SurfCop for Microsoft ISA Server. System Administrator s Guide



Similar documents
Printer Activity Monitor. System Administrator s Guide

Desktop Surveillance Help

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

WhatsUp Gold v16.3 Installation and Configuration Guide

Charter Business Desktop Security Administrator's Guide

TSM Studio Server User Guide

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Installing GFI MailSecurity

Step-by-Step Configuration

SecuraLive ULTIMATE SECURITY

Ekran System Help File

Synchronizer Installation

System Administration Training Guide. S100 Installation and Site Management

Kaseya Server Instal ation User Guide June 6, 2008

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Sophos Mobile Control Installation guide. Product version: 3.5

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP Storage Server User Manual NovaStor / April 2013

GFI Product Manual. ReportPack Manual

DiskPulse DISK CHANGE MONITOR

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

QUANTIFY INSTALLATION GUIDE

HP Device Manager 4.6

There are numerous ways to access monitors:

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Installation Guide for Pulse on Windows Server 2012

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. August 2014 Phone: Publication: , Rev. C

IceWarp to IceWarp Server Migration

Installation Guide for Pulse on Windows Server 2008R2

BlackBerry Enterprise Service 10. Version: Configuration Guide

Installing and Configuring vcloud Connector

Installation & Configuration Guide

Plesk 11 Manual. Fasthosts Customer Support

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

WhatsUp Gold v16.1 Installation and Configuration Guide

AVG 9.0 Internet Security Business Edition


Jetico Central Manager. Administrator Guide

Migrating helpdesk to a new server

XenClient Enterprise Synchronizer Installation Guide

If you have questions or find errors in the guide, please, contact us under the following address:

safend a w a v e s y s t e m s c o m p a n y

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

GUARD1 PLUS SE Administrator's Manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

Configuring, Customizing, and Troubleshooting Outlook Express

1. Set Daylight Savings Time Create Migrator Account Assign Migrator Account to Administrator group... 4

Step-by-Step Configuration

WhatsUp Gold v16.2 Installation and Configuration Guide

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

1. PRODUCT OVERVIEW PRODUCT COMPONENTS... 3

Enterprise Manager. Version 6.2. Installation Guide

Xythos on Demand Quick Start Guide For Xythos Drive

Vector Asset Management User Manual

Migrating TimeForce To A New Server

Sophos for Microsoft SharePoint startup guide

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

Snow Inventory. Installing and Evaluating

Installing and Configuring WhatsUp Gold

Installation Instruction STATISTICA Enterprise Server

AVG 8.5 Anti-Virus Network Edition

SonicWALL SSL VPN 3.5: Virtual Assist

NovaBACKUP xsp Version 15.0 Upgrade Guide

Database Administration

Installation Guide For Choic Enterprise Edition

Sophos Mobile Control Installation guide. Product version: 3

Networking Best Practices Guide. Version 6.5

Kaseya 2. Installation guide. Version 7.0. English

TANDBERG MANAGEMENT SUITE 10.0

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE

WEBCONNECT INSTALLATION GUIDE. Version 1.96

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Manual POLICY PATROL SECURE FILE TRANSFER

Using DC Agent for Transparent User Identification

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

2X ApplicationServer & LoadBalancer Manual

LifeSize Control TM Deployment Guide

3 Setting up Databases on a Microsoft SQL 7.0 Server

Remote Application Server Version 14. Last updated:

Backup & Disaster Recovery Appliance User Guide

Virtual Web Appliance Setup Guide

FileMaker Server 11. FileMaker Server Help

ez Agent Administrator s Guide

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Click Studios. Passwordstate. Installation Instructions

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Installation Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Installation Guide

FortKnox Personal Firewall

NetWrix SQL Server Change Reporter

Outpost Network Security

NSi Mobile Installation Guide. Version 6.2

Eucalyptus User Console Guide

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

RBackup Server Installation and Setup Instructions and Worksheet. Read and comply with Installation Prerequisites (In this document)

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Barracuda Link Balancer Administrator s Guide

Installing Oracle 12c Enterprise on Windows 7 64-Bit

Transcription:

SurfCop for Microsoft ISA Server System Administrator s Guide

Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know about Agent? 11 ISA Server Enterprise Edition 12 Local IP addresses 12 Configuring Agent 14 Global Settings 14 Protocol Calibration 16 Migration Wizard 16 SurfCop Rules 18 Rules Evaluation Order 18 Quota Rules 18 How It Works 19 Traffic Counters 22 Time counters 23 Personal Web Statistics 24 Useful Information 25 Bandwidth Rules 26 How It Works 26 Speed Counters 29 Web Access Rules 31 Global Web Access Policy 32 Web Access Rules 36 How It Works 36 Useful Information 39 Advanced Rule Conditions 40 DATA CENTER 42 General settings 43 Active Directory 43 2

Email 44 Data Storage 45 SQLite 49 Microsoft Access 50 Microsoft SQL Server 61 MySQL 75 PostgreSQL 85 Oracle 94 Alias Management 105 Converters 106 Value Lists 107 License Management 109 Licensing Schema 109 License Activation 111 Licensed Objects 114 Licensing Restrictions 114 Urls Database 115 MONITORING 116 Reports 117 Report Generation 117 Report Sections 126 Repository 128 Report Generator Task Bar 129 Task Manager 131 Summaries 142 Quota Monitor 146 Activity Monitor 151 How It Works 151 Configuring Activity Monitor Layout 155 Useful Information 158 Bandwidth Monitor 159 TROUBLESHOOTING 164 PRACTICAL RECOMMENDATIONS FOR SOFTWARE CONFIGURATION 166 Scenario 1 166 Scenario 2 168 Scenario 3 169 3

Scenario 4 170 Scenario 5 172 Scenario 6 174 Scenario 7 176 Scenario 8 177 4

Introduction SurfCop is a software product designed to monitor and control traffic in an organization that uses Microsoft ISA Server 2004/2006. It implements the concept of integrated approach to monitoring and limiting traffic and also to controlling the efficiency of the company's employees. Program features: monitoring traffic; limiting traffic; bandwidth management; monitoring and limiting users' surfing time; generating reports about traffic consumption; monitoring user activity in real time; limiting access to sites depending on categories they belong to; limiting access to web pages containing forbidden words and much more; The program consists of three components: Agent - the filter permanently residing in memory and collecting information about user activity. In case the Enterprise version of Microsoft ISA Server is used, the filters must be installed on all servers in the array. Data Center - the system service receiving data from agents and gathering it in the database. SQLite, MS Access, MS SQL, MySQL, PostgreSQL, Oracle can be used as a data storage. It is possible to install the Data Center on any computer in the network. Management Console - the Microsoft Management Console snap-in designed for administering the software and controlling Internet activity. The console is delivered as a separate component and can be installed separately from all other system components (the Microsoft ISA Server console is required). 5

6

Program features Active Directory support; Microsoft ISA Server 2004/2006 support; close integration with the Microsoft ISA Server 2004/2006 console; compatibility with the Standard and Enterprise editions of Microsoft ISA Server 2004/2006; multi-tier architecture allowing all software components to be installed on different computers; remote administration from any network computer; administration and monitoring from several network workstations at once; support for SQLite, MS Access, MS SQL, MySQL, PostgreSQL, Oracle as a data storage; a lot of predefined reports allowing collected information to be analyzed from various angles; System Requirements Microsoft ISA Server 2004/2006 10000 KB free disk space. 7

Deployment Planning SurfCop is a module-based system that consists of three components: the Agent, Data Center and Management Console. Each component is installed using a single installation wizard that allows you to choose one of the predefined scenarios: Install all components each component will be installed on one computer. This scenario is most suitable when ISA Server Standard Edition is used or you would like to install the agent on one of ISA Server Enterprise Edition array servers. In this case Data Center will also be installed on the computer. Install Data Center component only the Data Center component will be installed. This scenario should be used in case you have decided to dedicate a separate computer or a separate virtual machine (VM) for gathered data storage. Install server components only this scenario should be used if you have ISA Server Enterprise Edition installed and you need to install the agent on array servers. This scenario is also applicable when ISA Server Standard Edition is used and you only wish to install the agent component on the Microsoft ISA Server computer. In this case you should also have the Data Center component installed and configured on you network. Install Remote Management Console if your computer has the ISA Management Console installed on it for remote management of Microsoft ISA Server, you can use this scenario to install SurfCop management console. Thus you will be able to perform remote management and monitoring tasks. 8

While installing the program you should pay special attention to the Data Center component location. If the Internet activity of your company is rather high, you are highly recommended to allocate a separate computer or VM for the Data Center component. In this case the workload created by data processing and log generation will be taken from the computer running Microsoft ISA Server to that allocated machine. 9

Agents Agent installation is straightforward. In case you decide to use the «Install all components» scenario you don t have to make any special configuration tasks during the installation process. If you use the «Install server components only» scenario though, during the installation process wizard will ask you to specify computer address the Data Center component is installed on. You should use IP address or NetBIOS name of the computer as its address. During the Agent installation process you will have to stop Microsoft ISA Server for a short period of time. Reboot is not required. How It Works Agent is a collection of filters that register within the configuration and operate inside of Microsoft ISA Server. Major agent s tasks are as follows: Gather information about user activity Control user access to the Internet resources Count and control traffic and time quota exceeding Manage bandwidth During the operation agents generate detailed activity logs and pass them on to Data Center for further processing. 10

What is Important to Know about Agent? Agent does not monitor any local traffic. So no activity on the local network will be reflected in activity monitors, logs and will be counted by the traffic counters. Only external network traffic will be taken into account. Previous point leads to the following important condition: care should be taken when configuring range of local IP addresses in the Microsoft ISA Server (Internal Network). Otherwise you may end up with the situation, when SurfCop will treat entire traffic as local. For more details read below. Besides the filter that works together with Microsoft ISA Server a special «SurfCop Agent» service is also installed on the computer. This service is extremely important for agent functioning; therefore it must be constantly running. If you use Microsoft ISA Server Enterprise Edition, all array servers should be up and running. In case even one array server is down, all other array servers can experience latency. It has something to do with the frequency of data synchronization by the agents. All computers that have agents, Data Center and management console running on them (in case all components are installed on different computers) must be available over the network from standard Network Places applet. 11

