Quick Installation Guide
Quick Installation Guide
Learn how to quickly set up GFI WebMonitor for trial.
The information and content in this document is provided for informational purposes only and is provided "as is"
with no warranties of any kind, either express or implied, including without limitation any warranties of
merchantability, fitness for a particular purpose, and non-infringement. GFI Software disclaims and in no event shall
be liable for any losses or damages of any kind, including any consequential or incidental damages in connection
with the furnishing, performance or use of this document. The information is obtained from publicly available
sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no
warranty, promise or guarantee about the completeness, accuracy, recency or adequacy of information contained in
this document and is not responsible for misprints, out-of-date information, or errors. GFI reserves the right to revise or
update its products, software or documentation without notice. You must take full responsibility for your use and
application of any GFI product or service. No part of this documentation may be reproduced in any form by any
means without prior written authorization of GFI Software.
If you believe there are any factual errors in this document, please contact us and we will review your concerns as
soon as practical.
GFI and GFI WebMonitor are trademarks or registered trademarks of GFI Software or its affiliates in the US and other
countries. Any other trademarks contained herein are the property of their respective owners.
GFI WebMonitor is copyright of GFI Software Ltd. - 1999-2016 GFI Software Ltd. All rights reserved.
Document Version: 3.2.0
Last updated (month/day/year): 02/25/2016
Contents
1 Quick Installation Guide
4
2 Installation
6
2.1 System requirements
2.2 System Prerequisites
2.3 Installing GFI WebMonitor in Simple Proxy Mode
2.4 Using the Post-installation Configuration Wizard
2.5 Configure browser proxy settings on GFI WebMonitor machine
2.6 Verify that GFI WebMonitor is working correctly
2.7 Proxy Settings
2.8 Enabling GFI WebMonitor with fixed proxy settings
3 Configuring GFI WebMonitor for Trial
3.1 Pre-configured Policies
3.2 Authentication
3.3 Filtering file downloads
3.4 Security scanning policies
3.5 Application control
3.6 Monitoring and filtering Internet browsing
3.7 Configuring Exceptions
4 Using GFI WebMonitor
4.1 Using the Dashboards
4.2 Interactive Reporting
6
7
8
8
9
11
12
13
16
16
16
18
18
19
19
19
21
21
21
5 Support
23
6 About GFI
24
1 Quick Installation Guide
Welcome to GFI WebMonitor- a solution designed to give you complete and real time control over user Internet
browsing, ensuring that downloaded files or visited websites are free from viruses, malware or other security threats.
GFI WebMonitor gives you full visibility into user online activity, enabling you to discover how much bandwidth they are
consuming and what websites they have been browsing and for how long.
This document helps you install your trial version of GFI WebMonitor. It is aimed to get you started with your trial so that
you can test the software - but if you require more advanced information, you can download the full manual from our
website.
To keep your life simple during the trial, we recommend you trial the software on a machine configured as a standalone
proxy in a test environment. This ensures no issues are created on your live environment.
Screenshot 1: GFI WebMonitor in simple proxy mode
IMPORTANT
Before you begin, ensure that:
Your test environment has unrestricted Internet access
You can route user traffic through your test server – without any real user traffic, you would not be able to appre
ciate the benefits of GFI WebMonitor.
We will take you through the whole GFI WebMonitor trial setup including:
1. System requirements
2. System installation
3. Post-installation tasks
4. Client side configuration
GFI WebMonitor
1 Quick Installation Guide | 4
If at any time you require any help, please contact our support team.
GFI WebMonitor
1 Quick Installation Guide | 5
2 Installation
Installing GFI WebMonitor is a two-step process:
