Internet Access Monitor. A Technical White Paper



Similar documents
Cyclope Internet Filtering Proxy. - Installation Guide -

Network Monitoring Comparison

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.

Chapter 1 Basic Introduction to Computers. Discovering Computers Your Interactive Guide to the Digital World

HP Remote Monitoring. How do I acquire it? What types of remote monitoring tools are in use? What is HP Remote Monitoring?

DEDICATED MANAGED SERVER PROGRAM

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future

Owner of the content within this article is Written by Marc Grote

FTP Accounts Contents

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

Why Use Documentation Toolkit for SharePoint?

Cyclope Internet Filtering Proxy

SOFTNIX LOGGER Centralized Logs Management

Web Hosting Features. Small Office Premium. Small Office. Basic Premium. Enterprise. Basic. General

NTT Web Hosting Service [User Manual]

Rapid Assessment Key v2 Technical Overview

Enterprise Reporter Report Library

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Burst Technology bt-loganalyzer SE

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

Print Audit Facilities Manager Technical Overview

Quick Start Guide.

Concepts. Help Documentation

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

User Guide. You will be presented with a login screen which will ask you for your username and password.

Configuring and Monitoring the Client Desktop Component

Hands-On Microsoft Windows Server Chapter 12 Managing System Reliability and Availability

Computer System Management: Hosting Servers, Miscellaneous

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame

Chapter 8 Monitoring and Logging

Deployment Guide. Websense Web Security Solutions. v7.5

Bandwidth consumption: Adaptive Defense and Adaptive Defense 360

Owner of the content within this article is Written by Marc Grote

Integration Service Database. Installation Guide - Oracle. On-Premises

SAS3 INSTALLATION MANUAL SNONO SYSTEMS 2015

RightNow November 09 Workstation Specifications

Comodo LoginPro Software Version 1.5

5nine Virtual Firewall 2.1 for Microsoft Hyper-V

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

WhatsUp Gold vs. Orion

SysAidTM Freeware Installation Guide

Top 10 Features: Clearswift SECURE Gateway

By the Citrix Publications Department. Citrix Systems, Inc.

17. The Contact Center

Outgoing VDI Gateways:

ivos Technical Requirements V For Current Clients as of June 2014

Monitoring Databases on VMware

SysAidTM Product Description

How To Set Up Foglight Nms For A Proof Of Concept

Basic, Professional & Professional Box

Virtual Appliance Setup Guide

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

Bitrix Site Manager ASP.NET. Installation Guide

Backing Up Your Gateman Server

Installation and Configuration Guide

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

The software can be downloaded from the Spiceworks web site at:

AGREEMENT on cpanel Hosting service use. AGREEMENT No. Concluded on: 1. (hereinafter: the Customer) Article 1 Subject and Definition

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

P2P Traffic Manager. L7 Internet Security. IP Appliance Products

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Bandwidth Management for Peer-to-Peer Applications

Employee Monitoring in the Modern Workplace

Tour and Event Management for Museums

QUESTIONS AND ANSWERS

Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services

MICROSOFT OPEN PROGRAMS GUIDE. Microsoft Open Programs Guide

AVeS Cloud Security powered by SYMANTEC TM

FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM)

SES Business Broadband Fair Use Policy

SysAid Freeware Installation Guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Accessing VirtualBox Guests from Host using SSH, WinSCP and Tunnelling

Where-to-Web-to-Print? Hosted versus On-Site

Burst Technology. bt-webfilter User Guide

Prerequisites Guide. Version 4.0, Rev. 1

Installation and configuration guide

Check Point FireWall-1 HTTP Security Server performance tuning

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Cyclope Internet Filtering Proxy. - User Guide -

White Label Mobile AG, Liechtenstein

Quick Start Guide Getting started with your Hetzner package

INFORMATION TECHNOLOGY SERVICES TECHNICAL SERVICES June 2012

Monitor network traffic in the Dashboard tab

+27O.557+! RM Auditor Additions - Web Monitor. Contents

Transcription:

Internet Access Monitor A Technical White Paper

Table of Contents Introduction... 3 Program Functions... 3 Program Benefits... 3 System Requirements... 3 How the Program Works... 4 Licensing Schema... 5 Contact... 5 Company... 5

Introduction Internet Access Monitor is a software product for monitoring the efficiency of the internet bandwidth usage by your company's employees. With Internet Access Monitor you can easily find out which employees load up the bandwidth most heavily, when and what exactly they download, how much time they spend online, and what data transfer traffic they create. Program Functions Internet Access Monitor is an application that allows providing administrators and managers reliable information on the usage of the Internet connection in their organization. With Internet Access Monitor you can easily monitoring user activity and internet usage in your organization. With Internet Access Monitor, you can easily determine which web sites are visited by users, and how much traffic was consumed from these web sites. The program allows you to obtain information such as Username and IP address of the user and address of the website, access protocol name, type of downloaded data, application name, and much more. Program Benefits allows centralized monitoring of your employees internet access prevents personal usage of corporate bandwidth reduces your internet expenses extremely easy-to-use; can start monitoring users in a just a few minutes once the installation is complete works with all modern proxy servers allows the generation of a great number of reports and diagrams which display the efficiency of your company's proxy server usage has a task scheduler to automate the creation and delivery of reports to authorized personnel System Requirements Windows 95/98/ME/NT/2000/XP/2003/Vista/2008; 128 RAM;

10000 Kb free disk space. How the Program Works Internet Access Monitor is a comprehensive internet use monitoring and reporting utility for corporate networks. The program takes advantage of the fact that most corporations provide internet access through proxy servers, such as MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Each time a user accesses any website, or downloads files or images, these actions are logged. Internet Access Monitor processes these log files to offer system administrators a wide range of report-building options. The program can build reports for individual users, showing the list of websites visited, along with detailed classification of internet activity (downloading, reading text, viewing pictures, watching movies, listening to music, working). Plus, the program can create comprehensive reports with analysis of overall bandwidth consumption, building easy-to-comprehend visual charts that indicate the areas where wasteful bandwidth consumption may be eliminated.

Licensing Schema Internet Access Monitor's licensing model is computer based. This means that you need to purchase a license for one computer and may use it on one computer only. If you plan to use the software on more than one computer you should purchase an additional license. Purchasing one license for one computer you can import log files from unlimited numbers of proxy servers. Number of proxy clients and computers also is unlimited. Contact To obtain answers to your questions regarding the use of our programs, please email us at the following addresses: General inquiries: info@redline-software.com Purchasing the software: sales@redline-software.com Technical support: support@redline-software.com Company Red Line Software was established in 2003 and now is one of the leaders in internet access monitoring and activity control solutions. SurfCop, Internet Access Monitor, Mail Access Monitor, and Printer Activity Monitor help company management carry out efficient monitoring on the use of company resources. All our products have very simple installation as well as simple and convenient interface which will help you use them as efficiently as possible. Our clients range from home-users to business and government organizations including banks and other financial institutions, the aerospace industry, oil-and-gas producers, IT software and hardware companies, and a wide spectrum of small and large businesses. Some organizations are presented in the Our Customers section. Over the past years our user-base has grown to include thousands of users, and we thank all of our customers for giving us the opportunity to continue satisfying their needs with high-quality software solutions. Our mission is to deliver and support our products to a world-wide audience as well as to develop and offer new solutions for our customers specific needs. Some of our customers feedback is presented in the Testimonials section. We are interested in cooperating with other IT and consulting solutionproviders in order to offer competitive and successful end-products to a wide range of customers. A deep understanding of our customer s needs and the pleasure of working with our products is evidenced by our users' awards. We prefer to do the job right or not to do it at all.