The Home page offers you a summary of collected data, which includes web security status, bandwidth trends, top 5 accessed web categories and monitor status. But if you want to you can do it from the settings tab, where you control the Database, the Activity log, Notifications, Options, Policies, Remote Devices, Alerts and Proxy Settings. Capabilities also include the prevention of data leakage through socially-engineered websites and the ability to interrupt or stop a connection in real time. Some typical examples may be Facebook, YouTube, Myspace and so on. Proceed through the next steps and wait until the setup is completed. In the next step, you will have enter the license key to activate the full version of the application. Setting Up Reporting And Notifications: Now that you have configured WebMonitor, we will need to setup the reporting and notification to get a clear picture of the violations occurring in the network.
You can interrupt any active connection. All functions are lined up in an understandable order in which you can see all the detected threats. Now we will need to configure the program by defining a set of rules which will help monitor and control your network the way you want. Ignoring the dangers of online activity can lead to malware infections or data breaches. Each of them offers you extensive data and graphs, while also letting you sort information by category.
The first reason is to control the websites your employees or users can visit during work hours. The Reports category lets you generate logs based on the type of activity you are interested in. You can also trigger the download action for the virus definition update. This backup may be useful in case the upgrade fails. This site is not directly affiliated with. Intuitive dashboards give a clear, detailed picture of how much bandwidth goes into productive activities, and how much of it is wasted on fruitless browsing. All these options make the app very versatile and customizable.
This is very useful when you want to restrict users from downloading certain file types e. Configuring Web Filtering Policies: The web filtering policy section allows you to specify different rules and work hour conditions in your organizations network. You can also view the list of mostly used website categories. This helps boost employee productivity by allowing total control over what your employees can access online, in real-time. An upgrade is not possible in a 32-bit machine and a new installation in a supported environment is required. Another feature of the program is that it monitors Internet activity which can help companies be sure that their employees manage their time on the Internet. But the available view of the interface shows that it has easy-to-operate functions and everything is nicely done.
You can access a list of templates which include bandwidth, activity and security logs, but it is also possible to view a collection of already generated reports by clicking the corresponding tab. And it proved quite useful to find out the user violating the norms. Then take full control over how it should be used. You can use this section to define a list of sites which you do not want your users to visit. Managing a network connection within an organization can be tricky, you have to keep an eye on different things such as file downloads, visited websites, bandwidth usage and so on.
There is no registration needed for downloading. I am thinking they should probably close the doors on this place so those employees with some know how can work for a reputable company. Configuring Virus Scanning: If you are using antivirus programs like Bitdefender, Kaspersky or Norman then you can control their updates as well as scanning options valid for Kaspersky only for them. Considering the user experience and wide range of functionality that it offers, I definitely recommend this tool to every network administrator. Web interface After successfully deploying the application to the target computer, it is automatically launched via Internet Explorer.
The app guides you and provides you with handy details during each step. The program allows you to monitor the activity of your employees, such as the visited websites or downloaded files. Latest versions of software and fixes remain available for download. The Dashboards category enables you to navigate to your favorite section, by choosing from Bandwidth, Activity, Security, Real-Time-Traffic, Quotas and Agents. Insights and reports After the first hour of web activity, the WebInsights tab lets you access insights on bandwidth usage, productivity and security. This solution lets you filter the sites that your users can browse whilst blocking access to websites in particular categories, such as adult, online gaming, personal email, P2P and travel websites. The tool is easy to install and use.
So I gave them 4 months to try and make this work. This step is required to prevent the operating system from blocking certain actions by the installer. Publisher description Control your Internet users? In the right pane, go to the tab Download Control and configure permissions for downloading the listed file types. However, the program is free to try for a period of 30 days. Together they allow accurate control over what users are doing online and the applications they are using.