GFI Product Manual: Administrator Guide
GFI Product Manual: Administrator Guide
Administrator Guide
The information and content in this document is provided for informational purposes only and is
provided "as is" with no warranty of any kind, either express or implied, including but not limited to
the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
GFI Software is not liable for any damages, including any consequential damages, of any kind that
may result from the use of this document. The information is obtained from publicly available
sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI
makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of
information and is not responsible for misprints, out-of-date information, or errors. GFI makes no
warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or
completeness of any information contained in this document.
If you believe there are any factual errors in this document, please contact us and we will review
your concerns as soon as practical.
All product and company names herein may be trademarks of their respective owners.
GFI WebMonitor is copyright of GFI SOFTWARE Ltd. - 1999-2011 GFI Software Ltd. All rights
reserved.
Document Version: 1.1.1
Last updated (month/day/year): 06/02/2012
Contents
1 Introduction 9
1.1 About This Guide 9
1.2 About GFI WebMonitor 9
1.3 How Does GFI WebMonitor Work? 10
1.4 GFI WebMonitor Services 12
3 Achieving Results 38
3.1 Achieving Results with GFI WebMonitor - Protecting Your Network 38
3.2 Achieving Results with GFI WebMonitor - Maximize Bandwidth Availability 39
3.3 Achieving Results with GFI WebMonitor - Increase Productivity 40
5 Reporting 53
5.1 Starred Reports 53
5.2 Activity Reports 53
5.3 Bandwidth Reports 56
8 Glossary 113
9 Appendix 1 119
9.1 Assigning Log On As A Service Rights 119
9.2 Adding Items to the Cache Exclusion List 124
9.3 Adding Items to the HTTPS Scanning Exclusion List 125
9.4 Configuring Commonly Used Routers 126
9.5 Configuring Routing and Remote Access 144
9.6 Disabling Internet Connection Settings On Client Machines 144
9.7 Network Access Policy Configuration 150
10 Index 155
List of Figures
Important notifications and cautions regarding potential issues that are commonly encountered.
For any technical terms and their definitions, refer to the Glossary section in this manual.
Request initiation: User requests a webpage or a download from the Internet. Incoming traffic
generated by this request is forwarded to GFI WebMonitor.
Always Blocked/Always Allowed filtering: The internal GFI WebMonitor Always Blocked/Always
Allowed filtering mechanism analyzes user ID, IP address and requested URL, taking the following
actions:
WebFilter module: Analyzes web traffic received from the Always Blocked/Always Allowed filtering
mechanism against a list of categories stored in WebGrade database. These categories are used to
classify and then filter web pages requested by users.
For more information about these categories, refer to Knowledge Base article:
http://kbase.gfi.com/showarticle.asp?id=KBID003165.
GFI WebMonitor can Block, Warn and Allow or Quarantine web traffic according to configured policies.
Quarantined web traffic can be manually approved or rejected by the administrators. Approved
quarantined URLs are moved in Temporary Allowed area; a mechanism used to approve access to a
site for a user or IP address for a temporary period.
NOTE
The WebFilter module is only available in the WebFilter Edition and the Unified
Protection Edition of GFI WebMonitor. In the WebSecurity Edition, web traffic is sent
directly from the Always Allowed/Always Blocked filtering mechanism to the
WebSecurity module.
WebSecurity module: Analyzes web traffic through the download control module and scans incoming
web traffic for viruses, spyware and other malware.
GFI WebMonitor can Block, Warn and Allow or Quarantine suspicious material according to configured
policies. Web traffic is also scanned for phishing material against a list of phishing sites stored in the
updatable database of phishing sites. Web traffic generated from a known phishing element is
rejected while approved web material is forwarded to the user.
NOTE
The WebSecurity module is only available in the WebSecurity Edition and Unified
Protection Edition of GFI WebMonitor. In the WebFilter Edition, WebSecurity processing
is not performed, and web traffic is forwarded on to the user.
IMPORTANT
Forwarding of approved web material by GFI WebMonitor to the user depends on the
network environment; that is, where GFI WebMonitor is installed.
IMPORTANT
Unlicensed users are automatically allowed unrestricted and unfiltered access to the
Internet. The traffic generated by these clients will not be monitored.
For more information about licensing, refer to GFI Software Ltd. website at:
http://www.gfi.com/products/gfi-webmonitor/pricing/licensing
For more information on how GFI WebMonitor counts users for licensing purposes, refer to Knowledge
Base article:
http://kbase.gfi.com/showarticle.asp?id=KBID003528.
1.3.3 Upgrading
In order to upgrade GFI WebMonitor, obtain the latest version from
http://www.gfi.com/pages/webmon-selection-download.asp.
NOTE
The upgrade procedure is similar to the installation procedure.
NOTE
If installing a new version of GFI WebMonitor on a different infrastructure, it is
recommended to uninstall the previous version before installing the new one.
NOTE
The installation wizard checks that Microsoft .NET 4.0, MSMQ, Report Viewer, Windows
Image Component, .net Hotfix, Microsoft Visual C++ Redistributable and IIS Express are
installed. If not installed the wizard will guide you through the installation
automatically.
2.1.2 Hardware
Minimum hardware requirements depend on the GFI WebMonitor edition.
Table 5: Hardware requirements
EDITION HARDWARE REQUIREMENTS
WebFilter Edition Processor: 2.0 GHz
RAM: 1 GB (Recommended 4GB)
Hard disk: 2 GB of available disk space
IMPORTANT
GFI WebMonitor requires 2 network interface cards when installing in Gateway Mode or
in an ISA/TMG environment. When installing in Simple Proxy mode only 1 network
interface card is required.
NOTE
Allocation of hard disk space depends on your environment. The size specified in the
requirements is the minimum required to install and use GFI WebMonitor. The
recommended size is between 150 and 250GB.
IMPORTANT
Ensure that the listening port (default 8080) is not blocked by your firewall. For more
information on how to enable firewall ports on Microsoft Windows Firewall, refer to
http://kbase.gfi.com/showarticle.asp?id=KBID003879
IMPORTANT
Ensure that the listening port (default 8080) is not blocked by your firewall. For more
information on how to enable firewall ports on Microsoft Windows Firewall, refer to
http://kbase.gfi.com/showarticle.asp?id=KBID003879
To install GFI WebMonitor on an Internet gateway, refer to the Installing in Gateway Mode chapter in
this manual.
Port Blocking
The router must be configured to allow both HTTP/HTTPS traffic generated from GFI WebMonitor
machine and Non-HTTP/HTTPS traffic generated from client machines. In addition, it must also block
HTTP/HTTPS traffic generated from client machines.
NOTE
Client machines must be configured to use the GFI WebMonitor machine as the default
proxy server.
Figure 5: GFI WebMonitor installed on a proxy machine connected to a router supporting traffic forwarding
To install GFI WebMonitor on a proxy server, refer to the Installing in Simple Proxy Mode chapter in
this manual.