1. Run the GFI WebMonitor installer to deploy GFI WebMonitor and missing pre-requisites.
2. Follow the GFI WebMonitor configuration wizard to set up GFI WebMonitor and its operating environment.
2.1 System requirements
2.1.1 Software
TYPE
SOFTWARE REQUIREMENTS (x86 and x64)
Supported Operating Sys
tems
Windows® Server 2003 or later
Windows® 7 or later
Gateway and Simple Proxy
Modes - Other server side
required components
Microsoft.NET ® Framework 4.0
IIS ® Express
SQL Server ® Express 2005 or later
SQL Server ® 2005 or later (for reporting purposes)
Gateway Mode - Other
required components
Routing and Remote Access configuration on Windows® Server 2003/2008
GFI WebMonitor Agent
Windows® Vista SP2 or later
Supported Internet browsers
Server side (for the main product console):
Microsoft Internet Explorer 10 or later
Microsoft Edge
Google Chrome (v36 or later)
Mozilla Firefox (v31 or later)
Client side:
Microsoft Internet Explorer 8 or later
Microsoft Edge
Google Chrome (v36 or later)
Safari
Mozilla Firefox v. 31 or later
Note
Any client browser is supported for the main product functions, including mobile browsers, and
other versions of the supported browsers; however in order to display block / warn messages
properly, one of the above browsers is required.
NOTE
The installation wizard checks that Microsoft .NET ® 4.0, Report Viewer, Windows® Image Component, .net Hotfix,
Microsoft® Visual C++ Redistributable and IIS® Express are installed. If not installed the wizard will guide you through
the installation automatically.
2.1.2 Hardware
x86 ARCHITECTURES
MINIMUM HARDWARE REQUIREMENTS
Processor
2.0 GHz processor
GFI WebMonitor
2 Installation | 6
x86 ARCHITECTURES
MINIMUM HARDWARE REQUIREMENTS
Memory
4 GB RAM
Physical storage
12 GB of available disk space
x64 ARCHITECTURES
MINIMUM HARDWARE REQUIREMENTS
Processor
2.0 GHz (multi-core recommended)
Memory
8 GB
Physical storage
12 GB of available disk space.
NOTE
Allocation of hard disk space depends on your environment. The size specified in the requirements is the minimum
required to install and use GFI WebMonitor. The recommended size is between 150 and 250GB.
Other Hardware
COMPONENT
HARDWARE REQUIREMENTS
Network card
Router
2 network interface cards when installing in Gateway Mode
1 network interface card required when installing in Simple Proxy Mode.
A Router\gateway that supports traffic forwarding or port blocking when installing in Simple Proxy Mode.
2.1.3 Listening ports
PRODUCT
PORT
GFI WebMonitor Gateway and Simply Proxy
Mode
Listening Port (Default 8080)
GFI WebMonitor Agent
Listening Port (Default 5996) - this port will accept transfer of data from the agent to
the server
GFI WebMonitor Management Console
Listening Port (Default 1007)
GFI WebMonitor Transparent Proxy
Listening Port (Default 8082)
2.2 System Prerequisites
Before installing GFI WebMonitor on your test proxy server, ensure that:
The machine you are using has unrestricted Internet access
The listening port (default = 8080) is not blocked by your firewall. Follow the link to find more information on how
to enable firewall ports on Microsoft Windows Firewall.
You have administrative privileges on the test machine.
NOTE
GFI WebMonitor starts a number of filtering and monitoring engines soon after the installation. This is quite a heavy
operation that can affect performance and cause high CPU usage.
It is advisable that if this server is being used for other services, installation is done during an off-peak period. GFI
WebMonitor also performs a large volume of updates after installation - we suggest you install GFI WebMonitor and leave
it overnight to download its updates.
GFI WebMonitor
2 Installation | 7
2.3 Installing GFI WebMonitor in Simple Proxy Mode
Installing GFI WebMonitor is easy. The steps below guide you through the process.
Run the installer as a user with administrative privileges on the target machine.
1. Double click the GFI WebMonitor executable file.
2. Ensure you have no Windows programs running and click Next .
3. The installer checks if required components are installed, and automatically installs missing components.
4. Choose whether you want the installation wizard to search for a newer build of GFI WebMonitor on the GFI website
and click Next .
5. Read the licensing agreement. To proceed with the installation select I accept the terms in the license agreement
and click Next .
6. Key in the user name or IP address of users that need administrative access to the GFI WebMonitor web interface and
click Next . Access can be managed later on from Settings > Advanced Settings > UI Access Control.
