Report Descriptions

Report Descriptions

Wavecrest products provide several reports to clearly depict a work group or individual user’s Web activity. To furnish additional value, most reports contain multiple sub-reports or tables that cover different aspects of the activity.

Content Flexibility.  While our reports can be very comprehensive, they also can be easily configured to restrict the information displayed. Restrictable parameters include: (a) categories displayed, (b) number of users displayed, (c) time frame covered, and (d) groups or users to be covered. With this flexibility, recipients can get only the information they want and need.

Automatic Abuse Detection (“Thresholding”).  Another form of restriction is Abuse Thresholding. With this feature enabled, selected Wavecrest reports can be configured to detect abuse automatically–using your own organization’s abuse-threshold criteria. Thresholds can be set–by category–on the basis of the number of "acceptable" visits per user in a 24-hour period.


Descriptions of All Reports

Each report is described briefly below.

To help the user derive maximum benefit from the reports and ensure accurate interpretation of results, a glossary of terms is provided at the end of this set of report descriptions.


High-Level Summary Reports

Acceptable Visits Report

Features.  This report depicts Web-use activity only within categories classified or rated as "Acceptable." By category, it shows total number of visits made by individual users. Users are identified, but individual sites are not.

Benefits.  Management can quickly determine the amount of acceptable activity. This can be done by individual category or on a summary basis for all acceptable categories.


All User Summary Report

Features.  This is a tabular report that depicts each user's activity from a high-level acceptability perspective. For each user, this report shows the download time and total number of visits that have been classified as "Acceptable," "Unacceptable," and "Neutral." Extraneous hits (banners, ads, etc.) are not counted. All users are listed, not just the top 25. Individual sites visited are not shown.

Benefits.  This report presents management with a quick-look view of the number of acceptable and unacceptable visits made by each individual user.


Custom Categories Report

Features.  This report depicts Web use in custom categories only (if configured). That is, it shows which users visited which custom categories and the number of visits to each. It does not identify individual sites.

Benefits.  This report provides very concise, very reliable Web-use information focused strictly on subjects of specific interest to the enterprise, specified by the enterprise itself. For example, management can use this information to determine if users are properly using particular intranet sites, Human Resources sites, supplier sites, or customer sites. This report can also be used to monitor traffic to inappropriate or unauthorized local sites that may not be popular enough nationwide to be included in the Wavecrest URL List.


Denied Visits Report

Features.  By category, this report shows which users were denied access to Web sites or a page on a Web site. Individual users are identified, but specific URLs are not. Each attempt is displayed in the category attempted. "Denied" attempts for a Web page can signify the user may not be authorized to receive the page, the page may not have been found by the Web server, or the page may have been blocked for access.

Benefits.  If you have Web filtering enabled, this report can verify that it is working. It can also be used to identify users who may be engaging in excessive attempts to visit inappropriate or unauthorized sites. This report is also a useful supplementary tool for individual user audits.


Legal Liability Report

Features.  This report shows Web activity that could lead to legal liability. It indicates by user the number of visits to sites in the Anonymous/Public Proxy, Cults/Occults, Fantasy Sports, Gambling, Hate/Crime, Illegal Drugs, Malware, and Pornography categories. Information is presented by category and by individual user. Individual sites are not separately identified.

Benefits.  This tightly focused report facilitates analyses, investigations, and audits related to actual or potential legal liability issues. Results can be used to prompt further investigation or trigger immediate corrective action.


Neutral Visits Report

Features.  This report provides Web-use activity only for categories classified as "Neutral."  By category, it shows the total number of visits made by individual users. Users are identified, but individual sites are not.

Benefits.  Management can quickly evaluate and see patterns of neutral activity. In doing so, they can focus on categories one at a time, or they can review the consolidated total. The results may prompt management to change the rating of one or more categories to Acceptable or Unacceptable.


Site Analysis Report

Features.  This report depicts a specified set of Web site visits by user, group, or Enterprise from the following different perspectives:

  • Total visits by classification (Acceptable, Unacceptable, Neutral)
  • Total visits by category (Shopping, Pornography, etc.)
  • Total visits by user, per category (Note:  Individual sites are not identified in this report.)
  • Hourly visits
  • Hourly kilobytes read

Benefits.  The Site Analysis report looks at the same visits from the different perspectives, i.e., "acceptability," "category volume," and "user visits within categories." It can be used by all levels of management and by network administrators to perform audits and analyses of activity in either broad or focused areas.


