Solved

Analysis of web access

Posted on 1998-06-03
2
275 Views
Last Modified: 2013-12-25
I am implementing a IIS web server for a client who needs to know who is looking and what sort of information.
ie: is the target client finding the service worthwhile or is the service being played with?

Can anyone suggest an analysis package that will cut the user accesses everywhich way?
0
Comment
Question by:colinmiller
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
bobline earned 50 total points
ID: 1857087
You server should generate access logs and you can make CGI scripts for analyzing this data. There are plenty of statistics scripts on the net, have a look at http://www.scriptsearch.com/.

But in fact I think that you'll come to writing your own analyzing script that fits your needs ;-)
0
 

Expert Comment

by:subhash060598
ID: 1857088
IIS creates a log file which can be analyzed either using your own scripts or you could use log analysis software like WebTrends(commercial), HitList(Free). These software programs are available for download at most of the shareware sites.

The reports created by these log analyzers are comprehensive.
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Because your company can’t afford for you to make SEO mistakes, you’ll want to ensure you’re taking the right steps each and every time you post a new piece of content. This list of optimization do’s and don’ts can help you become an SEO wizard.
Although a lot of people devote their energy toward marketing for specific industries, there are some basic principles that can be applied to any sector imaginable. We’ll look at four steps to take and examine how those steps were put into action fo…
Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question