5. Key in the user name or the IP address that will be used to access the web interface of GFI
WebMonitor and click Next.
NOTE
More than one user or machine can be specified. Separate entries with semicolons ‘;’
6. Key in the logon credentials of an account with administrative privileges and click Next.
NOTE
The user account must have Log on as a service rights; otherwise, rights are
automatically assigned. For more information, refer to Assigning Log On As A Service
Rights (page 119).
7. Provide the SMTP mail server details and email address to which administrator notifications will be
sent.
Optionally click Verify Mail Settings to send a test email. Click Next.
8. Click Next to install in default location or click Change to change installation path.
9. Click Install to start the installation, and wait for the installation to complete.
10. Click Finish to finalize setup.
12. After the installation, GFI WebMonitor Configuration Wizard is launched automatically. This will
help you configure the server in Gateway mode.
13. In the welcome screen, click Next.
14. Select Gateway mode as your network environment and click Next.
15. In the Current Gateway Configuration screen, select the internal network card and click Next.
16. Click Finish to apply settings.
5. Key in the user name or the IP address that will be used to access the web interface of GFI
WebMonitor and click Next.
NOTE
More than one user or machine can be specified. Separate entries with semicolons ‘;’
6. Key in the logon credentials of an account with administrative privileges and click Next.
NOTE
The user account must have Log on as a service rights; otherwise, rights are
automatically assigned. For more information, refer to Assigning Log On As A Service
Rights (page 119).
7. Provide the SMTP mail server details and email address to which administrator notifications will be
sent.
Optionally click Verify Mail Settings to send a test email. Click Next.
8. Click Next to install in default location or click Change to change installation path.
9. Click Install to start the installation, and wait for the installation to complete.
10. Click Finish to finalize setup.
12. After the installation, GFI WebMonitor Configuration Wizard is launched automatically. This will
help you configure the server in simple proxy mode.
13. In the welcome screen, click Next.
14. Select Simple proxy mode as your network environment and click Next.
NOTE
To view help on how to configure most commonly used routers, select the Click here
link. For more information, refer to Configuring Commonly Used Routers (page 126).
To launch GFI WebMonitor installation from machines of users and/or IP addresses that were allowed
access to the application during installation:
Key in the URL http://monitor.isa in a web browser from their machine. The Internet browser
must be configured to use specific proxy settings to enable this access.
2.5.2 Enter a Valid License Key
After GFI WebMonitor is installed, a valid license key is required to start monitoring traffic and
creating policies.
NOTE
If you are evaluating GFI WebMonitor, a 30 day unlimited evaluation key will be sent by
email after registering.
NOTE
For more information, refer to Updating License Manually (page 60).
NOTE
To apply the group policy to all the computers on the domain, right-click on the domain
node directly and click Properties.
5. Expand User Configuration > Windows Settings > Internet Explorer Maintenance > Connection
and double-click Proxy Settings to open the Proxy Settings dialog.
3. Select Group Policy Management from the Available snap-ins list, and click Add.
4. Click OK.
5. Expand Group Policy Management > Forest > Domains and <domain>, then select the
organizational unit where you wish to apply the group policy.
NOTE
To apply the group policy to all domain computers , select the domain node directly.
6. Right-click Default Domain Policy and click Edit to open the Group Policy Management Editor.
7. Expand User Configuration > Policies > Windows Settings > Internet Explorer Maintenance >
Connection and double-click Proxy Settings to open the Proxy Settings dialog.
IMPORTANT
When using Active Directory, the administrator can disable the Internet connection
settings tab from the client machines. For more information, refer to Disabling Internet
Connection Settings On Client Machines (page 144).
NOTE
If WPAD is enabled in GFI WebMonitor, select Auto-detect proxy settings for this
network. For more information, refer to Configuring WPAD (page 101).
5. In the Address and Port text boxes, key in the proxy server name or IP address of the GFI
WebMonitor machine and the port used (Default 8080) .
6. Click OK to close LAN Settings dialog.
7. Click OK to close Internet Options dialog.
Mozilla Firefox
1. Launch Mozilla Firefox.
2. Click Firefox > Options > Options > Advanced tab > Network tab.
NOTE
If WPAD is enabled in GFI WebMonitor, select Auto-detect proxy settings for this
network. For more information, refer to Configuring WPAD (page 101).
Google Chrome
1. Launch Google Chrome.
NOTE
If WPAD is enabled in GFI WebMonitor, select Auto-detect proxy settings for this
network. For more information, refer to Configuring WPAD (page 101).
WebFilter Edition
1. Block website categories in the Security group (such as Malware Sites, Phishing and Other Frauds,
Spyware and Adware, Bot Nets and Confirmed SPAM Sources).
Configure Web Filtering Polices
2. Block access to sites with low reputation (having a Reputation Index of 40 or less).
Configure Web Filtering Polices
Configure Always Blocked list
Configure Web Categorization
WebSecurity Edition
1. Block Known Malicious Websites and Phishing.
Configure ThreatTrack Configure Auto-update of all security
engines
Configuring Anti-Phishing in Security
Policies Configure Auto-update of all security
engines
GFI also recommends to create an awareness policy with safe use guidelines for your
employees. For more information refer
to: http://www.gfi.com/whitepapers/acceptable_use_policy.pdf.
1. Deploy GFI WebMonitoron your network without any filtering policies. Use the inbuilt monitoring
and reporting tools to observe Internet usage and identify patterns that impact bandwidth opti-
mization. For example, identify excessive bandwidth usage or access to certain unwanted sites.
Create adequate policies based on the results obtained from these reports.
Generate Activity reports
Generate Bandwidth reports
Configure Internet Policies
3. Manage website categories in the Bandwidth control group (such as Streaming Media, P2P, Online
Personal Storage).
Configure Web Filtering Polices
4. Block access to unwanted streaming applications such as YouTube and similar video sharing web sites.
Configure Streaming Media Policies
5. Block access to unwanted Instant Messaging applications (such as MSN, Google Talk, Yahoo Mes-
senger, Facebook Chat and Online Portals.
Configure Instant Messaging Policies
7. Use proxy caching to accelerate service requests and optimize bandwidth. This functionality
retrieves content saved from a previous client request.
Configure Cache Settings
GFI also recommends to create an awareness policy with safe use guidelines for your
employees. For more information refer
to: http://www.gfi.com/whitepapers/acceptable_use_policy.pdf.
1. Deploy GFI WebMonitoron your network without any filtering policies. Use the inbuilt monitoring
and reporting tools to observe Internet use and identify patterns that impact your organization's
productivity. Create adequate policies based on the results obtained from these reports.
Use the Bandwidth Dashboard
2. Block website categories in the Productivity Loss and Potential Productivity Loss groups (such as
Social Network, Dating, Games and Pay to Surf).
