support team for assistance.

  1. To override the system defaults use the below input boxes to adjust the default parameters.
  2. Press the button labeled ‘Update Configuration’ to apply Session algorithm parameter changes.

Session Parameter Definitions

  • Minimum Duration (minutes): The least amount of continuous Web activity to a particular Application/Site required to constitute a session.
  • Inactivity Cutoff (minutes): The amount of time since the last activity to an Application/Site for a session to be considered complete. Future activity will start a new Session.
  • Minimum Session Hit Count: The minimum amount of Web activity (log hits) required to each Application/Site for the activity to constitute a Session.
  • Maximum Session Duration(hours): A hard limit in hours for acitvity to single Application/Site.
  • Required Browser User-Agent: When enabled Log records containing known browser types will be analyzed.
    • Notes:
      • Keeping the checkbox enabled allows for a more refined and relevant session analysis by focusing on known browser types.
      • Users who wish to view all log records, regardless of browser type, should disable the checkbox. However, please note that disabling this option will affect the accuracy of the session analysis.
      • Disabling this checkbox might be necessary if SSL inspection is not enabled on your firewall. Without SSL inspection, the session analysis may not only be inaccurate but could also return without any results because the user agent field would be empty.