NOTE
Enter only users that need access to configure GFI WebMonitor. Do not enter IPs of normal users that will be proxied
through GFI WebMonitor. More than one user or machine can be specified by separating entries with semicolons ‘;’
7. Specify the Installation Folder where GFI WebMonitor will be installed. The default path is C:\Program
Files\GFI\WebMonitor\. Click Next .
8. Click Install to start the installation, and wait for the installation to complete.
9. Click Finish to finalize setup.
10. After the installation, GFI WebMonitor Configuration Wizard is launched automatically.
NOTE
After installing GFI WebMonitor, you can manually launch the Configuration Wizard from the settings menu at any
time.
11. Click Get Started to configure GFI WebMonitor for first use.
12. Follow the Configuration Wizard to configure the server in Simple Proxy mode.
NOTE
Expect a temporary decline in performance and high CPU usage while all GFI WebMonitor engines are started and
updated. This might take a few minutes and the computer might feel sluggish until this operation is completed.
Allow the CPU usage to come back to normal before continuing, to ensure a smooth usage experience.
Also ensure that all GFI WebMonitor services have started successfully in the Services panel (Administrative Tools >
Services > Scroll to GFI). If any services have not started, start them manually before you proceed to the next phase.
2.4 Using the Post-installation Configuration Wizard
After performing the installation, use the Configuration Wizard to configure GFI WebMonitor for first use. In the welcome
screen, click Get started. The wizard guides trough the following steps:
GFI WebMonitor
2 Installation | 8
OPTION
DESCRIPTION
Configure con
nection set
tings
Choose your Network Mode depending on your current network setup. Establish a connection between your
internal network and the Internet through the GFI WebMonitor server.
Enable Trans
parent Proxy
Enable Transparent Proxy to monitor and control HTTP and HTTPS traffic transparently. When a user makes a
request to a web server, the Transparent Proxy intercepts the request to deliver the requested content. When GFI
WebMonitor is deployed in this mode, you do not need to set client browser settings to point to a specific proxy.
IMPORTANT
Ensure that GFI WebMonitor is running in Gateway mode. Transparent Proxy cannot work in Simple Proxy
mode.
Enter your
License key
Key in a valid license to use GFI WebMonitor. This can either be a trial license or a regular license key obtained on
renewal.
Configure
HTTPS Scan
ning
Configure HTTPS scanning to monitor and block encrypted traffic.
Set up the
Database
Configure the database to use with GFI WebMonitor where collected data is stored. Use the Firebird database
only during the evaluation period. It is highly recommended to switch to a Microsoft SQL Server based database
for live systems.
Define Admin
Credentials
Key in the admin credentials required by the GFI WebMonitor services to control internal security engines, man
age updates, send notifications and control data displayed in the User Interface. The GFI WebMonitor services are
Windows services installed automatically during installation and require administrative privileges to operate.
Setup Email
notification set
tings
Provide the email addresses required by GFI WebMonitor to send messages containing information related to
tasks such as auto-updates and licensing issues.
Configuring
Internet
Browsers to
use a Proxy
Server
If you have not configured WPAD or Transparent Proxy, ensure that proxy settings of client machines are con
figured to use GFI WebMonitor as the default proxy. This ensures that Internet traffic is routed through GFI
WebMonitor.
IMPORTANT
Ensure that by enabling HTTPS Scanning you are not violating any laws in your jurisdiction or any compliance
regulations for your industry.
NOTE
The Configuration Wizard is launched automatically after installing GFI WebMonitor or manually from the Settings
menu.
See also:
Configuring Advanced settings
2.5 Configure browser proxy settings on GFI WebMonitor machine
Configure your server's Internet browser to use GFI WebMonitor machine as the default proxy. This can be achieved by
performing the following:
1. On the machine where GFI WebMonitor is installed, go to Control Panel and select Internet Options.
2. Click the Connections tab.
3. Click LAN settings.
GFI WebMonitor
2 Installation | 9
Screenshot 2: Configure fixed proxy settings
4. Check Use a proxy server for your LAN checkbox.
5. In the Address field, key in the proxy server name or IP address of the GFI WebMonitor machine.
6. In the Port field enter the port used (default = 8080).
NOTE
GFI WebMonitor can be deployed to allow Internet browsers on client machines to automatically detect proxy server
configuration settings. This can be achieved by using Web Proxy Auto Discovery (WPAD). Refer to Enabling GFI
WebMonitor without fixed Proxy Settings for more information on how to do this.