Configure Web Filtering Polices
GFI also recommends to create an awareness policy with safe use guidelines for your
employees. For more information refer
to: http://www.gfi.com/whitepapers/acceptable_use_policy.pdf.
NOTE
If Anonymization is enabled, personal data (such as User Names and IPs) is masked. For
more information, refer to General Options (page 66).
The page contains a graphical representation of Internet usage trends, such as:
The bandwidth consumption for the current day
Activity filtered by any configured policy
Information related to searches performed by users
Top categories and domains that are being accessed by users
Top users and policies
NOTE
By default, the data provided in the Overview page is for the current week. This filter
can be changed from the for period field in the top right corner of the screen.
The right hand side of the Overview page displays statistics related to Internet use, such as the total
number of Websites visited by all users, the number of infected files detected by GFI WebMonitor and
the number of websites blocked by a configured policy.
NOTE
If Alerts are configured, a notification appears in the Overview window, above Monitor
Status area. For information on how to configure Alerts refer to: Configuring Alerts.
2. Click icon.
NOTE
For more information, refer to Configuring Web Categorization (page 68).
The lower portion of the Bandwidth page provides a breakdown of the data monitored in the specified
period.
IMPORTANT
If Anonymization is enabled, personal data (such as User Names and IPs) will be masked.
For more information, refer to General Options (page 66).
NOTE
Use the View by: filter in the top right corner of the page to view data for a specific
date range.
The lower portion of the Activity page provides a breakdown of the data monitored in the specified
period.
IMPORTANT
If Anonymization is enabled, personal data (such as User Names and IPs) will be masked.
For more information, refer to General Options (page 66).
NOTE
For Bandwidth and Activity real-time traffic graph, set the Auto refresh interval at the
top right corner of the page. Default is set to 3.
The Quarantine list is populated following actions taken by pre-configured policies. The policy which
blocked the quarantined item will be listed under Policy Type, together with the user, details of the
request, date and time.
To approve or delete an item from the Quarantine list:
1. Go to Dashboard > Quarantine
2. Locate the item to approve or delete, and select the checkbox next to it.
3. Click Approve or Delete.
4. From the Approve Access Requests window, click Confirm.
2. Click one of the report names to edit or click Run Report to generate the report.
NOTE
Every report can be exported to Excel, PDF or Word, and can also be sent to a printer.
See also:
Cloning a report
Editing Activity Report
5.2.1 Editing Activity Reports
To edit an activity report:
1. Go to Reports and select Activity tab.
2. Click report name to edit.
6. In the Record Limit area set the maximum number of records shown in the report. Default is set to
1000.
7. In the Include area:
a. Click Users tab and add the users to include or exclude in the report.
b. Click Categories tab to add the categories to include or exclude in the report
c. Click Websites tab and add the domains to include or exclude in the report.
d. Click Policies tab to add the policies to include or exclude in the report. You can add policies
by name, by the action these policies perform (Limited or Warned) or by policy type (Down-
load, Filter or Security).
8. Go to the Schedule tab and click ON to enable report scheduling.
NOTE
If the schedule is disabled, report is not automatically generated.
2. Click one of the report names to edit or click Run Report to generate the report.
NOTE
Every report can be exported to Excel, PDF or Word, and can also be sent to a printer.
See also:
Cloning a report
Editing Bandwidth Report
5.3.1 Editing Bandwidth Reports
To edit an bandwidth report:
1. Go to Reports and select Bandwidth tab.
2. Click report name to edit.
NOTE
To activate license key, an Internet connection must be available.
See Also:
Licensing Information.
Post-Installation Actions.
6.1.2 Access Control
The Access Control node enables you to list users and IP addresses with access to GFI WebMonitor.
IMPORTANT
Specified users are allowed access only if their username is authenticated.
2. In the Grant access to field, specify the User or IP Address, to allow access to GFI WebMonitor
from his machine and click Add. Repeat for all required user(s) and/or IP(s).
3. Click Add to save settings.
NOTE
NOTE
It is recommended that all auto-updates are enabled for maximum protection.
NOTE
To create a new Firebird Database, enter a new database name in the following
format: <database name>.fdb
5. In the Database field, type the name of the database created in SQL.
IMPORTANT
Ensure that the database name entered is unique, otherwise you will overwrite the
existing database.
6. Click Save.
NOTE
You can create a new database from within GFI WebMonitor. To create a new database,
enter a new database name and click Save.
3. Click Save.
6.1.6 General Options
Use the Options tab to configure:
Data retention periods
Length of time to keep downloaded files in cache
Language used when displaying blocking notifications or warnings
Length of time to keep websites in Temporary Allowed list
Anonymization of personal data.
Data Retention
For optimization purposes, GFI WebMonitor enables you to specify the length of time that data
collected by GFI WebMonitor is retained by the application. Data is deleted after the specified period
expires.
To configure for how long to retain activity data:
1. Go to Settings > General > Options.
2. In the Retain data for field, key in the number of days.
3. Click Save .
NOTE
The default value is set to 365 days.
Anonymization
Anonymization enables masking private user data in accordance with European privacy and data
protection laws. If enabled, GFI WebMonitor:
Cloaks personal data (User name and IP) so that it can no longer be viewed from the Dashboard
or Monitoring Reports.
Enables a validation process requiring two passwords from two different users.
Masks any features in the User Interface that provide access to private user information.
To enable Anonymization:
1. Navigate to Settings > Options.
2. In the Anonymize area, click ON.
3. Enter the passwords for Responsible Person 1 and Responsible Person 2
4. Click Save .
NOTE
To disable Anonymization, click OFF and enter the required passwords.
NOTE
This feature is enabled by default. To disable Web Categorization, click OFF next to
Online Lookup.
The Web Categorization page also provides a lookup area where you can check a category for a
specific URL.
To look up a URL:
1. Enter a URL in the Lookup website field.
2. Click Check Category.
NOTE
This feature is also available on the Dashboard. For more information, refer to
Overview of Internet Activity (page 42).
Deleting a Policy
To delete a policy click the Delete icon next to the policy to delete.
6.2.2 Configuring Internet Policies
The following chapters guide you through the configuration of the following policies:
Web Filtering Policy - exercise control over web browsing habits that can effect security, pro-
ductivity, performance and legal issues.
Web Browsing Quota Policy - control how your users browse specific categories or sites based on
bandwidth or time thresholds.
Instant Messaging Policy - provide control over the use of instant messaging clients.
Streaming Media Policy - define policies that block various types of streaming media across all
websites.
Search Engine Policy - provides monitoring and control over user searching habits.
NOTE
Certain fields in the default policy cannot be edited. These include Policy Name and
Apply Policy To.
NOTE
Setting up a Reputation Index of 40 or below blocks websites categorized as
“Unknown”. When GFI WebMonitor is deployed, a local web categorization database is
installed with a limited amount of entries. URL's not found in the local database will be
automatically categorized as“Unknown”. Ensure that Online Lookup is enabled so that
GFI WebMonitor can access a store of over 280 million websites. For more information,
refer to Configuring Web Categorization (page 68).