ISA Server Enterprise Edition If you organization uses Microsoft ISA Server Enterprise Edition, the agents should be installed on all array servers. When installing all agents it is essential to specify the same settings. Local IP addresses Correctness of SurfCop functioning strongly depends on the correct local IP address configuration. Here is the example of the appropriate address list configuration for Internal network in Microsoft ISA Server: In this case Microsoft ISA Server will only perceive the addresses included into this range as local addresses. All other addresses will be treated as external. Here is the example of the inappropriate address list configuration for Internal network in Microsoft ISA Server: 12

Administrators often create IP address list using the «Add Adapter» option that makes it possible to select NIC and after that the address list is created automatically. In the above example program has created the address list that includes almost every IPv4 address of the Internet. Therefore SurfCop will perceive any traffic as local and will not count it. If SurfCop will find incorrect setting in the Internal network configuration, it will record corresponding alert to the Microsoft ISA Server log. 13

Configuring Agent The «SurfCop\Configuration\General» page contains several dialog boxes that allow you to configure agent operation. Global Settings Resolve MAC address and Computer name by Client IP allows displaying computer names and MAC addresses in logs and activity monitors. Besides if this option is enabled MAC address and computer name can be used to identify the user. Otherwise only IP address and username will be used. Disable activity logging all subsystems with the exclusion of log generation subsystem will continue to operate. Enable debug logging this option makes it possible to enable a detailed debug logging. It is used, when SurfCop performance issues occur. Treat VPN clients as external this option allows you to change program behavior in traffic counting for VPN users. Usually VPN users are the users that connect externally, log on to the company s local network, get local IP address from a special address pool and are further treated as regular internal users. Thus the rules of IGNORING local traffic apply to them. Thus if a VPN user will download 1 GB 14

file from the company s internal network to his/her local computer this traffic will not be counted, because SurfCop will perceive it as local traffic. It is quite logical but the thing is that this traffic actually goes through the secured VPN cconnection over the Internet so it must be counted. To avoid such situation you can use the checkbox mentioned earlier. When you check this checkbox all VPN clients will be treated as external during the process of traffic counting. But to count this traffic correctly just checking this checkbox is not enough. You will also have to modify SurfCop quota rules and web access rules so that they count VPN users. Data Center address IP address and the name of the computer running the Data Center component. This option is helpful in case you have decided to switch the agent to another Data Center. When you apply all changes, agent sends all its information to the new address. 15

Protocol Calibration The essential part of SurfCop performance is the configuration of Microsoft ISA Server protocols. During the installation process SurfCop connects to all types of protocols that are present in the ISA Server configuration. So when traffic that uses any type of the included protocols is generated, ISA Server is taken over by SurfCop, which in its turn becomes capable of counting and controlling traffic. But very often administrator decides to add new protocols, change configuration of existing protocols or even remove some protocols. As a result of such modifications there can occur a situation, when SurfCop is not connected to the protocol. In this case when traffic using new or modified protocol is generated, ISA Server will not be taken over by SurfCop and traffic will not be counted. That is why it is essential for the administrator to perform protocol calibration after any changes made to protocol configuration to avoid such situations (only protocol calibration is required. Changes made to other configuration settings in no way affect the program, and thus calibration for them is not required). To perform protocol calibration you should go to the «Calibrate Protocols» link on the «SurfCop\Configuration\General» tab. During the calibration process SurfCop will analyze all changes made to the protocols and will either tell you that the configuration is appropriate or will make all the necessary changes and connect to new protocols. In case SurfCop will find incorrect protocol configuration setting, it will generate corresponding message to the Microsoft ISA Server log. If you have some questions related to this issue, please, feel free to contact Help Desk of Red Line Software. Migration Wizard The program includes an integrated migration wizard that is designed to move configuration and statistics from one computer to another. This tool is very helpful in case you want to reinstall agent of the program to a new computer or implement configuration settings on other agent installed on your network. During the first step the migration wizard prompts you to pick up one of the following actions: Create a backup Restore from backup 16

Before you create a backup copy you are prompted to enter the file, to which the configuration will be saved, and select objects the backup copy will be created for. SurfCop configuration Quota counters Summaries URL database Firewall configuration After the migration wizard finishes its task, a «.bk» file is created that can be used later on to restore saved configuration settings. 17

SurfCop Rules The major configuration tools of the program are the rules. The rules offer flexible mechanism of controlling access to different Internet resources. Web sites, traffic, time spent on the Internet, network bandwidth, etc, all can be referred to as resources. Generally the mechanism of creating and configuring rules is identical to that of Microsoft ISA Server. If you have ever had a chance of creating rules in Microsoft ISA Server, creating rules in SurfCop will be an easy task for you. SurfCop has several rule types: Quota Rules, Web Access Rules, and Bandwidth Rules. SurfCop management console has a separate node for managing each rule type. Rules Evaluation Order Rules are evaluated from top to bottom. When the rule is checked all its conditions are evaluated and if the parameters of user request match rule conditions further evaluation is not performed. Thus the first rule to be applied is the rule with the conditions that first match user request parameters. Warning! The situation may occur, when no matching rule will be found. In this case traffic will not undergo any changes; it will not be controlled or restricted. To avoid such situations you are highly recommended to create an additional rule by default with such conditions that will be met by all requests from all users. This rule should be placed at the end of the list. Quota Rules An important part of SurfCop is the subsystem of quota allocation. Quota rule allows you to set up quantitative quotas for various Internet resources. 18

There are two types of quota rules: Traffic quota rules Time quota rules How It Works Quota rules define the conditions that if met cause the program to perform certain actions. The following user request parameters act as conditions: source, destination, protocol, list of users and groups, schedule that determines days and hours on which quota rule is working, and advanced conditions specific of SurfCop only. Besides quota rule determines the actions taken after the quota has been exceeded and the access is blocked. Following options are possible: Show blank denial page Show internal denial page Show custom denial text When a user initiates a request, SurfCop analyses quota rule list and tries to find the rule that is met by this request. If no such rule is found user request is processed without any changes. If the corresponding rule is found in the list SurfCop performs an action that is defined in the settings of the rule. 19

Quota rules can perform following actions: Create ONE quota counter for all objects that match rule conditions. This action creates shared counter for all users that match rule conditions. So, all these users will get a single quota. This option is useful when you want to give one quota for all users of a certain department in your organization, for example. Or you might want to set one quota for all IP addresses belonging to a certain subnet. Thus when quota is exceeded, access to the resource specified in the conditions of this quota rule will be blocked for all users of this counter. Create separate quota counter for each object that match rule conditions. This action creates an individual counter for every single user that matches rule conditions. If we look back at the department scenario above, in this case a separate counter and quota will be created for each user of the department. Thus if one user exceeds quota this will not affect other users in any way. The concept of object identification method is an essential part of the abovementioned action. The identification method determines object attribute that will be used for search among the existing counters list. The program supports following object identification methods: o Computer IP address o Computer MAC address o Username o Computer name You should clearly understand that if you use username option and several users will access the Internet from the same computer a separate counter will be created for each one of these users. In case you choose IP address option and you have DHCP server configured on your network, each time the user will start the computer and get a new IP address, new individual counter will be created for this user. If Microsoft ISA Server has no mandatory authentication configured on it and the DHCP server is running on your network, the only way to explicitly identify an object and set quota for it is to use computer name or MAC address of the computer. If users access the Internet from terminal server, then it s better to use username option for object identification. So what is counter? Counter is an object that is created by quota rule. Counter is created when a user tries to get access to a certain resource specified in rule settings. It can be a web site, subnet, individual host or a subnet of addresses that are defined in rule settings. Quota rule also determines counter type: shared or individual. Depending on rule that has created a counter there may be the following types of counters: Traffic counter Time counter Counters exist within certain time period after which they reset. The maximum time value before the counters reset is determined by quota rule. You can choose one of the following intervals of counter reset: 20

Daily. Counter resets every day at certain time explicitly specified in rule settings. Weekly. Counter resets every week on certain day and at certain time explicitly specified in rule settings. Monthly. Counter resets each certain day of month at certain time that is explicitly specified in rule settings. If counter data will reach threshold value before its reset time is reached the access to resource will be blocked and access will only be granted after the counter resets. If counter does not reach the threshold value, it will simply reset on a due date and time. 21

Traffic Counters Traffic quota rule defines threshold values of traffic counter as follows: Traffic to count this option defines as to what traffic type is to be counted and affected by quota rule. Following options are available here: o Incoming o Outgoing o Total total amount of incoming and outgoing traffic is to undergo quota rule. o Both separate quota for incoming and outgoing traffic. The advantage of this option is in that when, for example, the threshold value for incoming traffic is reached, the outgoing traffic will still be allowed. Incoming threshold threshold value for incoming traffic, exceeding of which will block incoming access. Outgoing threshold threshold value for outgoing traffic, exceeding of which will block outbound access. Do not count web traffic retrieved from cache if this checkbox is checked, all traffic retrieved from cache will not be counted and thus will not increase counter readings. Do not show counters of this rule in WebStat if this option is checked, counters created by this rule will not be presented to the user on his/her personal WebStat page. 22

Time counters Time quota rule defines threshold values of time counter as follows: Threshold threshold value of time spent on the Internet, exceeding of which will block access. Poll proxy server (using asynchronous client side Java Script) while client session is alive this option makes it possible for you to enable a special mechanism that helps enhance the accuracy of time calculation spent by the user on the Internet. This parameter is optional but is highly recommended. Enable short domain names using this checkbox you can display short names of web sites the user visited. If this option is checked, the visited web site names will be cut up to the specified level. This option affects site names displayed in quota monitor and user s personal WebStat page. Do not show counters of this rule in WebStat if this checkbox is checked, then counters created by this quota rule will not be visible on the user s personal WebStat page. Warning! Time counters only count time that the user has spent on web site browsing. They do not count time spent on using IM applications, email applications, etc. 23