2.5.1 Test Your Installation
When your test environment is ready, close the Configuration Wizard to start using GFI WebMonitor. Check the All the
required clients are now routing their Internet traffic through GFI WebMonitor checkbox and click See GFI
WebMonitor in Action.
GFI WebMonitor
2 Installation | 10
NOTE
You should wait until GFI WebMonitor downloads the latest version of the WebGrade database, and other updates,
such as latest antivirus engine signatures. Ideally you should leave GFI WebMonitor running overnight or until all
downloads have completed.
At this point you should already start seeing some traffic generated by the updates in the Real-Time Traffic Dashboard
accessible from Dashboards > Real-Time Traffic .
Screenshot 3: Real-time traffic dashboard
2.6 Verify that GFI WebMonitor is working correctly
To determine that GFI WebMonitor is working correctly, perform a simple test to check whether an Internet request is
blocked. To do this:
1. Go to Manage > Policies.
NOTE
You will see that a Default Web Filtering Policy is already enabled. This policy applies to every user whose traffic is
routed through GFI WebMonitor.
2. In the sidebar, select Blacklist from the list of configured policies.
3. Click Edit .
3. In the Websites element, type *.cnn.com.
4. Click the Add sign. The URL is added to the list of blocked sites.
5. Click Save to apply the changes.
6. Go back to your browser and open http://www.cnn.com. The GFI WebMonitor blocking page should now be
displayed.
GFI WebMonitor
2 Installation | 11
Screenshot 4: Warning that the page you requested was blocked by GFI WebMonitor
If the warning above is displayed, then your GFI WebMonitor installation is working correctly!
You can now remove the URL from the Blacklist policy.
IMPORTANT
At this point GFI WebMonitor has been installed in 'bare essentials' mode. We recommend you follow the rest of this
guide to ensure all essential configurations are in place.
2.7 Proxy Settings
GFI WebMonitor acts as a Proxy Server to provide a connection between your internal network and the Internet. This
means that traffic from client machines needs to be redirected through the GFI WebMonitor server. GFI WebMonitor
offers different options on how to route client traffic.
GFI WebMonitor
2 Installation | 12
OPTION
DESCRIPTION
Using fixed
Proxy Settings
(Recommended
for this Trial)
Set up browser proxy settings on every client machine so that Internet traffic is redirected through the GFI
WebMonitor proxy. Simply go to the Browser settings of the client machines and set the IP of GFI WebMonitor.
Using WPAD
When deploying in Simple Proxy Mode, you can use WPAD to avoid configuring fixed proxy settings on client
machines. WPAD allows client computers to automatically detect proxy server configuration settings. When this
feature is enabled and the Internet browser connection settings are configured to 'Automatically Detect Set
tings', each client machine will automatically determine the IP address of the GFI WebMonitor server and use it
as a proxy without further configuration.
NOTE
If WPAD is enabled, all browsers configured to 'Automatically Detect Settings' start automatically pointing to
the GFI WebMonitor proxy. This is something you might want to avoid during the trial period.
Using Trans
parent Proxy
If you are deploying GFI WebMonitor in Gateway mode, you can use Transparent Proxy - a feature used to
monitor and control HTTP and HTTPS traffic transparently. When a user makes a request to a web server, the
Transparent Proxy intercepts the request to deliver the requested content. When GFI WebMonitor is deployed in
this mode, you do not need to set client browser settings to point to a specific proxy.
NOTE
Transparent Proxy cannot be enabled in Simple Proxy Mode. If using Gateway Mode, we still suggest using
fixed proxy settings for the trial since with Transparent Proxy, GFI WebMonitor is able to capture all traffic on
the network.
2.8 Enabling GFI WebMonitor with fixed proxy settings
It is now time to set up a few testing users. On every client machine, set up browser proxy settings so that Internet traffic
is redirected through the GFI WebMonitor proxy. Simply go to the Browser settings of the client machines and set the IP
of GFI WebMonitor.