8. In the Apply Policy To field, specify Users, Groups or IPsfor whom the new policy applies, and
clickAdd.
IMPORTANT
Proxy Authentication must be enabled, otherwise you will not be able to add Active
Directory users. For more information, refer to Configuring Authentication Method
(page 102).
9. [Optional] In the Notify Breacher area, click ONto enable notifications to send when a user
infringes policy. Provide the body text of the notification email in the available space.
10. [Optional] Use the Notify Administrators area to send notifications when the downloaded content
infringes this policy. Add the administrator’s email address and provide the body text of the
notification email.
11. In the Schedulearea specify the time period during which the new policy ise enforced.
12. Click Save.
See also:
Cloning a Policy
7. [Optional] In the Notify Breacher area, click ON to enable notifications to send when a user
infringes this policy. Provide the body text of the notification email in the available space.
8. [Optional] Use the Notify Administrators area to send notifications when the downloaded content
infringes this policy. Add the administrator’s email address and provide the body text of the
notification email.
9. Click Save.
NOTE
To reset the Web Browsing Quota Policy, click the refresh icon from the Internet Policies
page.
See also:
Cloning a Policy
NOTE
Certain fields in the default policy cannot be edited. These include Policy Name and
Apply Policy To.
IMPORTANT
All added policies take priority over the default policy.
IMPORTANT
Proxy Authentication must be enabled, otherwise you will not be able to add Active
Directory users. For more information, refer to Configuring Authentication Method
(page 102).
NOTE
It is recommended that only one IM Control Policy is applied to a user, a group and/or IP
address. In cases where more than one IM Control Policy is applied to the same user,
group or IP, the top most policy takes priority over subsequent policies.
NOTE
Certain fields in the default policy cannot be edited. These include Policy Name and
Apply Policy To.
IMPORTANT
All added policies take priority over the default policy.
NOTE
When keying in a User, specify the username in the format domain\user.
When keying in a Client IP, you can use IP ranges (for example, “10.0.0.10-12”
includes these IP addresses: “10.0.0.10”, “10.0.0.11” and “10.0.0.12”).
7. [Optional] In the Notify Breacher area, click ON to enable notifications to send when a user
infringes this policy. Provide the body text of the notification email in the available space.
8. [Optional] Use the Notify Administrators area to send notifications when the downloaded content
infringes this policy. Add the administrator’s email address and provide the body text of the
notification email.
9. In the Filter On area specify the time period during which the new policy will be enforced.
10. Click Save.
See also:
Cloning a Policy
Safe Search
Safe Searchis a feature supported by a number of search engines. If enabled, GFI WebMonitor
enforces filtering of explicit email and images from user searches.
Safe Search is compatible with the following search engines:
Google
Yahoo
Lycos
Bing
NOTE
The Safe Search feature is available in the GFI WebMonitor WebFilter Edition.
NOTE
If the items in the Always Blocked list are also added to the Always Allowed list,
priority is granted to the Always Allowed list and access is granted.
2. Select User, Site or IP and key in the value in the space provided.
3. Click Add.
4. Click Save.
NOTE
When keying in a User, specify the username in the format domain\user.
When keying in a Client IP, you can use IP ranges (for example, “10.0.0.10-12”
includes these IP addresses: “10.0.0.10”, “10.0.0.11” and “10.0.0.12”).
NOTE
When keying in a URL for a website you can use the wildcard character [*], for example:
Type *.com to allow or block all '.com' top-level domains
Type *.website.com to allow or block all sub-domains of 'website.com'
IMPORTANT
In GFI WebMonitor, the Temporary Allowed list takes priority over the Always Allowed
list. Furthermore, both Always Allowed lists take priority over the Always Blocked list.
Therefore, if a site is listed in the Always Allowed or Temporary Allowed lists and that
same site is listed in the Always Blocked list, access to the site is allowed.
Pre-configured Items
By default, GFI WebMonitor includes a number of pre-configured sites in the Always Allowed list.
These include GFI Software Ltd websites to allow automatic updates to GFI WebMonitor and Microsoft
websites to allow automatic updates to Windows. Removing any of these sites may stop important
updates from being automatically effected.
NOTE
When keying in a User, specify the username in the format domain\user.
When keying in a Client IP, you can use IP ranges (for example, “10.0.0.10-12”
includes these IP addresses: “10.0.0.10”, “10.0.0.11” and “10.0.0.12”).
2. In the Grant To field, select User or IP and key in the user or IP address to grant access to in the
space provided.
3. In the Access To field, type the URL of the website to grant access to.
4. In the Active until area, select the date and time during which the policy will be active.
5. Click Save.
Deleting a Policy
To delete a policy click the Delete icon next to the policy to delete.
6.2.8 Configuring Security Policies
A default security policy is enabled when GFI WebMonitor is installed. It is pre-configured to apply to
every user on the domain and to allow web browsing of all categories. This policy is called Default
Virus Scanning Policy, and can be edited, but not disabled or deleted.
NOTE
Certain fields in the default policy cannot be edited. These include Policy Name and
Apply Policy To.
IMPORTANT
All added policies take priority over the default policy.
3. In the Scan area, select the Content Types to Scan, Block, Warn and allow or Quarantine.
4. Select the virus scanning engines to use by switching the available engines On or Off as required.
5. [Optional] In the Notify Breacher area, click ON to enable notifications. You can also edit the
notification message in the Message to Policy Breacher window.
6. [Optional] In the Notify Administrators area, click ON to enable notifications. Specify an email
address in the available box and click Add. You can also edit the notification message in the Message
to Policy Breacher window.
7. Click Save.
IMPORTANT
Click Save before you navigate away from page.
See also:
Cloning a Policy
Adding a New Security Policy
6.2.9 Adding a New Security Policy
To add a new Security Policy:
1. Go to Settings > Policies > Security Policies.
2. Click Add Policy.
3. In the Policy Name field enter a name for the new policy.
4. In the Scan area, select which Content Types to Scan, Block, Warn and allow or Quarantine.
5. [Optional] To define custom content types, click Show Custom Content Types, then:
a. Click Add Content Type.
b. In the Content Type field, enter the string for the file type to add.
NOTE
This must be a MIME type, for example, if you want to add a content type for *.gif,
type: image/gif.
IMPORTANT
Proxy Authentication must be enabled, otherwise you will not be able to add Active
Directory users. For more information, refer to Configuring Authentication Method
(page 102).
8. [Optional] In the Notify Breacher area, click ON to enable notifications. You can also edit the
notification message in the Message to Policy Breacher window.
9. [Optional] In the Notify Administrators area, click ON to enable notifications. Specify an email
address in the available box and click Add. You can also edit the notification message in the Message
to Policy Breacher window.
10. Click Save.
IMPORTANT
You can add as many policies as required, however the top most policy has precedence
over the ones below it.
