Protecting your users is increasing important
In the modern age of Bring Your Own Device, phishing attacks and terrorist threats, it is crucial that Internet access is controlled and monitored.
A web proxy sits between your client computers and the Internet, fetching web pages on their behalf. A cache is usually incorporated which means that pages that have been viewed once are stored on the server. This means that viewing the page a second time (on any client computer) is much quicker. This is particularly useful in schools where multiple pupils may be viewing the same web pages. Even a fast broadband connection is an order of magnitude slower than your local network.
Having a local proxy also allows you to filter access to websites. Even if your ISP provides filtered web access, it is often very useful to block extra websites (such as Hotmail). You may use automatically updated lists of blocked sites which are sorted by category (e.g. sex, violence, illegal software). In addition to the automated lists, the NetManager offers you fine-grained control over web access. For example, you could configure the library computers so that they can only access the BBC website between 12 and 2pm. You may set filters for different users, groups, computers, time of day, filenames and, of course, websites. These can be combined in numerous ways to form whitelists and blacklists. All configuration is web-based.
Blacklists and phraselists
NetManager will download daily updates of blacklisted sites containing many millions of inappropriate or malicious sites. Example categories include:
- Social Media
- Proxy-bypass sites
In addition to the millions of blacklisted sites, the content of web-pages can be analysed for specific content. This isn't just a simple yes/no. Phrases within the pages can be detected and assigned a score (positive or negative). This means that suitable content (e.g. medical sites) should not be confused with inappropriate sites (e.g. adult-content).
Analysis and reporting
All web accesses via the proxy are logged and the logs are available through a web-based interface. The logs are fully searchable by time, computer, text and username.
Pro-active reports can be emailed to the administrator when a user/device attempts to access chosen categories of blacklisted sites.