DNS Redirector
 Return to FAQ List


FAQ 111: Using Log Parser with DNS Redirector

Category: Everything else


Microsoft Log Parser can be used to analyze the daily log files produced by DNS Redirector.

For an easy menu that facilitates running these commands, download: all-reporting.zip and extract to the C:\DNSREDIR\Reporting directory

For example, you might want to find:

...anything that was blocked...
LOGPARSER "Select Text from 'C:\DNSREDIR\DailyLogs\*16.txt' where Text like '%BlockedIP response sent%'" -i:TEXTLINE -o:DATAGRID

...blocked domains that reference microsoft...
LOGPARSER "Select Text from 'C:\DNSREDIR\DailyLogs\*16.txt' where Text like '%BlockedIP response sent%%microsoft%'" -i:TEXTLINE -o:DATAGRID

...everywhere that the client with IP 192.168.20.102 got blocked...
LOGPARSER "Select Text from 'C:\DNSREDIR\DailyLogs\*16.txt' where Text like '%192.168.20.102 [DNSRedir] BlockedIP response sent%'" -i:TEXTLINE -o:DATAGRID

...sites that were accessed via allowed keywords...
LOGPARSER "Select Text from 'C:\DNSREDIR\DailyLogs\*16.txt' where Text like '%AllowedKeyword bypass%'" -i:TEXTLINE -o:DATAGRID

...clients who bypassed the block...
LOGPARSER "Select Text from 'C:\DNSREDIR\DailyLogs\*16.txt' where Text like '%BypassBlock toggled%'" -i:TEXTLINE -o:DATAGRID

...clients who are accessing myspace...
LOGPARSER "Select Text from 'C:\DNSREDIR\DailyLogs\*16.txt' where Text like '%myspace.com%'" -i:TEXTLINE -o:DATAGRID

Note: In the statements above 'C:\DNSREDIR\DailyLogs\*16.txt' restricts the search to the year 2016



Related articles

 
DNS Redirector | Legal Information | 2003-2017