IMPORTANT
Click Save before you navigate away from page.
See also:
Cloning a Policy
6.2.10 Configuring Security Engines
By default, all the Security Engines in GFI WebMonitor are enabled.
To turn off a security engine:
1. Go to Settings > Security Policies.
2. In the Security Engines area, click OFF next to the engine you want to disable.
To perform additional configuration refer to the following sections:
Configuring Kaspersky
Configuring Anti Phishing
Configuring ThreatTrack
6.2.11 Configuring Kaspersky
The Kaspersky anti-virus scanning engine enables you to state whether the actions specified in the
Virus Scanning Policies should also be used when files are identified as:
Table 18: Kaspersky engine options
OPTION DESCRIPTION
Suspicious Files identified as suspicious.
Corrupted Files that cannot be scanned since the file format is corrupted, for example, corrupted CAB files.
Hidden Files that cannot be scanned since the contents are protected, for example, password protected ZIP files.
To configure Kaspersky:
1. Go to Settings > Policies > Security Policies.
2. Click Kaspersky.
3. Next to Notify Breacher, click ON to enable notifications to be sent to the person attempting to
access a known ThreatTrack site.
4. Next to Notify Administrators, click ON to enable notifications, then specify the email addresses of
the persons who need to be notified.
5. Click Save.
6.2.14 Configuring Download Policies
Download Policies enable you to manage file downloads based on file types. If a user tries to
download a file that triggers a Download Policy, GFI WebMonitor determines what action to take,
according to what you configured in that policy. This may be one of the following actions:
Allow file download
Quarantine downloaded file
Block file from being downloaded
A Default Download Policy is enabled when GFI WebMonitor is installed. It is pre-configured to apply
to everyone and to allow downloads of all file types. The default download policy can be edited, but
cannot be disabled or deleted.
IMPORTANT
All added policies take priority over the default policy.
NOTE
It is recommended that only one Download Policy is applied to a user, a group or IP
address. In cases where more than one Download Policy is applied to the same user,
group or IP, the top most policy takes priority over subsequent policies.
NOTE
Action can also be configured by clicking on a file type and setting the action from
theAction dialog. A description about each file type is also provided.
5. [Optional] To add custom file types not present in the pre-defined list, click Show Custom Content
Types, then click Add Content-typeto add new file types.
IMPORTANT
Proxy Authentication must be enabled, otherwise you will not be able to add Active
Directory users. For more information, refer to Configuring Authentication Method
(page 102).
NOTE
When keying in a User, specify the username in the format domain\user.
When keying in a Client IP, you can use IP ranges (for example, “10.0.0.10-12”
includes these IP addresses: “10.0.0.10”, “10.0.0.11” and “10.0.0.12”).
7. [Optional] In the Notify Breacher area, click ON to enable notifications to send when a user
infringes this policy. Provide the body text of the notification email in the available space.
8. [Optional] To send a notification to administrators when the downloaded content infringes this
policy, clickONin theNotify Administratorsarea. Add the administrator’s email address and provide
the body text of the notification email in the available space.
9. Click Save.
See also:
Cloning a Policy
Configuring Download Policies
Editing an Existing Download Policy
Cloning a Policy
Existing WebFiltering and WebSecurity policies can be cloned to quickly create new polices which can
then be edited as required.
To clone a policy:
1. Go to Settings > Policies
2. Select Security Polices, Internet Policies or Download Policies.
NOTE
Default policies cannot be cloned.
5. In the Threshold area, specify the size of data in MB or GB that triggers the alert. Specify if this
amount is applicable per user or for all users on domain.
6. Specify the frequency that GFI WebMonitor checks against the specified threshold. Time intervals
can be set to:
Hour
Day
Week
7. In the Filter on options, select the type of filtering to use. These can be:
Table 20: Bandwidth alerts filtering options
FILTER DESCRIPTION
No Filter Select this option to make the alert available on all type of traffic.
Categories Select desired categories from a predefined list and click Add.
Content type Select desired content types from a predefined list and click Add.
8. In the Notify field, specify the users or groups to notify and click Add.
9. In the Notify user field, click ON and type the alert message in the Message to user field.
10. Click Save.
6.3.3 Configuring Security Alerts
To configure security alerts:
1. Go to Settings > Alerts > Security Alerts.
2. Click Add Alert.
5. In the Threshold area, specify the total hits that will trigger the alert when exceeded. This setting
will apply for the selected security engines.
6. Specify the frequency that GFI WebMonitor checks against the specified threshold. Time intervals
can be set to:
Hour
Day
Week
7. In the Notify field, specify users or groups who need to be notified, then click Add.
NOTE
The settings related to the network interface card can be configured through the GFI
WebMonitor Configuration Wizard. This wizard is launched automatically after installing
GFI WebMonitor in standalone proxy mode.
To configure GFI WebMonitor to listen for incoming HTTP and HTTPS requests:
1. Go to Settings > Proxy Settings > General.
2. From the Proxy Server area, specify the IP address of a specific network card listening to incoming
requests.
3. [Optional] Enable Listen to All for GFI WebMonitor to listen for incoming requests on multiple
network interface cards.
4. Click Save .
6.4.3 Configuring WPAD
The Web Proxy Auto Discovery (WPAD) Internet protocol enables client machines to automatically
retrieve proxy settings from a WPAD data file, stored on the same GFI WebMonitor machine. It is
useful when you want to configure roaming devices such as laptops and tablets to use a GFI
WebMonitor as the proxy server when they are in the office.
To enable WPAD:
1. Go to Settings > Proxy Settings > General.
4. Click Save.
See also:
Post Installation Actions
6.4.4 Configuring Authentication Method
The Proxy Authentication area enables you to configure the authentication method used by the
proxy. This determines how client machines are validated when accessing the Internet.
IMPORTANT
Proxy Authentication is disabled by default. If Authentication is not enabled, you will
not be able to create new polices for users or groups.
NOTE
Integrated authentication option is disabled if the GFI WebMonitor machine
authenticates local users as Guest. The Guest only network access model, grants all
users the same level of access to system resources, and so GFI WebMonitor proxy will
not be able to differentiate between the different users using a client machine.
NOTE
On Microsoft Windows XP Pro machines that have never been joined to a Domain
Controller, this Local Security Setting policy is enabled by default.
4. [Optional] In the IP's that will bypass the authentication field, key in IP addresses to exclude from
proxy authentication.
NOTE
IP addresses specified in this field will not be prompted to provide login credentials
when new Internet sessions are launched, but will carry on to apply the applicable
policies.
5. Click Save.
6.4.5 Configuring Chained Proxy
Proxy Chaining is a method of connecting several proxy servers together to obtain greater anonymity.
These servers act together as one proxy server to process web requests.
Client machines can be configured to forward web traffic to the GFI WebMonitor server. Additionally,
the GFI WebMonitor server forwards the filtered traffic to a proxy server.