NOTE
Users included in the trial of GFI WebMonitor determine the success of the trial. Consider avoiding high-profile
users, at least until you get the setup right, and only test the software by including users where your testing will not
have any negative impact. This way you can avoid unintended issues.
1. On the client machine, go to Control Panel and select Internet Options.
2. Click the Connections tab.
3. Click LAN settings.
4. Check Use a proxy server for your LAN checkbox.
5. In the Address field, key in the proxy server name or IP address of the GFI WebMonitor machine.
6. In the Port field enter the port used (default = 8080).
NOTE
After evaluating GFI WebMonitor, you can set the proxy settings of every user to pass through GFI WebMonitor using
Active Directory GPO. Alternatively, you can enable either Transparent Proxy or Web Proxy Auto Discovery (WPAD).
For more information, refer to Proxy Settings (page 12).
GFI WebMonitor
2 Installation | 13
2.8.1 Configuring WPAD
The Web Proxy Auto Discovery (WPAD) is an Internet protocol supported by all major Internet browsers. It enables client
web browsers to automatically retrieve proxy settings from a WPAD data file stored on a machine on your network.
WPAD is a convenient way for administrators to configure client machines to use the GFI WebMonitor machine as a proxy
server without having to supply settings manually or via Active Directory Group Policies. When this feature is enabled and
the Internet browser connection settings are configured to 'Automatically Detect Settings', each client machine will
automatically determine the IP address of the GFI WebMonitor server and use it as a proxy without further configuration.
WPAD is particularly useful when you want to configure roaming devices such as laptops and tablets to use GFI
WebMonitor as the proxy server when they are in the office.
NOTE
For client Internet browsers to use WPAD, these must be configured to automatically detect proxy settings. For more
information, refer to Configure Internet browser for WPAD (page 14).
When GFI WebMonitor is installed the first time, it tries to detect available WPAD servers. Discovered WPAD servers are
listed in an information window.
To enable WPAD:
1. Go to Core Settings > Connection Settings.
2. Locate Use WPAD switch. Click ON to enable.
NOTE
If GFI WebMonitor does not discover any WPAD Servers on your network, this option is disabled. Click Repeat
WPAD detection to check for available servers.
3. A warning is displayed informing you that by enabling WPAD, server information is updated that might create net
work conflicts. These conflicts may arise when you have multiple GFI WebMonitor installations within the same network.
Click Proceed to continue.
4. Select one of the following options:
OPTION
DESCRIPTION
Publish the IP of the GFI WebMonitor proxy in WPAD
Select to include the GFI WebMonitor IP address in the WPAD.dat
file.
Publish the host name of the GFI WebMonitor proxy in
WPAD
Select to include the GFI WebMonitor host name in the WPAD.dat
file.
5. Click Next .
2.8.2 Configure Internet browser for WPAD
After enabling WPAD in GFI WebMonitor, ensure that the updated Internet settings are automatically detected by a
client browser:
1. On the client machine, go to Control Panel and select Internet Options.
2. Click the Connections tab.
3. Click LAN settings.
4. Check Automatically detect settings checkbox.
GFI WebMonitor
2 Installation | 14
Screenshot 5: Configuring Automatically detect settings
5. Close LAN Settings dialog.
6. Click OK to close Internet Options dialog.
7. Restart Internet browser to refresh settings.
NOTE
WPAD is supported by all major Internet browsers.
GFI WebMonitor
2 Installation | 15
3 Configuring GFI WebMonitor for Trial
This section guides you through the configuration of monitoring and controlling polices that enable GFI WebMonitor to
do the job it was designed to do. For more detailed information on how to configure advanced settings refer to the
Administrator Guide available from our website.
3.1 Pre-configured Policies
When GFI WebMonitor is installed, a number of pre-configured policies are automatically created to ensure an initial
working setup. These include 3 Default system policies and a number of other policies that cater for common scenarios.
The Default policies apply to every user whose traffic is routed through GFI WebMonitor. They cannot be disabled or
deleted, but can be tweaked in a limited way. If you intend to apply rules to everyone (for example, you want to block a
particular site for every user), you can edit the default policies according to your organization's requirements.
