2

BASIC CONFIGURATION

Basic Service Settings

Configure Subnets

Configuring subnets helps to reduce or balance the load on your Web Filter server(s), enabling it to work more efficiently. Use the Subnets tab to configure subnets:

Figure 2-1 Subnets tab

The Subnets tab has two sections:

Subnet Monitoring – These settings help reduce or balance the load on your Web Filter server.

Ignore Subnets – These settings show the internal subnets that were detected when you ran the Configuration Wizard. These subnets are not monitored.

Subnet Monitoring

The Subnet Monitoring section is used to identify which parts of your network should be monitored or not by each Web Filter server. How you decide on this, depends on whether you have single or multiple Web Filter servers, and how you want to divide the network volume load of traffic between those servers. To configure your subnets on a single Web Filter server:

1Identify the external traffic subnets you do not want to monitor.

2Click the Subnets tab, and click Add.

3Enter the IP address of the subnet in the IP Address text box.

4Enter the subnet mask in the Mask text box.

5Click OK.

6Repeat steps 1 to 5 for other subnets you do not want to monitor.

7Select Do not Monitor traffic to or from these subnets.

6

Administrator’s Guide

SurfControl Web Filter v5.5

Page 13
Image 13
Surf Control 5.5 manual Configure Subnets, Subnet Monitoring, Select Do not Monitor traffic to or from these subnets

5.5 specifications

Surf Control 5.5 is a robust web filtering and security software designed for organizations seeking comprehensive internet safety and enhanced productivity. With the increasing reliance on the internet for business operations, it becomes imperative to utilize tools that not only ensure secure browsing but also improve workplace efficiency. Surf Control 5.5 offers a range of features that cater to these needs effectively.

One of the standout features of Surf Control 5.5 is its powerful web filtering capabilities. The software employs a robust categorization system that classifies websites into various categories such as social media, gambling, adult content, and more. This allows administrators to set policies that restrict access to non-work-related sites, leading to improved employee focus and reduced distractions during work hours.

Another significant characteristic of Surf Control 5.5 is its customizable policy management. Administrators have the flexibility to create specific access rules based on user roles, departments, or individual needs. This granular control ensures that employees can access the resources they need while maintaining an overall secure browsing environment.

Surf Control 5.5 leverages advanced technologies like real-time content analysis and URL filtering to provide instant protection against harmful websites. By analyzing web traffic in real-time, the software can block access to sites that are deemed unsafe or inappropriate, thus minimizing the risk of malware infections and data breaches.

In addition to web filtering, Surf Control 5.5 includes robust reporting and monitoring tools. These features allow administrators to track website usage patterns, identify potential security threats, and generate reports to analyze internet activities across the organization. This data is invaluable for making informed decisions regarding internet usage and policy adjustments.

Moreover, Surf Control 5.5 is designed with user-friendliness in mind. Its intuitive interface facilitates easy setup and management, enabling IT personnel to implement and oversee policies without extensive training. This ease of use, combined with its powerful features, makes Surf Control 5.5 an ideal choice for organizations of various sizes.

In conclusion, Surf Control 5.5 is an essential tool for businesses looking to enhance their internet security and workplace efficiency. With its advanced web filtering, customizable policy management, real-time protection, and comprehensive reporting features, it offers a holistic approach to internet safety in the modern workplace. Organizations leveraging this software can expect to see a significant improvement in productivity and a reduction in exposure to online risks.