Top Users Report

Features.  This report lists the most active users in terms of visits, hits, and bytes read.  If Abuse Thresholding is enabled, it will also show the user names that go over the threshold settings.

Benefits.  This report can be used by administrators to get a quick, summarized look at Internet activity on the network.  It lists the users with the highest volume of activity, be it acceptable or otherwise. This report is an excellent screening tool and can be used to prompt drilldown and further investigation.


Top Web Sites Report

Features.  This report shows, by Web site, the number of visits made during the reporting period. Each site's category is shown alongside the number of visits made. The list is sorted in descending order by the number of visits; this enables quick determination of site "popularity." Individual user IDs are not shown on this report, but hyperlinks to all visited Web sites are provided to facilitate further analysis.

Benefits.  This report highlights the Web sites that were most visited during the reporting period. If these visits are inappropriate, you can use this information to prompt deeper investigation. You may also consider including the offending sites in your blocking regimen if you have one of our Web security products.


Unacceptable Visits Report

Features.  This report depicts Web-use activity only within categories classified as "Unacceptable." By category, it shows the total number of visits made by individual users. Users are identified, but individual sites are not.

Benefits.  Managers and administrators can quickly evaluate and see patterns of unacceptable activity by user and category. The latter can be done by individual category or at a higher level by a consolidation of all unacceptable categories. If excessive unacceptable activity is indicated, the reviewer can quickly drill down to other reports for further detail.


Audit Detail Reports

Category Audit Detail Report

Features.  This report provides a detailed analysis of users' Web activity in a particular category that you select, e.g., Pornography. For each visitor to that category, all URLs, including sub-pages as well as home pages (sites), are listed separately. The report also provides a summary total of visits to the category.

Benefits.  This report is very useful for identifying the most active users and the most heavily visited sites and pages in a selected category. This makes it an excellent tool for conducting detailed audits and investigations of possible misuse of Web-access resources.


Category Audit Summary Report

Features.  This report provides a synopsis of users' Web activity in a single category that you select. It lists all visited URLs and the number of visits to each, but does not list individual users. A hyperlink to each domain is provided.

Benefits.  This report is very useful for a quick-look determination of whether or not Web-access abuse is taking place in a particular category, e.g., Pornography.


Denied Detail Report

Features.  This report shows the specific URLs to which users were denied access by user. Each attempt is displayed in the category attempted. "Denied" attempts for a Web page can signify the user may not be authorized to receive the page, the page may not have been found by the Web server, or the page may have been blocked for access.

Benefits.  If you have Web filtering enabled, this report can verify that it is working. It also indicates the number and type of blocked attempts (i.e., Denied, Failed, and Unknown) and is a very useful supplementary tool for individual user audits.


Legal Liability Detail Report

Features.  This report shows the specific URLs of legal liability Web activity by user, that is, visits to only the Anonymous/Public Proxy, Cults/Occults, Fantasy Sports, Gambling, Hate/Crime, Illegal Drugs, Malware, and Pornography categories that pose a legal liability risk.

Benefits.  The report provides only Legal Liability Web use. This means that smaller, more focused reports are available to facilitate analyses, investigations, and audits related to legal liability issues.


Search Terms Audit Detail Report

Features.  This report shows search terms that users entered on popular search sites such as Google. It includes an option to show “prefetched” search results that were performed as the user was typing. These results are referred to as keystroke searches.

Benefits.  This report can be used as a tool to aid in forensic investigations. It also indicates the number of search terms entered and can give the details of a user's keystrokes.


Site Audit Detail Report

Features.  This report focuses on Web activity associated with one or more Web sites. Every hit or visit made to the specified URLs is listed separately by user. Hits or visits are listed chronologically, and information included for each hit or visit consists of the user, category, and full URL.

Benefits.  Management has a complete yet concise view of all users that visited the specified Web sites and the resultant activity (hits or visits). This information can be used for personnel appraisal purposes, usage audits, etc.