Personal Web Statistics Each user that matches at least one quota rule conditions and that has at least one counter created for him/her respectively can view the counter data using a special web page. To view this personal web page user should visit one of the following URLs: http://1.1.1.1 for SecureNAT clients http://webstat.isa for WebProxy and Firewall clients As you can see, these are fake addresses and thus they will be intercepted by SurfCop to show user s quota counter state instead of real content. Personal WebStat page contains several tabs and allows you to view both traffic and time counters. This page was tested and optimized for the following web browsers: Internet Explorer 6.0 and higher Opera 8.0 and higher Chrome 2.0 and higher Mozilla Firefox 2.0 and higher If you do not want some counters to be displayed in the WebStat window (for instance, if you do not want the user to be able to see browsed web sites statistics), you can make them invisible for the user by checking the «Do not show counters of this rule in WebStat» checkbox in the settings of the corresponding quota rule. 24

Useful Information You can set several quotas separated by different protocols for one user. For example you can allow a user to generate 500 MB of HTTP traffic per day and 100 MB of POP3 and SMTP traffic per day. If web traffic will be blocked due to exceeding of the limit, user will still be able to use email. Current traffic counter value for any user can be either increased or decreased using management console. The text on the standard blocking page can be changed by editing corresponding pages located in HTML folder under the directory where you have your agent installed. If the user visits secured SSL site, the changes to the traffic counter data will only be visible after user session is finished. It is due to the nature of SSL traffic and the peculiarities of Microsoft ISA Server implementation. If time quota rule does not have the «Poll proxy server.» checked, the changes to the traffic counter data will only be visible after user session is finished. Rule list can be exported to an XML file so that you could be able to load it back from that file later. To import/export rule list you simply use the following commands: Import Configuration and Export Configuration. 25

Bandwidth Rules An important part of SurfCop is the subsystem of controlling bandwidth. Bandwidth rules allow you to limit access rate in accordance with certain conditions. How It Works Bandwidth rules define threshold value of access rate to different resources and when this threshold value is reached bandwidth is restricted. The following user request parameters act as conditions: source, destination, protocol, list of users and groups, schedule that determines days and hours on which bandwidth rule is working, and advanced conditions specific of SurfCop only. When user initiates a request, SurfCop analyses bandwidth rule list and tries to find the rule that is met by this request. If no such rule is found user request is processed without any changes. If the corresponding bandwidth rule is found in the list SurfCop limits access speed based on the rule settings. 26

Bandwidth rules can perform following actions: Create ONE speed counter for all objects that match rule conditions. This action creates a shared speed counter for all objects that match rule conditions. Thus you can specify single speed limit for all objects. For example, you can create a rule that will limit access rate to the sites of certain category up to the specified threshold for all users of the enterprise. In this case the program will only set general speed limit for the entire user group and will not control speed rate of a specific member of the group that matches rule conditions. All users will compete for the bandwidth in natural way. Create separate speed counter for each object that match rule conditions. This action creates personal counter for each object that matches rule conditions. The specified speed limit will be equally distributed among each member of the object group. Thus you can set an individual quota on a per-object basis. For example, you can create a rule that will set individual speed limit to the site of certain category for each user in your organization. The concept of object identification method is the essential part of this action. The identification method determines object attribute that will be used for search among the existing counters list. The program supports following object identification methods: o Computer IP address o Computer MAC address o Username o Computer name 27

You should clearly understand that if you use username option and several users will access the Internet from the same computer a separate counter will be created for each one of these users. In case you choose IP address option and you have DHCP server configured on your network, each time the user will start the computer and get a new IP address, new individual counter will be created for this user. If Microsoft ISA Server has no mandatory authentication configured on it and the DHCP server is running on your network, the only way to explicitly identify an object and set quota for it is to use computer name or MAC address of the computer. If users access the Internet from terminal server, then it s better to use username option for object identification. So what is speed counter? Speed counter is an object that is created by bandwidth rule. Speed counter is created when a user tries to get access to a certain resource specified in rule settings. It can be a web site, subnet, individual host or a subnet of addresses that are defined in rule settings. Bandwidth rule also determines counter type: shared or individual. In case speed counter data will reach threshold value access speed to the resource will be limited. 28

Speed Counters Bandwidth rule defines threshold values of speed counter as follows: Speed to count this option specifies traffic type that is to be counted. Following options are available here: o Incoming o Outgoing o Both in this case separate speed counters will be created for incoming and outgoing traffic respectively Incoming threshold threshold value for incoming traffic speed. Outgoing threshold threshold value for outgoing traffic speed. Do not count web traffic retrieved from cache if you have this option checked, the entire traffic volume retrieved from cache will not be counted and as a result transfer speed of such traffic will in no way affect the counter readings. Reserve bandwidth even if no active speed counters exist if you check this checkbox, each user that matches rule conditions will have constant bandwidth reserved for him/her. In this case the bandwidth reserved for the user cannot be used by other users even if such user is offline. This parameter is very important and it s necessary to clearly understand how it works. If this option is checked, the user will have bandwidth reserved solely for him/her. It is very useful for allocating bandwidth for VIP users. Therefore when such user goes online he/she will get necessary bandwidth and will not have to «compete» for it with other users. But care should be taken when using this option, because if this option is enabled, but the user is offline or does not fully consume the bandwidth, all other users will still be «locked» within limited bandwidth. 29

If this option is disabled, the rest bandwidth that is not in use will be evenly distributed among other users. You are not recommended to use this option unless necessary. 30

Web Access Rules One more important part of SurfCop is the subsystem of access restriction to web resources. Web access rules allow you to set strict limits for various web resources on the basis of certain conditions. Access to web resources in SurfCop can be limited in three ways: Using Quota Rules and quota exceeding Using Global Web Access Policy Using Web Access Rules First variant was covered in details in previous section. Let s take a look at two other options. 31

Global Web Access Policy Global web access policy allows you to simplify management tasks for functions in SurfCop related to web page content analysis and web access restriction. These settings are global and used in case no corresponding Deny or Allow rule has been found for the user s request. Optionally web access rule can override global policy settings. You can access dialog box for editing global policy from the «SurfCop\Configuration\Web Access Rules» tab using the «Configure Global Web Access Policy» link. Deny Web pages containing forbidden words if this option is enabled, SurfCop will analyze content of all visited web pages and count the number of forbidden words. Each forbidden word has its own weight. If the total weight of all forbidden words on the page exceeds allowed value, the page will be blocked. 32

Enable modifying Web pages contents using Search/Replace Rules if you have this option enabled, SurfCop will analyze web page content trying to find certain substrings and replace them with other values. Source and replace substrings are defined by the «Search/Replace Rules». 33

When SurfCop decides to block web access under global policy, it performs one of the following actions: 34

Show blank denial page Show internal denial page Show custom denial text Redirect to denial URL in this case you should make sure the denial page is not blocked by other SurfCop or Microsoft ISA Server rules. 35

Web Access Rules Web access rules in SurfCop are very similar to that of Microsoft ISA Server access rules. But here are some important things: SurfCop web access rules start working and apply ONLY when access to the requested resource is allowed by some Microsoft ISA Server rule. Otherwise SurfCop web access rule will not even have a chance to analyze requests. Besides usual conditions (source, destination, protocol, user, etc.), the SurfCop web access rules can also use advanced conditions that are specific of SurfCop only. How It Works Web access rules define the conditions that if met cause the program to perform certain actions. The following user request parameters act as conditions: source, destination, protocol, list of users and groups, schedule that determines days and hours on which web access rule is working, and advanced conditions specific of SurfCop only. Besides web access rule determines the actions taken, when web access is blocked. Following options are possible: Show blank denial page Show internal denial page Show custom denial text Redirect to denial URL in this case you should make sure the denial page is not blocked by other SurfCop or Microsoft ISA Server rules. When user initiates a request, SurfCop analyzes web access rule list and tries to find a rule that is met by the request. If no such rule is found user request is processed without any changes. If the corresponding rule is found in the list SurfCop performs an action that is defined in the settings of this rule. 36

Web access rule can perform the following actions: Allow. Access to the requested resource is allowed. If you enable this option you will have additional tab named «Content Scanning» that allows you to specify the rules of allowed content category. By default, the program uses the rules defined in global web access policy. But you can redefine global settings of a certain web access rule in its settings if necessary. Deny. Access to the requested resource is denied. The only reason for SurfCop to include web access rules is the necessity to be able to specify additional optional conditions in rule settings: 37

These optional conditions have equal power with all other conditions and are useful when main conditions are not sufficient. Additional conditions can be specified based on the following request parameters: Application user s application name. Application name can be specified for web traffic only. Array Server name of certain array server (applicable for Microsoft ISA Server Enterprise Edition only) Client Host Name name of certain client computer Client IP client computer IP address Client MAC MAC address of a certain client computer Client type client type. Following options are possible: Web Proxy, SecureNat, Firewall Client username domain user name Content File Extension extension of the file requested by the user Content File Name name of the file requested by the user Web Listener web listener name responsible for inbound request Web Site Category one or more categories the requested site belongs to Web Site Name name of the web site requested by the user Web Site Referrer referrer of the requested web site Web Site Request user request (requested object address without site name) 38

Useful Information Web access rules are optional. If you are satisfied with the capabilities Microsoft ISA Server offers you, you can disable web access rules and global web access policy. When you add advanced filters using the conditions «Equals», «Does not Equal» you can use masks. For example: o «Web Site Name» equals «*.google.*» o «Client HostName» equals «Computer10?» Each web site in the Urls Database can be associated with one, two or three categories. That is why care should be taken when creating filters that use the Web Site Category field. For example, if SomeSite.com web site belongs to the «Adult» category, the condition: «Web Site Category» equals «Adult» will be true. In case this site belongs to some other category alongside with the «Adult» category, the condition above will be false and the rule that defines this condition will not be performed. In this case you should use the following condition: «Web Site Category» contains «Adult» Rule list can be exported to an XML file, so that you can load it back later. To perform import/export tasks for the rule list you can use following commands: Import Configuration and Export Configuration. 39

