Sales Overview
29
Identifying Legitimate Web and Application Access
6. Now, let’s see how this information can help us.
•
What applications do Eli use?
•
Do you think there is a legitimate business use for this user?
Note:
If you aren’t sure, contact the user and investigate. You don’t want to
block him, if he is using Twitter to launch a new marketing campaign.
7. Close the All Users Screen and return to SmartEvent.
8. Now, let’s look at the top applications by traffic and ask ourselves a few
questions.
•
Which applications are taking up the most bandwidth on the network?
•
Are any of these sites or applications being blocked? Should they be?
9. Notice that YouTube is the first site listed.