To configure GFI WebMonitor to forward web traffic to another proxy machine:
1. Go to Settings > Proxy Settings > General.
2. From the Chained Proxy area, click ON to enable GFI WebMonitor to route traffic to another proxy
server.
3. Key in the proxy server IP address in the Address text box and key in the chained proxy’s port
(default 8080) in the Port text box.
4. [Optional] If proxy authentication requires alternate credentials, click Alternative Credentials and
key in the required credentials in the Username and Password fields.
NOTE
If no credentials are keyed in, the default user credentials are used.
5. [Optional] Click Test Proxy Chaining to test the connection between GFI WebMonitor machine and
proxy server.
6. Click Save.
6.4.6 Configuring HTTPS Proxy Scanning Settings
HTTPS Scanning gives you visibility into secure surfing sessions that can threaten your network's
security. Malicious content may be included in sites visited or files downloaded over HTTPS. The
HTTPS filtering mechanism within GFI WebMonitor enables you to scan this traffic.
IMPORTANT
Ensure that by enabling HTTPS Scanning, you are not violating any legal and compliance
regulations.
3. In the Display Warning field click ON to display a warning page to users before GFI WebMonitor
starts decrypting and inspecting HTTPS traffic .
NOTE
It is recommended that any HTTPS website that would be inappropriate for GFI
WebMonitor to decrypt and inspect is added to the HTTPS scanning exclusion list. For
more information refer to Adding Items to the HTTPS Scanning Exclusion List.
See also:
Creating a new HTTPS Scanning certificate
Import an existing HTTPS Scanning certificate
Export an HTTPS Scanning certificate
6.4.7 Configuring HTTPS Proxy Scanning Settings Using Wizard
The HTTPS Scanning Wizard is a guide to aid configuration of the following HTTPS Scanning settings:
HTTPS Scanning Warning page
Create or import certificate
Certificate checks
Export certificate
NOTE
It is recommended that when the certificate is not issued by a trusted Certificate
Authority, it is exported from GFI WebMonitor and deployed to the client computers as a
trusted certificate. For more information on how to deploy a certificate to clients’
computers, refer to: http://kbase.gfi.com/showarticle.asp?id=KBID003944
NOTE
GFI WebMonitor lets you specify the length of time to keep data from user requests in its
local database. For more information, refer to General Options (page 66).
NOTE
It is recommended that any website that is not required to be kept in GFI WebMonitor’s
cache, is added to the Cache exclusion list. For more information refer to: Adding Items
to the Cache Exclusion List.
NOTE
Ensure that the path exists and that the account under which GFI WebMonitor is running
has sufficient privileges. GFI WebMonitor will save to a default path if the path is either
invalid or unspecified.
5. Click Save.
NOTE
If no path is specified cache is stored in the GFI WebMonitor installation folder.
NOTE
Before contacting Technical Support, have your Customer ID available. Your Customer
ID is the online account number that is assigned to you when first registering your
license keys in the GFI Customer Area at: http://customers.gfi.com.
We will answer your query within 24 hours or less, depending on your time zone.
7.5 Documentation
If this manual does not satisfy your expectations, or if you think that this documentation can be
improved in any way, let us know via email on: [email protected].
A
Access Control
"A feature that allows or denies users access to resources, for example, Internet access."
Active Directory
"A technology that provides a variety of network services, including LDAP-like directory serv-
ices."
AD
See Active Directory
Administrator
The person responsible for installing and configuring GFI WebMonitor.
Anti-virus
Software that detects viruses on a computer.
B
Bandwidth
The maximum amount of data transferred over a medium. Typically measured in bits per sec-
ond.
C
Cache
A location where GFI WebMonitor temporarily keeps downloaded files. This will speed up sub-
sequent requests for the same file as GFI WebMonitor would serve the file directly from the
cache instead of downloading it again.
CER
See CER file format
Console
An interface that provides administration tools that enable the monitoring and management
of Internet traffic.
CRL
See Certificate Revocation List
D
Dashboard
Enables the user to obtain graphical and statistical information related to GFI WebMonitor
operations.
E
Expired Certificate
An expired certificate has an end date that is earlier than the date when the certificate is val-
idated by GFI WebMonitor.
F
File Transfer Protocol
A protocol used to transfer files between computers.
FTP
See File Transfer Protocol.
G
Google Chrome
A web browser developed and distributed by Google.
GPO
See Group Policy Objects.
H
Hidden Downloads
"Unwanted downloads from hidden applications (for example, trojans) or forgotten downloads
initiated by users."
HTTPS
See Hypertext Transfer Protocol over Secure Socket Layer (SSL).
I
Internet Browser
An application installed on a client machine that is used to access the Internet.
Internet Gateway
"A computer that has both an internal and an external network card. Internet sharing is ena-
bled, and client machines on the internal network use this computer to access the Internet."
L
LAN
See Local Area Network.
LDAP
See Lightweight Directory Access Protocol.
M
Malware
Short for malicious software.Unwanted software designed to infect a computer such as a virus
or a trojan.
Mozilla Firefox
Mozilla Firefox is an open source Internet browser.
MSN
See Microsoft Windows Live Messenger
N
Non-validated Certificate
An non-validated certificate has a start date that falls after the date when the certificate is
validated by GFI WebMonitor.
NT LAN Manager
A Microsoft network authentication protocol.
NTLM
See NT LAN Manager.
P
Personal Information Exchange file format
A certificate file format that contains the certificate data and its public and private keys.
PFX
See Personal Information Exchange file format.
Phishing
The act of collecting personal data such as credit card and bank account numbers by sending
fake emails which then direct users to sites asking for such information.
Proxy Server
A server or software application that receives requests from client machines and responds
according to filtering policies configured in GFI WebMonitor.
Q
Quarantine
A temporary storage for unknown data that awaits approval from an administrator.
R
Revoked Certificate
"A revoked certificate is a valid certificate that has been withdrawn before its expiry date
(for example, superseded by a newer certificate or lost/exposed private key)."
S
Spyware
Unwanted software that publishes private information to an external source.
T
Traffic Forwarding
The act of forwarding internal/external network traffic to a specific server through a router.
U
Uniform Resource Locator
The address of a web page on the world wide web. It contains information about the location
and the protocol.
URL
See Uniform Resource Locator.
User Agent
A client application that connects to the Internet and performs automatic actions.
V
Virus
Unwanted software that infects a computer.
Web traffic
The data sent and received by clients over the network to websites.
WebFilter Edition
A configurable database that allows site access according to specified site categories per
user/group/IP address and time.
WebGrade Database
"A database in GFI WebMonitor, used to categorize sites."
WebSecurity Edition
WebSecurity contains multiple anti-virus engines to scan web traffic accessed and downloaded
by the clients.
WPAD
See Web Proxy AutoDiscovery protocol.