Advanced Rule Conditions Besides the fields that are common for all rule types, such as source, destination, protocols, users, etc., SurfCop allows you to specify optional filtering conditions. For this purpose you can make use of the special tab on the rule type list page (applicable for all rule types): These optional conditions have equal power with all other conditions and are useful when general conditions are not sufficient. Additional conditions can be specified based on the following request parameters: Application user s application name. Application name can be specified for web traffic only. Array Server name of certain array server (applicable for Microsoft ISA Server Enterprise Edition only) Client Host Name name of certain client computer Client IP client computer IP address Client MAC MAC address of a certain client computer Client type client type. Following options are possible: Web Proxy, SecureNat, Firewall Client username domain user name Content File Extension extension of the file requested by the user Content File Name name of the file requested by the user Web Listener web listener name responsible for inbound request Web Site Category one or more categories the requested site belongs to Web Site Name name of the web site requested by the user Web Site Referrer referrer of the requested site 40

Web Site Request user request (requested object address without site name) 41

Data Center Data Center is a special service designed to process the information about users activity on the Internet and to save this information to special storage. Since part of functionality is performed on the computer running Data Center, the program includes certain tools that allow you to configure its settings. 42

General settings This dialog box allows you to specify various settings that are necessary for the data center to run normally. Active Directory The program is closely integrated with Active Directory and allows you to automatically convert user logins into their full names. This process is performed, when activity monitors are used and during report generation process. To enable this feature, you should specify the account that will be used to connect to Active Directory. It is important to specify the correct account data because no conversion will be done otherwise. Warning! If you specify incorrect data or the account does not have enough permissions to access Active Directory, an error will occur during the conversion process and it will considerably slow down the performance of the program. 43

Email The application modules use these settings to send reports. 44

Data Storage These settings allow you to specify the type and parameters of the database, which will be used to store the collected data. SurfCop allows you to store user activity information in the following database formats: SQLite MS Access MySQL Oracle PostgreSQL MS SQL By default, the data is stored in SQLite format but the database format can be changed to any other. You should specify the data storage name, the database type and its optional description in the dialog, specially designed for this purpose. Warning! Before adjusting the connection settings you should create and configure the database BY YOURSELF using DBMS tools as it is shown in one of the chapters of this help section. 45

After you have chosen the data storage name and the database format you should specify the database connection settings, the program uses to gain access to the database. The content of the «Connection Settings» tab may change depending on the selected database format. As you click on «Test Connection» button the program tests connection with database and if all settings are adjusted correctly it informs you about it in a message. If it is impossible to connect to the database the program displays an error report on invalid input data. 46

The «Statistics» tab shows information about the data storage. This tab shows such information as: the storage size on the disk the names and versions of all data schemas present in the storage the number of records in each data schema the date of the earliest record in the data schema the date of the most recent record in the data schema 47

The Maintenance tab allows you to limit the storage size and the time to store information for. Delete records older than (days) - this setting allows you to specify the number of days after which a record will be considered outdated and deleted from the data storage. Limit data storage size (GB) - this setting allows you to limit the data storage size. In case the data storage size limit is exceeded, the program can do the following: Deleting older records as necessary Discarding new entries The program allows you to delete records from the data storage for a certain time period manually. To delete records for a certain time period, click the «Delete old records...» button, specify the time period and click «OK». All records for the specified time period will be deleted from all data schemas after that. The Drop all tables... button allows you to instantly delete all tables in the data storage and thus completely clear it. 48

SQLite Setup features No particular operations needed. Creating database The database is created automatically on the first access. Connection string You should specify a full path to the DB file. If the file does not exist it will be created automatically. You may use macros when specifying a file path: %INSTALLFOLDER% - path to a folder, to which the Data Center is installed By default, the value %INSTALLFOLDER%\DB\Activity.dat is used 49

Microsoft Access Microsoft Access is an RDBMS by the Microsoft Corporation. It has a wide range of functions, including related searches, sorting by multiple fields, and links to external tables and databases. Thanks to the built-in VBA language, it allows you to create applications to work with your databases. Versions of Microsoft Access: 1993. Access 2.0 for Windows (Office 4.3) 1995. Access 7 for Windows 95 (Office 95) 1997. Access 97 (Office 97) 1999. Access 2000 (Office 2000) 2001. Access 2002 (Office XP) 2003. Access 2003 (Microsoft Office 2003) 2007. Microsoft Office Access 2007 (Microsoft Office 2007) 2010. Microsoft Office Access 2010 (Microsoft Office 2010 TP) Microsoft Access Setup Microsoft Office Access 2007 part of the Microsoft Office 2007 package, is used as a DBMS. The first step is to create the database. The database must be created on the computer where the Data Center component is set up and used. Accordingly, Microsoft Access must also be set up on this computer. To create a new database, open the «File» menu (in Microsoft Office Access 2007 and later a round icon with an image of the Microsoft Office symbol is used instead of the «File» menu) and select «New». The main program window is shown in Figure 1. 50

Figure 1. On the right-hand side of the program window, the database create window will appear (Figure 2). You must choose a path for the new database, enter a name, then click «Create». It is recommended that you choose something simple and intuitive as the database name, for example, «Activity». 51

Figure 2. Once the new database is created, a table edit menu will appear, as shown in Figure 3. 52

Figure 3. You can close this menu, since Data Center creates all necessary tables itself on first access of the database. After this, Microsoft Access setup is complete. Data Center Configuration Once the new database is created, Data Center should be set up in order to work with it. For this, you must open the program s management console, go to the «Configuration» page shown in Figure 4, and select «Data Storage Settings». 53

Figure 4. In the dialog that opens, choose the database type (in this case, Microsoft Access). 54

Figure 5. On the second tab, specify the parameters for connecting to the database (Figure 6). To avoid the need to enter the connection string manually, the program has a special tool, to use which you simply click the button by the connection string field. 55

Figure 6. The dialog that opens, shown in Figure 7, allows you to choose the type of OLE DB provider, through which the connection should be set up. Choose Microsoft Office 12.0 Access Database Engine OLE DB Provider and click «Next». If another version of Microsoft Access is being used, then the name of the OLE DB provider may differ. 56

Figure 7. On the second tab, enter the connection parameters, as shown in Figure 8, where, C:\Users\Admnistrator\Documents\Activity.accdb name of database file created earlier. Warning! It is important to understand that since the connection parameters will be used in Data Center, all paths are displayed in relation to the computer on which Data Center is being used. This is especially important if Data Center and the management console are set up and used on different computers on the network. User name the user whose name will be used to connect to the database. Warning! In Microsoft Office Access 2007, protection for new file formats is not supported at user level, therefore «Admin» should be entered as the username. Password password of the user whose name will be used to access the database. Blank password means that a blank password is used to access the database (if you wish, you can protect the database with a password; in this case you should disable this option). 57

Figure 8. Click «OK» to continue. Once you have entered all the necessary connection parameters, a connection string will be generated automatically, as shown in Figure 9. The contents of the string may change depending on the information entered earlier. To test the connection string, click «Test Connection». 58

Figure 9. Once you have pressed «Test Connection» the program will attempt to connect to the database, and if the connection settings have been specified correctly, the message shown in Figure 10 will appear. Figure 10. When the connection testing is complete, click «OK». A message will appear notifying you that Data Center must be restarted for the new parameters to be applied (Figure 11). 59

Figure 11. Click «Yes», and Data Center will restart automatically. Once Data Center is restarted, all changes will take effect and the program will begin using the new database to store information. The status of the database can be viewed on the «Statistics» tab of the data storage management dialog (Figure 12). Figure 12. Conclusion: On the one hand, Microsoft Access DBMS is the simplest system in terms of setup, whereas on the other, it is not recommended for use by medium and large-sized companies, since it is a desktop product and is unable to store and process data satisfactorily once the database reaches a certain size (comparatively small). 60

Microsoft SQL Server Microsoft SQL Server is a system for managing relational databases (DBMS), developed by the Microsoft Corporation. The main query language used is Transact-SQL, created by Microsoft and Sybase together. Transact-SQL is an ANSI/ISO-standard realization of a Structured Query Language (SQL), with some expansions. It is used for small and medium-sized databases, and in the last five years has started to be used for large databases on an enterprise scale, competing with other DBMS in this segment of the market. Microsoft SQL Server Express is a freely distributed version of SQL Server. This version has several technical limitations, making it unsuitable for building large databases. However, it is perfectly suited for running software on a small-company scale. Microsoft SQL Desktop Edition is another freely distributed version of SQL Server. This version is designed for small user databases. This DBMS is not recommended for storing large volumes of data. Configuring Microsoft SQL Server Installation and customization of the Microsoft SQL Server must be carried out by the administrator themselves. All the operations described in this article were carried out under Microsoft SQL Server 2005 with the help of the freely distributed application for database management Microsoft SQL Server Management Studio Express. Settings for other versions of DBMS (SQL Server 2000, SQL Server 2008) are analogous to those presented here and do not differ significantly. Microsoft SQL Server Management Studio Express can be downloaded from the official Microsoft website: http://www.microsoft.com/downloads/details.aspx?familyid=c243a5ae-4bd1-4e3d-94b8-5a0f62bf7796&displaylang=en Before you start, you should enable the remote connection to the database server. For this, you will need to use the SQL Server Configuration Manager application. You can find SQL Server Configuration Manager here: Start->Programs->Microsoft SQL Server 2005->Configuration Tools-> SQL Server Configuration Manager In the open window, go to the Protocols for MSSQLSERVER tab (Figure 1). By default, the Named Pipes and TCP/IP protocols are disabled; therefore you will need to enable them by right-clicking and selecting Enable from the menu that appears. 61

