Server log files do not always have the answer, either. These systems were designed to block or control access and reporting was just added on at a later date. While some firewalls and proxy servers include reporting capabilities, most are not up to the job. As internet usage constantly grows, malicious, phishing, scamming, and fraudulent sites are also evolving. One of the main drivers for this is the need to keep the network secure.
For many years, IT managers have tried to get some sort of visibility at the network edge so that they can see what is happening.
Associating internet activity with MAC addresses