SWG Hands-On eBook - page 29

Sales Overview
29
Identifying Legitimate Web and Application Access
6. Now, let’s see how this information can help us.
What applications do Eli use?
Do you think there is a legitimate business use for this user?
Note:
If you aren’t sure, contact the user and investigate. You don’t want to
block him, if he is using Twitter to launch a new marketing campaign.
7. Close the All Users Screen and return to SmartEvent.
8. Now, let’s look at the top applications by traffic and ask ourselves a few
questions.
Which applications are taking up the most bandwidth on the network?
Are any of these sites or applications being blocked? Should they be?
9. Notice that YouTube is the first site listed.
1...,19,20,21,22,23,24,25,26,27,28 30,31,32,33,34,35,36,37,38,39,...62
Powered by FlippingBook