Figure 1. Next, start «Microsoft SQL Server Management Studio Express» and connect to the database server, using the special icon in the top left corner. In the window that appears, select the database server you need to connect to, and choose the type of authorization. It is recommended that you use Windows authentication, as this method of authentication is more reliable than the built-in Microsoft SQL Server. (Figure 2) 62

Figure 2. Figure 3 shows the main program window. In the left-hand part of the window there is an object browser, in which a list is displayed of all the servers the program is connected to at that moment. The Databases container shows a list of databases located on the server. To create a new database, right click the Databases container and select «New Database». Figure 3. In the window that appears, you will need to set the name of the database being created, as shown in Figure 4. In this window you can also set the name of the database owner and the path of the database files, and configure the function to automatically increase the size of the database file. 63

Figure 4. On the «Options» tab, you will need to select the sort parameters. It is recommended that you use as a sort parameter SQL_Latin1_General_CP1_CL_AS, as shown in Figure 5. 64

Figure 5. Once you have set all the required parameters, click OK to start creating the database. If errors arise during the process of creating the database, the program will bring up a message with a detailed description. To fix any errors that arise, you must follow the directions given in these messages. If the database is created successfully, a new database icon will appear in the Databases container, as shown in Figure 6. The actions described above are completely sufficient for the SurfCop to operate normally with the new database, although you may set additional parameters if you wish. 65

Figure 6. The procedure for creating a new Microsoft SQL Server database is now complete. In case you cannot use Windows Authentication for some reason, you can enable integrated authorization of Microsoft SQL Server. To use integrated authorization of Microsoft SQL Server you simply enable the «SQL Server and Windows Authentication mode» option, as depicted in Figure 7. 66

Figure 7. Data Center Configuration Once the new database is created, Data Center should be set up in order to work with it. For this, you must open the program s management console, go to the «Configuration» page shown in Figure 8, and select «Data Storage Settings». 67

Figure 8. In the open window, select the database type (in this case, MS SQL). 68

Figure 9. On the second tab, specify the parameters for connecting to the database (Figure 10). To avoid the need to enter the connection string manually, the program has a special tool, to use which you simply click the button by the connection string field. 69

Figure 10. The dialog that opens, shown in Figure 11, allows you to select the type of OLE DB provider, through which the connection should be set up. Select Microsoft OLE DB Provider for SQL Server and click «Next». 70

Figure 11. On the second tab, you will need to enter the connection parameters, as shown in Figure 12, where, WIN2003 name of MS SQL server Activity name of database created earlier, to which the connection will be made Warning! To link to the database server, it is recommended that you use the Windows tools for authorization. If MS SQL tools are used for authorization, the login and password of a user with the necessary privileges to work with the database must be entered in the Username and Password fields, and the «Allow saving password» option must be enabled. Blank password means that a blank password is used to access the database (you can protect the database with a password if you wish; in this case, this option should be disabled). 71

Figure 12. To test whether the connection parameters are correct, click «Test Connection». Once you have pressed «Test Connection», the program will attempt to connect to the database, and if the connection settings have been specified correctly, the message shown in Figure 13 will appear. Next, click «OK». Figure 13. Once you have entered all the required parameters, a connection string will be generated automatically, as shown in Figure 14. The contents of the string may change, depending upon the information entered earlier. To test the connection string, click «Test Connection». 72

Figure 14. After you click «Test Connection», the program will attempt to connect to the database, and if the connection settings have been specified correctly, the message shown in Figure 15 will appear. Figure 15. When the connection testing is complete, click «OK». A message will appear notifying you that Data Center must be restarted for the new parameters to be applied (Figure 16). 73

Figure 16. Click «Yes», and Data Center will restart automatically. Once Data Center is restarted, all changes will take effect and the program will begin using the new database to store information. The status of the database can be viewed on the «Statistics» tab of the data storage management dialog (Figure 17). Figure 17. Conclusion: Microsoft SQL Server is a reliable and relatively straightforward DBMS. Microsoft SQL Server DBMS is recommended for use in medium and large-sized companies. 74

MySQL MySQL is a free database management system. It is characterized by high speed, stability, and ease of use. It is the ideal solution for small and medium-sized companies. Configuring MySQL Installation and configuration of the MySQL server should be carried out by the administrator themselves. All the operations described in this article to set up MySQL were carried out with the help of free web application phpmyadmin. Official phpmyadmin website: http://www.phpmyadmin.net/home_page/index.php Detailed instructions on how to install and configure this application can be found on the website. To start phpmyadmin, open your browser and enter the following address in the address bar: http://computer_name/tools/phpmyadmin/ where, computer_name is the name of the computer on which phpmyadmin is installed. In the browser window, the main page will load, shown in Figure 1. 75

Figure 1. First of all, you need to create a database. For this, you must choose a name for the database and enter it on the main page, select a method for the lines to be sorted and click Create. The database creation form is shown in Figure 2. Activity - name of database being created utf8_unicode_ci - method for sorting lines It is recommended that you choose a simple and intuitive name for the database, for example, «Activity». 76

Figure 2. On selecting Create a message will appear, notifying you that the database was created successfully. Figure 3. The next step is to create a database user and assign them the privilege to manage the database. To go to the edit users and privileges pages, you will need to return to the main page and select «Privileges». 77

Figure 4. On the page that opens, a list of existing users will appear (Figure 5). The properties of any of these users can be edited as you like, but we recommend you create a new user to manage the database you have just created. Creating a new user may increase the security of the database significantly, and also make accessing it simpler. On the page that is open, select the «Add a new user» link. Figure 5. On the form that follows, you must choose and enter a username, the IP address of the computer from which you will be connecting, and a password. 78

Figure 6. The following should be taken into account: Data Center and the MySQL server may be installed on different computers. In the Host field you must specify the IP address of the computer on which Data Center is installed. It is from this computer that connections to the MySQL server will be initialized. If the connection to the database will be made from a local computer, you may enter «localhost» in the Host field. If you need to allow access to the database to all users from a given computer, simply specify «Any user» as the «Username» value and give the IP address of the computer in the «Host» field. The user password may be left blank, but we strongly recommend for security reasons NOT to use a blank password. Besides completing the fields mentioned above, on this page you must select the privileges to be assigned to the user you are creating. We recommend you select all privileges by clicking «Check All». Once you have completed the form, click GO. 79

A message will appear, notifying you that the SQL request to create a user was completed successfully. Figure 7. Data Center Configuration Once the new database is created, Data Center should be set up in order to work with it. For this, you must open the program s management console, go to the «Configuration» page shown in Figure 8, and select «Data Storage Settings». Figure 8. In the window that opens, you will need to select a database type (in our case, MySQL). 80

Figure 9. On the second tab, you must specify the parameters for connecting to the database (Figure 10). 81

Figure 10. Here: 192.168.0.166 IP address of MySQL server 3306 port through which the connection will be made (3306 used by default) User1 name of the user created earlier with the help of phpmyadmin Password password of the user created earlier with the help of phpmyadmin Activity name of the database created earlier, to which the connection will be made To test that the parameters are correct, click «Test Connection». Once you click «Test Connection», the program will attempt to connect to the database, and if the connection settings have been specified correctly, the message shown in Figure 11 will appear. Figure 11. 82

Next, click «OK». A message will appear notifying you that Data Center must be restarted for the new parameters to be applied (Figure 12). Figure 12. Click «Yes», and Data Center will restart automatically. Once Data Center is restarted, all changes will take effect and the program will begin using the new database to store information. The status of the database can be viewed on the «Statistics» tab of the data storage management dialog (Figure 13). Conclusion: Figure 13. MySQL is the optimal solution for the majority of companies for a whole list of reasons: 83

it is free of charge. the server is very simple to set up. setting up the program to store information in the MySQL DBMS may significantly speed up the process of writing and accessing data, and also increase reliability. 84

PostgreSQL PostgreSQL is a free alternative to commercial DBMS (such as Oracle, MsSQL Server, IBM DB2, Informix and DBMS manufactured by Sybase), like other free DBMS (such as MySQL and Firebird). PostgreSQL is based on the SQL language and supports many of the capabilities of the SQL:2003 standard (ISO/IEC 9075). At this moment in time, PostgreSQL (version 8.4.0) has the following limitations: A maximum database size A maximum table size A maximum entry size A maximum field size A maximum number of entries in a table A maximum number of fields in a table A maximum number of indexes in a table no limitations 32 Tb 1,6 Tb 1 Gb no limitations 250 1600, relating to field types no limitations The strong points of PostgreSQL are considered to be: support for databases of practically unlimited size; powerful and reliable transaction and replication mechanisms; inheritance; simple expandability. Configuring PostgreSQL Installation of PostgreSQL is relatively straightforward simply download the distribution kit from the official website: http://www.postgresql.org/download/windows/ and launch the installation process. During the installation process, you will be required to enter the password of the database administrator (the user with login «postgres»). In cases where the database will be accessed from a remote machine, you will need to enable the remote connections in the DBMS settings. Step-by-step instructions are presented below: you will need to edit the file C:\Program Files\PostgreSQL\8.3\data\postgresql.conf, as shown in Figure 1, specifying as the value for the listen_addresses parameter the IP address from which the DBMS will listen and expect an incoming connection (By default, «*» is entered, meaning «All addresses». You may leave this value and not change anything if you wish). 85

Figure 1. Once you have edited the postgresql.conf file, save it under the same name. You will need to configure access permission from specific remote computers. For this, you will need to open the file C:\Program Files\PGSQL\8.3\data\pg_hba.conf in any text editor and find in it the following line: # Ipv4 local connections: In the list located below this line, add an entry corresponding with the range of IP addresses of the computers from which connections will be initialized. For example: host all all 192.168.0.7/32 md5 where, host signifies authorization at host level all signifies that access will be enabled to all databases for all users 192.168.0.7/32 range of IP addresses, from which a connection will be made (in the format IP/Mask) md5 defines the type of encryption for the information being transmitted An example of the contents of file pg_hba.confis shown in Figure 2. 86