2. Expand Security Settings > Local Policies > User Rights Assignment.
3. Right-click Log on as a service from the right panel and click Properties.
4. Select the Local Security Setting tab.
5. Click Add User or Group button.
6. Key in the account name and click OK.
7. Click Apply and OK.
8. Close all open windows.
Assigning Log On As A Service Rights Using GPO in Microsoft Windows Server 2003
To assign Log on as service rights on clients’ machines through Microsoft Windows Server 2003 GPO:
1. Navigate to Start > Programs > Administrative Tools > Active Directory Users and Computers on
the DNS server.
2. Right-click the domain node and click Properties.
5. Expand Computer Configuration > Windows Settings > Security Settings > Local Policies and click
User Rights Assignment.
6. Right-click Log on as a service from the right panel and click Properties.
7. Select the Security Policy Setting tab.
8. Check Define these policy settings checkbox
9. Click Add User or Group button.
10. Key in the account name and click OK.
11. Click Apply and OK.
12. Close all open windows.
Assigning Log On As A Service Rights Using GPO in Microsoft Windows Server 2008
To assign Log on as service rights on clients’ machines through Microsoft Windows Server 2008 GPO:
1. In the command prompt key in mmc.exe and press Enter.
2. In the Console Root window, navigate to File > Add/Remove Snap-in… to open the Add or Remove
Snap-ins window.
3. Select Group Policy Management from the Available snap-ins list, and click Add.
4. Click OK.
5. Expand Group Policy Management > Forest > Domains and <domain>.
6. Right-click Default Domain Policy and click Edit to open the Group Policy Management Editor.
7. Expand Computer Configuration > Policies > Windows Settings > Security Settings > Local
Policies and click User Rights Assignment.
8. Right-click Log on as a service from the right panel and click Properties.
9. Select the Security Policy Setting tab.
10. Check Define these policy settings checkbox
11. Click Add User or Group button.
12. Key in the account name and click OK.
13. Click Apply and OK.
14. Close all open windows.
IMPORTANT
This information applies only to GFI WebMonitor Standalone Proxy Version.
When caching is enabled, content downloaded via HTTP is stored for future requests to the same
resource, reducing bandwidth consumption. To exclude sites from having their content cached, add
them to the Cache exclusion list as follows:
1. Open ..\WebMonitor\Interface\App_Data\ProxyConfig.xml
NOTE
Backup ProxyConfig.xml before making any changes.
NOTE
Changes are applied as soon as the file is saved.
NOTE
The following wildcards are supported:
* substitutes any number of characters in the string.
? substitutes a single character in the string.
# substitutes a single digit in the string.
IMPORTANT
This information applies only to GFI WebMonitor Standalone Proxy Version.
When HTTPS inspection is enabled, by default this applies to all HTTPS sessions passing via the GFI
WebMonitor Proxy. Administrators may however wish to exclude some domains, users, or client IPs
from having their sessions inspected. This is achieved by adding them to the HTTPS scanning exclusion
list.
9.3.1 Excluding Domains
1. Open ..\WebMonitor\Interface\App_Data\ProxyConfig.xml
2. Remove <DomainsExceptedFromHTTPSInspection /> tag
3. Add the sites exclude between a DomainsExceptedFromHTTPSInspection tag. For example:
<DomainsExceptedFromHTTPSInspection>
<string>www.domain.com</string>
<string>*.domain.com</string>
</DomainsExceptedFromHTTPSInspection >
NOTE
Backup ProxyConfig.xml before making any changes.
NOTE
Changes are applied as soon as the file is saved.
4. From the Start Filter Set drop-down lists of both Call Filter and Data Filter, select Set#1.
5. Click OK to save the changes
6. Select Firewall > Filter Setup menu. This page contains the collection of rules.
7. Select rule number 1 from the Set list to open the Edit Filter Set page.
8. Double click the first rule (Block NetBios) to open the filter page.
9. In the filter page, click "1" to open the Filter Rule configuration
10. Key in a name, example “Block Range 1” in the Comments text box.
11. From the Direction drop-down list, select LAN->WAN.
12. Click Edit button of the Source IP field. This opens the IP Address Edit page.
13. From the Address Type drop-down list, select Range Address.
14. In the Start IP Address text box, key in the smallest IP address of the range of IP addresses
smaller than the GFI WebMonitor proxy machine IP address.
15. In the End IP Address text box, key in the largest IP address of the range of IP addresses smaller
than the GFI WebMonitor proxy machine IP address (excluding the proxy machine’s IP address).
16. Click OK to apply settings.
17. In the Edit Filter Rule page, click Edit button of the Service Type field.
18. From the Service Type drop-down list, select User defined.
19. From the Protocol drop-down list, select TCP.
20. In the Source Port text boxes, key in “1” and “65535” respectively.
21. In the Destination Port text boxes, key in “80” and “80” respectively.
Screenshot 75: DrayTek: Edit Filter Rule view (IP addresses greater than the GFI WebMonitor proxy machine IP address)
3. From the router’s configuration web interface, click Access Restrictions tab > Internet Access.
4. From the Internet Access Policy drop-down list, select a number.
5. From the Status radio buttons, select Disable. (Select Enable to start blocking immediately).
6. In the Enter Policy Name text box, key in a name.
7. Click Edit List of PCs button.
8. In IP Range 01 text boxes, key in the IP addresses of the range of IP addresses smaller than the GFI
WebMonitor proxy machine IP address (excluding the proxy machine’s IP address).
9. In IP Range 02 text boxes, key in the IP addresses of the range of IP addresses greater than the GFI
WebMonitor proxy machine IP address (excluding the proxy machine’s IP address).
10. Click Save Settings button.
11. From the PCs radio buttons, select Deny.
12. From the Blocked Services first drop-down list, select HTTP and key in “80” and “80”
respectively.
13. [Optional] Click Add/Edit Service to create or modify a service.
14. Click Save Settings.
9.4.4 Netgear Wireless Router DG834GT
On Netgear Wireless Router DG834GT, ports are blocked by creating firewall access rules. This
section describes how to:
Create a firewall access rule to allow Web (HTTP) traffic originating from GFI WebMonitor Proxy
machine
Create a firewall access rule to block all outgoing HTTP traffic
3. From the router’s configuration web interface, click Firewall Rules > Outbound Services.
4. From the Service drop-down list, select HTTP (TCP80).
5. From the Action drop-down list, select ALLOW always.
6. From the LAN Users drop-down list, select Single address.
7. In the Start text box, key in the IP address of the GFI WebMonitor proxy machine
8. From the WAN Users drop-down list, select Any.
9. Click Apply to save settings.
Step 2: Creating a Firewall Access Rule to Block All Outgoing HTTP Traffic
To create a firewall access rule to block all Web (HTTP) traffic:
1. Open the web configuration page from an Internet browser.
2. Provide any credentials required.
3. From the router’s configuration web interface, click Firewall Rules > Outbound Services.
4. From the Service drop-down list, select HTTP (TCP80).
5. From the Action drop-down list, select BLOCK always.
6. From the LAN Users drop-down list, select Any.
7. From the WAN Users drop-down list, select Any.
8. Click Apply to save settings.
9.4.5 SonicWall NSA 2400
On SonicWall NSA 2400 two steps are required to:
Define the external and internal network cards
Create traffic controlling firewall rules
3. From the router’s configuration web interface, click Network > Address Objects
4. Click Add button to add a WAN connection
5. In the Address Detail column, key in the IP address of the external network card.
6. In the Type column, select Network.
7. In the Zone column, select WAN.
8. Click Add button to add a LAN connection
9. In the Address Detail column, key in the IP address of the internal network card.
10. In the Type column, select Host.
11. In the Zone column, select LAN.
3. From the router’s configuration web interface, click Firewall > Access Rules.
4. Click Add button to add a new rule.
5. Repeat step 4 to create three rules with the following information:
3. From the router’s configuration web interface, click Firewall > Services
4. Click Add to open the Add Service console.
5. Key in a name in the Name text box, for example “HTTP”.
6. In Port Range, key in 80-80.
7. From the Protocol drop-down list, select TCP.
8. Click OK.
NOTE
By selecting the wildcard “*”, all inbound network traffic and all IP ranges on port 80
are blocked.
9. In the Destination row, select WAN from the Ethernet drop-down list and key in “*” in Address
Range Begin text box.
10. [Optional] Select the Advanced tab to configure a time-based schedule.
11. Click OK button.
Step 3: Creating a Firewall Access Rule to Allow HTTP Traffic From GFI WebMonitor Proxy
To create a firewall access rule to allow Web (HTTP) traffic originating from GFI WebMonitor Proxy
machine:
1. Open the web configuration page from an Internet browser.
3. From the router's configuration web interface, click Network > Web Proxy.
4. In the Proxy Web Server (name or IP address) text box, key in the IP address of the GFI
WebMonitor proxy machine
5. In the Proxy Web Server Port text box, key in the port used (Default 8080).
6. Click Apply button.
9.4.7 Thomson Wireless Broadband Router TG585 v7
On Thompson Wireless Broadband Router TG585 v7, ports are blocked by creating firewall access
rules. This section describes how to:
Create a firewall access rule to allow Web (HTTP) traffic originating from GFI WebMonitor Proxy
machine
Create a firewall access rule to block all outgoing HTTP traffic
Step 1: Creating a Firewall Access Rule to Allow HTTP Traffic From GFI WebMonitor Proxy
To create a firewall access rule to allow Web (HTTP) traffic originating from GFI WebMonitor Proxy
machine:
1. Open the web configuration page from an Internet browser.
2. Provide any credentials required.
3. From the router’s configuration web interface, click Toolbox > Firewall.
4. From the Firewall Settings, select Configure.
5. Click Add button to add a new firewall rule.
Screenshot 87: Thompson Wireless Broadband Router TG585 v7: Firewall Rule view
Step 2: Creating a Firewall Access Rule to Block All Outgoing HTTP Traffic
To create a firewall access rule to block all Web (HTTP) traffic:
1. Open the web configuration page from an Internet browser.
2. Provide any credentials required.
3. From the router’s configuration web interface, click Toolbox > Firewall.
4. From the Firewall Settings, select Configure.
5. Click Add button to add a new firewall rule.
Screenshot 88: Thompson Wireless Broadband Router TG585 v7: Firewall Rule view
Screenshot 89: Microsoft Windows Server 2003: Routing and Remote Access Server Setup Wizard dialog
5. Expand User Configuration > Administrative Templates > Windows Components > Internet
Explorer and click Internet Control Panel.
6. Right-click Disable the Connections page from the right panel and click Properties.
NOTE
This policy prevents users from viewing and modifying connection and proxy settings
from their client machines.
3. Select Group Policy Management from the Available snap-ins list, and click Add.
4. Click OK.
5. Expand Group Policy Management > Forest > Domains and <domain>.
6. Right-click Default Domain Policy and click Edit to open the Group Policy Management Editor.
7. Expand User Configuration > Policies > Administrative Templates > Windows Components >
Internet Explorer and click Internet Control Panel.
8. Right-click Disable the Connection page from the right panel and click Properties.
3. Select Group Policy Management from the Available snap-ins list, and click Add.
4. Click OK.
5. Expand Group Policy Management > Forest > Domains and <domain>.
6. Right-click Default Domain Policy and click Edit to open the Group Policy Management Editor.
A
K
Access Control 60-61, 102
Knowledge Base 11-12, 110
Active Directory GPO 28, 103, 112, 121, 145, 150, 152
L
Anonymization 42, 47, 49-50, 60, 66
License key 27, 60
Anti-virus 38, 84, 89, 99
Linksys 126, 131
B
Log on as a service rights 119
Bandwidth 9, 38-40, 42-43, 46, 50, 53, 56-57, 59-60,
69-70, 72, 76, 95, 97, 108 M
C Malware 38, 90
Microsoft ISA Server 18
Cache 40, 66, 108, 119, 124
MSN 39, 41, 74
Chained Proxy 101, 103
Cisco ADSL Router Cisco 126-127 N
Configuration 16, 23, 26, 29, 31, 35, 60, 63, 70, 89, 101, Netgear Wireless Router 126, 133
105, 111, 119, 122, 127, 131, 134-135,
137, 141, 146, 149-150, 152, 154 P
Configuring GFI WebMonitor 28, 60 Phishing 9, 38, 89-90, 99
Console 26, 30, 122, 127, 138, 147, 152 Port Blocking 19
Credentials 22, 25, 65, 102-103, 112, 127, 131, 134- Proxy Server 12, 17, 19, 23, 27-28, 30, 32, 101
135, 137, 141
R
D
Reporting 16, 39-40, 53, 55, 58
Dashboard 39-40, 42-43, 46-47, 49, 51, 68-69
S
Download Control Policy 92, 94
DrayTek VIGOR 126-127 Safe Search 78
Simple Proxy 16, 18-19, 23, 100, 111, 126
F
Snap-ins 30, 122, 147, 152
FTP 29, 32
SonicWall 126, 135, 137
G
Spyware 11, 69
General Options 66
T
H
Technical Support 110
HTTP 17, 19, 29, 32, 35, 101, 124, 131, 133, 137-138, Thomson 127, 141
141
Traffic Forwarding 17, 19, 140
HTTPS Scanning 103, 105-107, 119, 125
Troubleshooting 110
I
U
IM Control Policy 75
Unified Protection Edition 10, 17
Installation 12, 16, 18, 21, 23, 26, 61-63, 65, 102, 109-
110 W
Integrated authentication 102, 111, 150 Web Forum 110
Internet Gateway 17-18, 21 Web traffic 11, 20, 40, 101, 103
WebFilter Edition 9, 16, 38, 69-70, 78