Site Audit Summary Report

Features.  This report lists the top users who visited a particular site. The report can be run for more than one site and shows the total number of visits made by the user, hourly total visits, and hourly total kilobytes read.

Benefits.  This report can be used by administrators to get a quick, summarized look at Internet activity by Web site. It lists the users with the highest volume of activity.


User Audit Detail Report

Features.  This very detailed report focuses on a single user. Every visit made by the user is listed separately in chronological order. Information for each visit consists of the site's category and full URL. Each URL is hyperlinked so the site or page can be quickly accessed for review if desired. A summary total of visits by category is also provided.

Benefits.  Management has a concise but complete view of every URL the user has clicked. This information can be used for personnel appraisal purposes, incident investigations, usage audits, etc.


User Audit Summary Report

Features.  This report lists all the Web sites visited by a single user during the reporting period. The report indicates each listed site's category and the number of visits made to it. A hyperlink to each site is provided to facilitate further review by management.

Benefits.  Management is provided with reliable information to use in analyzing, evaluating, or investigating an individual user's Web activity.


IT Reports

Network Information Report

Features.  This report depicts total visits per classification, total visits per category, hourly total visits, and total kilobytes read. It also shows download times (see definition in the appendix to the report). No individual IDs or sites are identified in this report.

Benefits.  This report is a powerful tool for network administrators. It serves as a valuable aid for managing and controlling bandwidth usage. By not showing users, it keeps the focus on bandwidth usage (via visits, hits, and bytes), making it easier for administrators to quickly identify potential network performance problems.


Site Analysis Bandwidth Report

Features.  Similar in structure to the Site Analysis report, this report focuses on bandwidth consumption instead of visits. It breaks down bandwidth usage first by acceptability classification, then by category within each classification, and then by user within each category.

Benefits.  This report provides IT personnel with a comprehensive, categorized picture of how and when Web access is being used, and it does so while identifying the most active users in each category. This data is very helpful for managing bandwidth usage and advising management on corrective measures.


Top Bandwidth Sites Report

Features.  This report shows, by kilobytes, category, and actual URL, the top bandwidth-consuming site visits made during the reporting period by the selected group. Each site's category is shown alongside the kilobyte consumption for the site. The list is sorted in descending numerical order by the highest bandwidth consumption; this enables quick determination of site effect on bandwidth. Individual user IDs are not shown on this report. Hyperlinks to all visited Web sites are provided to facilitate further analysis.

Benefits.  This report quickly identifies the Web sites that consumed the most bandwidth in your network during the reporting period. If the consumption is unwarranted, you can use this information to prompt deeper investigation, or you can include the offending sites in your blocking regimen if you have one of our Web security products.


Cloud Services Reports

Cloud Services Detail Report

Features.  This report shows the specific URLs of cloud services by user, that is, visits to only the Audio Streaming, Cloud Infrastructure, Cloud Storage, Collaboration, CRM, Development, File Sharing, HR, Personal E-Mail, Video Streaming, and VoIP Services categories.

Benefits.  Management has a complete and concise view of every cloud service URL the user has clicked. This information can be used for cloud usage audits, identifying the most active users and the most heavily visited sites.


Cloud Services Summary Report

Features.  This report shows the Web activity of users accessing cloud services. It indicates by user the number of visits to sites in the Audio Streaming, Cloud Infrastructure, Cloud Storage, Collaboration, CRM, Development, File Sharing, HR, Personal E-Mail, Video Streaming, and VoIP Services categories. Information is presented by category and by individual user.

Benefits.  This report can be used to identify cloud service usage patterns to enable new cloud services, better manage cloud subscriptions, and highlight anomalous activity. It can be used to reduce the risk posed by both approved and unapproved cloud services, enabling the safe and cost-effective implementation of cloud services.


Improve Your Reporting Results

Top Noncategorized Sites Report

Features.  This report shows all unidentified hit activity, i.e., all URLs that were routed to the "Other" category. Therefore, the report reflects all extraneous images, banners, ads, multimedia items, etc., as well as bona fide visits. For each URL listed, the report shows the number of hits and the full domain name. Individual user IDs are not shown. The list is sorted in descending order by number of hits. Hyperlinks to all Web sites are also provided.