Figure 2. Once you have edited and saved files postgresql.conf and pg_hba.conf you will need to restart the database server. To do this, simply restart the PostgreSQL Server service. Changes will be applied only once PostgreSQL is restarted. The next step is creating the database. To create a database, launch the PostgreSQL console (script C:\Program Files\PostgreSQL\8.3\scripts\runpsql.bat) and run the following command: CREATE DATABASE "Activity" WITH OWNER = postgres ENCODING = 'UTF8'; where, Activity - name of database being created postgres - name of database manager utf8 text encoding used to store data in the database. The result of the executed command is shown in Figure 3. 87

Figure 3. Data Center Configuration Once the new database is created, Data Center should be set up in order to work with it. For this, you must open the program s management console, go to the «Configuration» page shown in Figure 4, and select «Data Storage Settings». 88

Figure 4. In the dialog that opens, select a database type (in our case, PostgreSQL). 89

Figure 5. On the second tab, enter the connection parameters as shown in Figure 6, where, 192.168.0.166 -IP address of PostgreSQL 5432 - port through which the connection will be made (5432 used by default) User name - name of user with privileges to connect to the database (all necessary privileges assigned to user «postgres» earlier) Password - password for user «postgres», chosen on installation of PostgreSQL 90

Figure 6. To test whether the connection parameters have been entered correctly, click «Test Connection». After you press «Test Connection», the program will attempt to connect to the database, and if the connection settings were specified correctly, the message shown in Figure 7 will appear. Next, click «OK». Figure 7. A message will appear notifying you that Data Center must be restarted for the new parameters to be applied (Figure 8). 91

Figure 8. Click «Yes», and Data Center will restart automatically. Once Data Center is restarted, all changes will take effect and the program will begin using the new database to store information. The status of the database can be viewed on the «Statistics» tab of the data storage management dialog (Figure 9). Figure 9. Conclusion: PostgreSQL - is a freely-distributed object-relational database management system (ORDBMS), the most developed open-source DBMS in the world, and is a real alternative to commercial databases. PostgreSQL is considered the best for a number of reasons: 92

support for databases of practically unlimited size; powerful and reliable transaction and replication mechanisms; inheritance; simple expandability. 93

Oracle Oracle is a DBMS designed to be incorporated into corporate distributed data processing networks (Enterprise Grid). It allows you to reduce IT expenses thanks to automated management, the use of inexpensive modular components and clustered servers, with the aim of using resources as efficiently as possible. The Oracle architecture is designed to work with large volumes of data and huge teams of users; it demonstrates unrivalled capabilities to provide high reliability, efficiency, scalability, security and self-management. This DBMS can be implemented effectively on any platform, from small blade servers to large symmetrical multiprocessor servers and multisite clusters of any size. The Oracle DBMS is supplied in four different versions, designed for different working scenarios and deployment of applications (and also differing in price). Edition Rastriction OS Enterprise Edition Standard Edition Standard Edition One Personal Edition Lite Express Edition cannot be installed on systems with more than four processor sockets cannot be installed on systems with more than two processor sockets one user for mobile and built-in devices free version; physical working memory 1 Gb, maximum volume of user data 4 Gb Windows 32-bit Linux x86 Configuring Oracle Installation and configuration of the Oracle server should be carried out by the administrator themselves. All described operations were carried out in Oracle Database 10g Express Edition. Oracle Database 10g Express Edition can be downloaded from the official Oracle site: http://www.oracle.com/technology/software/products/database/xe/index.html During installation, you must enter the system administrator password (the user with login «system»). Immediately after installation, the program will launch the database homepage. On the authorization page, you must enter login «system» and the password chosen during installation, as shown in Figure 1. 94

On the page that is open, select «Administration» Figure 1. 95

On the page that is open, select «Database Users» Figure 2. 96

Figure 3. On the «Database Users» page, shown in Figure 4, a list of all existing users is displayed. To find a user by name, simply enter the name in the «Search Username» field and click «Go». You can adjust the view of the user list by using the View, Show and Display settings. View users displayed in icon or list view Show show all users, only database users, only external users Display maximum number of users displayed in the list To create a new user, click «Create>». 97

Figure 4. On the create new user page that opens, you must complete all fields, as specified in Figure 5. You will need to enter a name for the new user, a password, and confirm the password. Besides this, you will need to assign the user all the required privileges. To assign the user the required privileges, simply click «Check All» in the select privileges section. If the «Expire Password» option is set up, this user s password will have a time limit. Once the time limit has expired, the user will need to change their password. The «Account Status» option allows you to set the status of an account (blocked/unblocked). By using this option, you can temporarily disable unused accounts. Once you have entered all the required information, click «Create» to begin the user creation procedure. 98

Figure 5. On completion of the user creation procedure, the page shown in Figure 6 will open. If everything has been done correctly, and the user was created successfully, their name will appear in the list. 99

Figure 6. On the computer with Data Center, you will need to set up Oracle Database Instant Client. Oracle Database Instant Client can be downloaded here: http://www.oracle.com/technology/software/tech/oci/instantclient/htdocs/winsoft.html To provide access to the database, simply download the Instant Client Package - Basic Lite package. Once it has downloaded, unzip the contents of the package to any folder, for example C:\Oracle\InstantClient. Next, copy the file tnsnames.ora from the c:\oraclexe\app\oracle\product\10.2.0\server\network\admin\ folder of the computer where the Oracle database server is installed to the C:\Oracle\InstantClient folder of the client s computer. 100

Data Center Configuration Once the new database is created, Data Center should be set up in order to work with it. For this, you must open the program s management console, go to the «Configuration» page shown in Figure 7, and select «Data Storage Settings». Figure 7. In the window that opens, you will need to select a database type (in our case, Oracle). 101

Figure 8. On the second tab, you must specify the parameters for connecting to the database (Figure 9), where, 192.168.0.166 -IP address of Oracle server User name - name of user with privileges to connect to the database (all necessary privileges assigned to user «Activity» earlier) Password - password for user «Activity» C:\Oracle\InstantClient\ - Oracle Instant Client install directory 102

Figure 9. Once you have pressed «Test Connection» the program will attempt to connect to the database, and if the connection settings have been specified correctly, the message shown in Figure 10. Next, click «OK». Figure 10. A message will appear notifying you that Data Center must be restarted for the new parameters to be applied (Figure 11). 103

Figure 11. Click «Yes», and Data Center will restart automatically. Once Data Center is restarted, all changes will take effect and the program will begin using the new database to store information. The status of the database can be viewed on the «Statistics» tab of the data storage management dialog (Figure 12). Figure 12. Conclusion: Oracle is the largest professional DBMS with a multitude of options and settings. This DBMS is designed to be incorporated into corporate distributed data processing networks. The Oracle architecture is designed to work with large volumes of data. Due to its complex setup and high price, this DBMS is not recommended for use on smaller networks. 104

Alias Management Another new interesting feature in the program is the support of aliases. Aliases are used to convert information from one view to another. For example, the login of a user is converted into its full name with the help of the alias. The program is distributed with a ready set of aliases: There are two types of aliases: Converters Value lists 105

Converters Converters allow you to use small subroutines in the Pascal language to convert the source value into the one you need. To make sure your converter operates properly you should implement the feature called «Convert» that will get a source string on its input and should generate an output string converted in accordance with your idea. For example, figure above shows how you can get a group name the user belongs to from that user s login. 106

Value Lists Value lists are used in case you need to convert some values known beforehand into other values known beforehand. As can be seen from the example with the HTTP Status field, alias converts source value of 100 into 100 Continue, and value of 404 into 404 Not Found. The list of values allows you to combine several source values into one group. It is convenient if you have several different values meaning the same. In order to correctly interpret the source data, the value list has the Values type property that can take the following values: string the source data are interpreted as is wildcard the source value is interpreted as a string that may contain wildcards. It is possible to use the special characters * and? regular expression the source value is interpreted as a string that may contain Perl-style regular expressions 107

custom function the source value is interpreted as an expression in the Pascal language that should return True. This expression may contain the predefined variable Source initialized by the source value that is converted by this alias. Also, any functions that you define in the global module can be used in this expression. Example: Alias implementation area is determined by the field it is used for. For example, the «Categories» alias is used for all values of the «Web Site Category» field. It means that this parameter is used to specify the values that will be passed on to the alias input. Every alias can be linked to its parent alias that can be linked to another alias in its turn. In case there is a link to the parent alias, the source value will be passed to the parent alias first and the result of this conversion will be passed to the initial alias as the input value. 108

License Management Any actions regarding license management of the program such as activation or management of licensed object list are performed with the use of the license management wizard that can be accessed in the «Data Center/Configuration» section. Licensing Schema Network sessions are subjects to licensing. Network session is a set of connections established from one client computer. And it does not matter how many applications establish Internet connections - all of them will be considered as one network session. Thus, a license is required for every network session. If the maximum number of licensed objects is exceeded, a new session will be blocked and the user will see the corresponding error message. It is possible to select the identification method for licensed objects. The following methods are supported: Client Username + Client Host Name Client Username + Client MAC Address Client Username + Client IP Address Depending on the company's policy, it is possible to select any of the above identification methods. 109

Licenses are assigned on the Data Center level. The number of agents sending information to the Data Center is not limited. If there is an additional Data Center installed in the network, it requires a separate license. 110

License Activation To activate the software you need the internet connection on the computer, on which the management console runs. Activation is a simple process during which the program connects to the activation server with the activation key and registers the program copy. In return, the activation server sends the registration key, which is stored on the local disk as a file. 111

Please specify valid email address. This email address will be used for important notifications only: free updates period completion, new product releases, etc. Generally, the activation is performed automatically without crashes. However, if connection fails during the activation, the program suggests manual activation. Click on the special «Activation» link to activate manually. 112

