Wayne, You might want to ask this of the EZProzy list. I can tell you what we do here. First, we have the following options open: Option LogUser LogFormat %h %l %u %t "%r" %s %b %u Basically the LogUser option was added to track possible abuse. It also, combined with the LogFormat, allows me to pick out only 302 returns for initial log-ins and connections (connections are added because one can to a different DB having once logged in). I am sure others use some sort of web-analyzing tool. I've been content running the log through Microsoft Access and extracting the part of the log I need usage statistics. (OK, I also make use of Google Analytics and looking a bit, I just might make more use of the regular expressions to filter the results accordingly). --jimm On Mon, Nov 15, 2010 at 10:12 PM, Wayne Lam <[log in to unmask]> wrote: > Hi, > > > Just wonder if anyone use ezproxy or other mechanism that logs down the > usage of journals, databases, etc. > > It seems customization of ezproxy log would not provide a "type" of users > (ptype for III users). On the other hand if you use external > authentication, > you will have to > combine ezproxy log and the log with user type. > > > I would like to hear how the statistic work-flow is done in other > institute. > > > Thanks > > Wayne > > > -- > ----------------------------------------- > Wayne Lam > Assistant Library Officer I > Systems Development & Support > Fong Sum Wood Library > Lingnan University > 8 Castle Peak Road > Tuen Mun, New Territories > Hong Kong SAR > China > Phone: +852 26168585 > Email: [log in to unmask] > Website: http://www.library.ln.edu.hk > -- jimm wetherbee <http://sites.wingate.edu/jmw/> Information Systems Librarian <http://library.wingate.edu> Wingate University <http://www.wingate.edu> --lux et fides--