Benefits.  This report can be used by administrators to help identify sites that are relatively unknown but are of particular interest to the organization. These can be reported to Wavecrest for inclusion in the Wavecrest URL List. It can also help identify any intranet sites that perhaps should be added to a “Company Intranet” custom category. A further benefit can be derived from this report by sending it to sites@wavecrest.net for research by the Wavecrest staff. Upon receipt, the staff will identify, research, and categorize the "Other" URLs and incorporate them into the URL List. Inclusion of these URLs in the URL List will greatly improve future reports.


Audit Data Export

In CyBlock Software and Cyfin, reporting includes the Audit Data Export that allows you to export the details of users’ Web activity.

Features.  The export is available in CSV file format and provides the details of users’ Web activity in one or more categories that you select. Every visit made by a user is listed separately in chronological order. Information for each visit includes the user name, IP address, category, date/time, Web site, and full URL.

Benefits.  The data can be exported to external applications, e.g., spreadsheets, report generators, and relational databases, for analysis and manipulation by management. This allows management to identify the most heavily visited sites in a selected category for specific users. This information can be used for employee appraisals, incident investigations, usage audits, etc.


Glossary of Terms Used in the Above Reports

Abuse.  This term refers to a level of Web use (in a designated category) that is totally unacceptable to the enterprise. Automatic abuse-detection is an optional feature within the in reporting system. It is based on enterprise-specified criteria. If abuse-detection is chosen, the enterprise decides which categories to monitor and specifies the levels (thresholds) at which usage becomes abusive.

Category.  This term refers to the sorting of URLs into logical groups on the basis of the URL's content. Examples of categories include Shopping, Sports, Pornography, Entertainment, Financial, etc.

Classification.  This term refers to the designation or labeling of a category as "Acceptable," "Unacceptable," or "Neutral."

Denied.  This term refers to a failed attempt to access a Web site. For the most part this occurs because the user is not authorized to access the site, i.e., his access has been "blocked." However, a "denied" indication can also be caused by technical anomalies, e.g., "page not found by server", etc.

Domain.  A "name" that is part of a URL (Web site address). More readable and memorable than a numerical address.

Download Time.  Download time is only a best-guess, rough indicator of time spent on the Internet. As used in the reports, Download Time equates to the product of (a) the smallest (average) amount of time required to download a typical Web page, multiplied by (b) the number of visits. For report purposes, "time to download" is set to 10 seconds. Here's an example calculation: "100 Web pages multiplied by 10 seconds each = 1,000 seconds = 16 minutes and 40 seconds."

Hit.  A hit is any type of viewable or usable data transmission that is triggered by a visit to a Web site and is received by the computer user's browser. Such transmissions can be in the form of a file, message, object, graphic, link, banner, ad, or push item. Note that visits constitute a subset of hits.

Threshold.  This term refers to the level at which usage becomes abusive within a designated category. Thresholds are set by the enterprise on the basis of its Web access policy or guidelines.

URL.  Universal Resource Locator. The full address of a Web site. Includes protocol designator (e.g., HTTP), domain name (e.g., www.amazon.com), and directory or file name (e.g., /index.html).

Visit.  A visit is defined as a click on a Web page that requires a deliberate action on the part of the user. In these reports, visit totals do not include multi-media URLs such as graphics or audio pages, banners and ads, "push" traffic, etc. Because downloads require deliberate clicks, they are counted as visits.

© Copyright 1996-2018 Wavecrest Computing. All Rights Reserved.

Trusted Worldwide

Free Trial
Price Quote
"When I seek out a company to provide a product or service, I want it all -- a great product, a great price, a salesperson that is responsive and treats me like I am their only customer, and technical support that is intelligent, easy to access, and easy to understand. Wavecrest meets all of these criteria."

-Karleen Carlson, IT Manager, Van Diest Supply Company
LEGAL PRIVACY | © Copyright 1996-2018 Wavecrest Computing. All Rights Reserved.
Facebook Twitter Linkedin Blog Google+ YouTube Knowledge Base