After that the program starts your Web browser and redirects it to the special page of the activation server. Finally, you will see the registration key in the browser window. Copy this key to the clipboard, go back to the program, paste it to the proper field of the dialog window and click Next. 113

Licensed Objects The list of licensed objects is filled automatically during the working process. The size of the list is regulated by the license capacity. When this capacity is exceeded, the objects are placed into the list of non-licensed objects. Attention! If you have made changes in the objects list and the license capacity is still not exceeded, then the new objects will be automatically added to the list on the next report building. Licensing Restrictions If the user is not on the list of licensed objects, the user s session will be blocked Unregistered version does not allow to export reports Unregistered version does not allow to print reports Unregistered version does not allow to send reports with task scheduler 114

Urls Database SurfCop features the in-built database containing multiple URLs for different sites. Each site in the database belongs to one or several categories. The program allows you to create rules and generate reports based on the categories a certain site belongs to. For instance, the program makes it possible for you to deny or restrict user access to all dating websites or social networking sites. Besides, you can create the report about all users that have recently visited job opening sites. Due to the large number of predefined categories and the possibility to create custom categories the program provides you with almost unlimited capabilities for controlling and monitoring content that your users browse. In the "Urls Database" page you can perform the following tasks with the URLs database: Define Categories - edit the list of predefined categories or create a custom category list. Resolve Web Site Category - specify the categories a certain site will belong to. Modify Urls Database - set categories for sites. 115

Monitoring SurfCop offers great capabilities for activity monitoring and statistics: Summaries allow you to view summaries in regards to different aspects. Activity Monitor makes it possible to view active and recently finished user sessions in real time. It also lets you display a detailed history of the last 2000 requests. Quota Monitor shows quota rule list and counter list created by these rules. Reports gives you unlimited capabilities for analyzing network activity of you company s employees. Allows generation of lots of predefined reports as well as creation of custom reports with any degree of complexity. 116

Reports Reports are the distinctive characteristic of the Red Line Software products. All company s products are supplied with powerful report generators that allow to analyze the activity in one or another cut set. Report Generation Report generation has three steps: Preparing a report generation request (Console) Report generation (Data Center) Report viewing (Console) The report preparation step includes specifying report options, making up filtering rules for elements that are to be included into the set, selecting the range of report dates, etc.. To start preparing a new report select «Generate a New Report». 117

Welcome page. Selecting the data storage and schema. 118

Selecting the report type: Comparison reports (Vertical, Sections) displays information grouped in different sections. Report can be one-level or multilevel. Comparison reports (Horizontal, Columns) displays information grouped in columns. Allows you to create plane reports that present information in the form of columns. 119

Optional filter of entries which should be included into the final set. Report options: Report Style single-level or multi-level Percentage Column the column used for percentage calculation 120

Sort column the column used for data sorting Report section options. A report consists of one or more sections. Each section can be configured individually. If it hasn't been configured, the above-stated options will be used. Show in section what to show in section: elements, charts or both. Apply aliases to section items Apply or not apply aliases to items in the specified section. Maximum items number the maximum number of items to be shown in section. Filter1, Filter2 optional filters which can be used to exclude the elements, meeting certain conditions, from the generated report. Unlike the page with optional filters (see above), here the final and already grouped data is analyzed and filtered. 121

Report sections. Here you can make a list of sections, which should be included in the report, their order and optional settings for each section. You can override the default values for each section: the chart properties, aliases etc. 122

Columns included in the report. Here you can adjust width, positions and visibility of columns. To make it easier you may use a special visual editor which allows to adjust the columns using the mouse: Simply adjust width, positions and visibility and click OK. Report building dates range. 123

Report name and optional description. These settings are important if you plan to add the created report to the report repository for further use. 124

Final step. After clicking on Finish button the console sends a request to generate a report for the Data Center. 125

Report Sections When the process of report generation is performed SurfCop allows you to add different types of sections. The list given below describes each section: Application displays application name that is used for access. Application Protocol displays application protocol name that is used for access (e.g. HTTP, HTTPS, FTP, etc.). Array Server displays array server through which access is gained. Client Auth Schema displays the name of client authentication scheme. Client Host Name displays host name used for access. For the clients connecting from the external network this field will contain IP address. Client IP displays IP address of the computer used for access. Client MAC displays MAC address of the computer used for access. For the clients connecting from the external network this field will contain IP address. Client Network displays network name from which connection was made (internal, external, local host, etc.). Client Operating System displays operating system name used for access. Available for web traffic only. Client Port displays port used for access. Client Type displays client type name (Web Proxy, Firewall or SecureNAT). Client Username displays client user name that tried to get access. Client Workgroups displays name of workgroup accessing user belongs to. Data Source display source name that provides the information for report generation. Data Storage displays data storage name. Date displays date of access. Day of Week displays day of the week on which access was gained. Destination IP displays destination server IP address to which the connection was made. Destination Network displays destination network name to which the connection was made. Destination Port displays the port on which the connection was made. Direction displays traffic direction (inbound or outbound). Error Code displays error code. If connection was established without errors this field contains «OK». Hour displays time of the connection (hour). HTTP Status displays status value returned by a remote host. Available for web traffic only. MIME Type displays content data type (text, image, application, etc.). Available for web traffic only. Month displays month when connection was made. Object Source displays object source name. Object can be retrieved from internal cache of ISA Server or from Internet for example. Policy Check Result displays policy check results. If access was granted this field will contain «Access Allowed», otherwise it will contain «Access Denied». Policy Rule displays name of policy rule that allowed or denied the access. Service displays ISA Server service used for access (Firewall or Web Proxy). Transport Protocol displays transport protocol name used for access (for instance, TCP or UDP). Web Listener displays web listener name used to access published site. Web Site Category displays category name visited site belongs to. Web Site Country displays country name visited site located in. 126

Web Site Keywords displays phrases list used for search through the search engine (Google, Yahoo, Yandex, etc.) Web Site Name displays browsed web site name. Web Site Referrer displays reference to the web page from which browsed web page was visited. Web Site Request displays request for web site. Usually this request includes page name of the site that was visited. Web Site Title displays web site title, which is presented at the top of web browser. Year displays year of access. 127

Repository Repository is designed to store frequently used reports. Repository is a common folder with free structure of subfolders, which contain files with reports settings. The report can be relocated, renamed, edited or generated any time. To make file and folder migration easier, Drug'n'Drop feature is suported. 128

Report Generator Task Bar Generate a New Report activates a new report wizard Generate a Predefined Report activates the report repository. After one or more reports have been selected they are sent to generation. Print Report activates a report print preparation dialog. This feature is available only in the registered version. Email Report activates a report email preparation dialog. This feature is available only in the registered version. Export Report activates a dialog of saving the report on the disk. This feature is available only in the registered version. Edit Report Settings activates a report settings editing dialog. After clicking OK the report with edited settings is sent to generation again Save Report Settings activates a dialog of selecting the existing report the settings of which are to be replaced with the settings of the current report. Save Report Settings As activates a dialog of selecting a new report name and its location in the report repository. After that the report is saved to the repository. Toggle Report Style toggles the report style from Single Level to Multi Level. When clicking on the button the program sends a request to the Data Center to generate one more report with edited settings. 129

Find Text activates a dialog of searching the substring in the report text. Show/Hide Charts shows/hides the charts. Configure Settings activates a report generator appearance configuring dialog. Manage Scheduled Tasks activates a scheduled tasks list managing dialog. 130

Task Manager Any report stored in the report repository may be used for automatic scheduled generation. Each scheduled task can build reports with unlimited number of templates. Each report can be sent by email, printed or saved into a folder on the disk or in LAN (e. g. on SharePoint server). 131

To start creating a scheduled task click on Add button. The reports are selected from the report repository which will be used as generation templates. Multiselect is supported. 132

Specify delivery ways. Three ways are currently supported: Send by email Save into a folder Save into a folder The delivery ways can be combined. If you select «Send by Email» you can also configure email message settings: message subject and body. In both fields you can use different macro objects which are replaced with real values on execution of the scheduled task. 133

Configure delivery settings. You can configure the identical settings for several simultaneously selected reports at a time. Each delivery way has its individual settings. Moreover, these settings are individual for every report template. 134

Report file name template a template used to form a report file name when saving it on the disk. It can be either a common string, e. g. «somefile.doc», or a combination of one or more macro objects which will be replaced with real values during the report generation. Possible values: o %REPORTNAME% - report name o %TASKNAME% - scheduled task name o %DATE% - report generation date o %UNIQUEID% - unique number o %DATEFROM% - beginning of the report generation dates range o %DATEFROM(mm/dd/yyyy hh/mm)% - beginning of the report generation dates range adjusted to the specified format o %DATETO% - end of the report generation dates range o %DATETO(mm/dd/yyyy hh/mm)% - end of the report generation dates range adjusted to the specified format Report format the format in which the report will be built Pack report into a zip archive the indicator showing that the report should be packed into the zip archive before sending. 135

If «Send by Email» is selected as the delivery way you should specify message recipients. Warning! The message will be sent from the computer where the Data Center is installed. Correspondingly, you should properly configure the settings of SMTP server which will be used for message delivery, so that the message could be delivered successfully. 136

If «Save into a Folder» is selected as the delivery way you should specify the name of existing folder into which the file will be saved. If the specified folder is networked you should specify the properties of the user account which will be used for access to the network resource. If you specify incorrect properties, saving to the network folder will finish with an error. Saving is made from computer on which the Data Center is installed. 137

If «Send to a Printer» is selected as the delivery way you should specify the printer name (on computer where the Data Center is installed) and paper layout. If the specified printer is a network accessible one, you should specify the properties of the user account which will be used for access to the network printer. If you specify incorrect properties, printing to the network printer will finish with an error. Printing is made from computer on which the Data Center is installed. 138

