Thanks to @scottalanmiller and @JaredBusch; I have a nice flowing network currently... well.. as nice as can currently be with a mess still behind it.
While I still sifting through the book and forum, I just wonder what kind of reporting can be generated from it. While I understand UT is a full OS with 'stuff on top', it had what I felt was some good reporting tools. It was pretty easy to see what was being passed back and forth, which is how I found a computer being used to access a gaming site - without the user knowing.
It would be rather nice to see some of the reports that I had access too with UT.. at least to some degree...
Thoughts? Pointers?