Specify the dates range for scheduled reports. The ranges are relative (to the task execution date) and are calculated upon executing the scheduled task. You can also specify the fixed absolute dates range. Configure task schedule. 139

Configure task repetition. Specify name and optional description of scheduled task. 140

The final step of creating the scheduled task. After the task has been created, it will start executing in the scheduled time. During task execution the reports will be built by the specified templates within the specified dates range, and the result will be delivered in the specified way to the specified addresses. 141

Summaries Summaries represent a set of simple graphical reports that make it possible to get general statistic picture of your organization in matter of seconds. The current version of SurfCop offers the following Summaries: Users traffic distribution on a per-user basis. Computers traffic distribution on a per-computer basis. IP Addresses traffic distribution on a per-ip address basis. Protocols traffic distribution on a per-protocol basis. Sites traffic distribution per visited web sites. Browsers traffic distribution per web browsers used in organization. OSs traffic distribution per OSs used in organization. Agents traffic distribution per applications used in organization for the Internet access. HTTP Responses traffic distribution per HTTP codes, returned by web servers. Cache Performance shows traffic ratio retrieved from cache and the Internet. Daily Traffic traffic distribution on a per-time-of-day basis. Connections distribution of the number of simultaneous connections to Microsoft ISA Server based on time of day. Processing Time distribution of average request processing time based on time of day. Summaries have the following settings: 142

Traffic Type allows you to specify traffic type presented in summary. Here you have the following options: o Web Traffic only web traffic will be displayed in summaries. o non-web summaries will present not only web traffic. o Both both traffic types will be presented in summaries. Traffic Direction enables specifying traffic direction that will be presented in the summary. Here you have the following options: o Incoming inbound traffic only. This is the traffic generated by the external users who visit resources internally published in the office (corporate web sites, internal mail servers, OWA sites, etc.). o Outgoing outbound traffic only. This is the traffic generated by the internal users who visit any external resources (different web sites, external mail servers, etc.). o Both both directions of traffic. Interval time interval the statistic data should be taken from. Here you have the following options: o One day o One week o One month Summaries have the following appearance settings: Size Units this group of settings defines the way traffic information will be presented. Summaries Size number of items presented in summary table. 143

Summaries list of summaries that will be displayed on the page. At list one summary should be selected from the list. Each summary has its own chart display settings. To configure these settings you simply double-click the chart. The following dialog box will open: 144

Chart type allows selecting chart type Max items number allows specifying maximum number of items presented in the chart Palette allows you to select color palette for the chart 3-D chart if you have this option enabled, 3D charts will be displayed Show legend box if this option is checked, you will see legend box next to the chart For the «Vertical Bar Chart» and «Horizontal Bar Chart» types you have following options at the bottom of the «Chart Customization» window: Multi color chart chart colors will depend on the color palette you ve chosen Single color chart you can select chart color Use semi-transparent colors For the «Pie Chart» type you have the following options at the bottom of the «Chart Customization» window: Radius pie chart radius Labels layout allows you to place labels around the chart or next to it Show labels join line if this option is checked, labels will be joined to the corresponding parts of the chart by lines 145

Quota Monitor Quota monitor is designed to view, analyze and edit current quota counter readings. Quota monitor is a table with two tabs: Traffic Counters and Time Counters. Each tab displays currently existing counters grouped by quota rules that created them. The table contains user names that have counters created for them, current counter data, percent of quota used, and the amount of quota left. For time counters besides the time spent by the user on the Internet the table displays web sites that the user has visited within this time. If the number of users in your organization is large the table will show great number of counters as well. To decrease this number you can use the feature of counter filtering. For this purpose you should use the «Edit Filter» option. 146

Basic SurfCop dialog box makes it possible to create counter list filtering conditions. To disable filter you simply press «Clear», and then OK. Quota monitor has following appearance settings: 147

Size Units set of parameters that define the way traffic information will be presented. Expand nodes after refresh if this checkbox is checked, counter tree will expand all of its nodes each time it is refreshed. 148

Client Details list of attributes that will be displayed in the counter list within the «User» column. Besides the abovementioned appearance settings you can configure visibility of columns in the counter list. To do so you just need to right-click anywhere in the list title area and choose the «Add/Remove Columns» command from the context menu. 149

Quota monitor allows you to perform following operations with counters: Clear All Counters all current counters will be reset. All blocked users will immediately get access to the resources that have previously been blocked. Clear Selected Counter resets a selected counter only. If a user has been blocked due to exceeding of quota he or she will immediately get access. Edit Selected Counter allows editing the data of the selected counter. Depending on counter type this dialog box can differ, but its major function remains the same increase or decrease counter data. Export Counters exporting of counter list to an XML file 150

Activity Monitor Activity monitor is used to perform monitoring over the users Internet activity. By now activity monitor contains three tabs: Active Sessions. This tab shows all sessions that are active at present time. Recently Finished Sessions. This tab contains the list of sessions that have finished within the previous minute. History. This tab contains a detailed log about last 2000 requests. How It Works When a user generates new request it is immediately recorded into the Active Sessions list. When the request is over it is moved to the Recently Finished Sessions list. The session is retained in this list for one minute, and right after that is moved to History. History stores last 2000 sessions. All the entries above that limit are deleted from the activity monitor. When it happens, the only available option for data analysis you have is reports. If the number of employees in your organization is huge, the table will display great number of sessions respectively. To decrease this number, you might want to use session filtering feature. To do so you just need to use «Edit Filter». 151

Basic SurfCop dialog box makes it possible to create session list filtering conditions. To disable filter you simply press «Clear», and then OK. Warning! Filters of these three monitors are independent so you will have to create separate filter list for each monitor. Activity monitors have the following appearance settings: 152

Size Units set of parameters that define the way traffic information will be presented. Expand nodes after refresh if this checkbox is checked, session tree will expand all of its nodes each time it is refreshed. 153

Show icons this checkbox is responsible for enabling and disabling icon display feature in the session list. Enable coloring this checkbox is responsible for enabling and disabling the feature that highlights allowed and denied sessions with different colors. Besides the abovementioned appearance settings you can configure visibility of columns in the session list. To do so you just need to right-click anywhere in the list title area and choose the «Add/Remove Columns» command from the context menu. 154

Warning! Filters of these three monitors are independent so you will have to create separate filter list for each monitor. Configuring Activity Monitor Layout Activity monitor is a tree that can contain several nesting levels and several columns, which show different parameters of sessions. Each level can contain a group of unlimited number of parameters. Number of monitor levels is also unlimited. Each session is characterized by a large number of parameters. And here one administrator may be interested in one type of parameters, while the other is interested in the other parameters. This is why the mechanism of activity monitor layout configuration was added to the program that allows configuring monitor in accordance with the administrator s needs. Layout configuration wizard is a dialog box that allows you to configure the number of levels and select those session parameters, which will be shown on each level. 155

To add a new level you simply click the «Add Level» button. Doing so will open a dialog box, where the entire set of existing session parameters will be shown. You can check one or more parameters, and change the order, in which they will be displayed, using Up and Down buttons. When you click ОК the new level is created. The levels can be moved up or down against each other, edited or deleted. To clear the configuration completely, you simply use the «Delete All» button. Some examples of layouts are given below: This layout allows you to perform monitoring in regards to protocols, site names and users. 156

This layout lets you monitor site titles users are currently browsing. This layout should be used with session filtering feature. 157

Useful Information Each activity monitor highlights the entries with different colors. Requests that were successfully processed are displayed in green. Requests that were finished with some errors are displayed in red. Active Sessions monitor has an additional option Kill session. This option lets you immediately finish user session. This command can be applied to several sessions simultaneously. Each monitor has its own settings for filtering, appearance and layout configuration. To export session list to an XML file you can use «Export Sessions» option. 158

Bandwidth Monitor Bandwidth monitor is used for analysis and current speed counter data. Bandwidth monitor is a table that contains currently existing counters grouped by bandwidth rules that created them. The table contains user names that have counters created for them, as well as charts depicting inbound and outbound bandwidth consumption. If the number of users in your organization is large the table will show great number of counters as well. To decrease this number you can use the feature of counter filtering. For this purpose you should use the «Edit Filter» option. 159

Basic SurfCop dialog box makes it possible to create counter list filtering conditions. To disable filter you simply press «Clear», and then OK. Bandwidth monitor has the following appearance settings: 160

Size Units set of parameters that define the way speed information will be displayed. Expand nodes after refresh if this checkbox is enabled, counter tree will expand all of its nodes each time it is refreshed. 161

Client Details list of attributes that will be displayed in the counter list within the «User» column. Besides the abovementioned appearance settings you can configure visibility of columns in the counter list. To do so you just need to right-click anywhere in the list title area and choose the «Add/Remove Columns» command from the context menu. 162

Bandwidth monitor allows you to perform following tasks with the counters: Clear All Counters all current counters will be reset. Delete Selected Counter this action deletes selected counter. Export Counters allows exporting counter list to an XML file. 163

Troubleshooting The program has a special built-in tool for detecting errors occurring in each of the application modules and also for all kinds of information messages Event Viewer. If an error occurs in the management console, you should check Event Viewer in the first place and find out the type of the occurred error, its code and message text. It allows you to quickly solve the problem in most cases. Actually, this tool similar to the standard Windows Event Viewer, except that all events shown here are related only to SurfCop. You can see the following information in the table: Event type, date and time (error, warning or information) Category 164

Event source: data center, agent or console The computer name where the event occurred Message text You can configure the way events are logged. Use the following dialog box for that: There are 4 logging modes available: Do not log anything Log all events immediately after they occur Log unique events only. An event is not considered unique if there is an event with the same properties, but it occurred at a different time. Therefore, if you delete all events, new events will start appearing as they occur. Log subsequent duplicate events only if number of minutes since last occurrence is more than the specified value. This mode is recommended and allows you to protect the event log against an overflow. After you select the logging mode, the changes will be applied to all application modules: agents, console and data center. 165