The other pre-configured polices offer more complex filtering options. Most of these policies are switched off when GFI
WebMonitor is installed. Enable these policies as required, tweaking them to fit your organization's policies. Otherwise
you can create new policies and apply them to specific Active Directory users, groups or IPs as necessary.
IMPORTANT
Policies are applied in a top-down approach. Every new policy is displayed on top of the older ones in a
numbered sequence.
3.2 Authentication
If you would like to set policies using Windows or Active Directory users and groups you need to enable authentication.
During installation, the GFI WebMonitor Proxy Authentication is set to No Authentication. This means that:
Only IP addresses of machines whose Internet traffic is being routed through GFI WebMonitor will be reported.
Policies need to be applied by IP address. If you have joined your test server to your Active Directory domain and
would like to see usernames and be able to set policies by Active Directory users and groups, you will need to set GFI
WebMonitor to use authentication.
GFI WebMonitorcan be configured to authenticate users using one of two methods:
OPTION
DESCRIPTION
Basic authen
tication
Select if user is required to provide login credentials when new Internet sessions are launched
Integrated
authentication
This option enables GFI WebMonitor proxy to authenticate users by using the client machines access control
service. User is not prompted to provide login credentials when new Internet sessions are launched.
(Recommended)
The next section describes how to enable Authentication in GFI WebMonitor.
3.2.1 Configuring Proxy Authentication Method
Proxy Authentication enables you to configure the authentication method used by the proxy. This determines how
client machines are validated when accessing the Internet. Proxy Authentication must be enabled to be able to create
new polices for users or groups. By default, Proxy Authentication is disabled. When Proxy Authentication is disabled, you
are only allowed to configure new policies using IP addresses.
For enhanced security we recommend using Integrated Authentication. This method is more secure since unlike Basic
Authentication it does not transmit user credentials over the network.
GFI WebMonitor
3 Configuring GFI WebMonitor for Trial | 16
NOTE
The Configuration Wizard is launched automatically after installing GFI WebMonitor or manually from the Settings
menu.
To configure user authentication method:
1. Go to Core Settings > Connection Settings.
2. Click the Proxy Authentication switch to enable.
3. In the Proxy Authentication area, select one of the following options:
Option 1: Leave Proxy Authentication off if the user is not required to provide login credentials when new Internet
sessions are launched.
Option 2: If proxy authentication is required, select one of the following options:
OPTION
DESCRIPTION
Basic authen
tication
Select if user is required to provide login credentials when new Internet sessions are launched. When using Basic
authentication, the browser prompts the user for a user name and password. This information is transmitted across
HTTP as plain text and considered insecure.
Integrated
authentication
(Recommended) This option enables GFI WebMonitor proxy to authenticate users by using the client machine
access control service. User is not prompted to provide login credentials when new Internet sessions are launched.
We recommend using Integrated authentication in a Windows domain environment since this method of
authentication does not transmit user passwords across the network.
NOTE
Integrated authentication is disabled if the GFI WebMonitor machine authenticates local users as Guest. The
Guest only network access model grants all users the same level of access to system resources and so GFI
WebMonitor proxy will not be able to differentiate between the different users using a client machine.
4. [Optional] In the IP's that will bypass the authentication field, key in IP addresses to exclude from proxy authen
tication. IP addresses specified in this field will not be prompted to provide login credentials when new Internet ses
sions are launched.
3.2.2 Authentication Test (in Real-Time)
Try browsing to http://www.youtube.com and open a video of considerable length (more than 10 minutes should be
enough). If you have chosen Basic Authentication you are prompted for a username and password. Enter the
credentials you used to log onto the machine you are using, then you should be able to proceed.
If you go to Dashboards > Real-Time Traffic you should see the connection to http://www.youtube.com listed. Other
details include the IP of the test machine and your user name, status of traffic and size of download.
Real-Time Bandwidth Chart
If you now switch from Active Connections to Bandwidth you will see a real time graph of bandwidth being used at
that point in time. The more connections you open, the higher the graph will climb.
3.2.3 Blocking Test by Username
With GFI WebMonitor configured to use Basic Authentication, repeat the blocking test previously carried out, but this
time use the logged on user credentials. The outcome of this test will confirm that policies are being applied by
username.
1. Go to Manage > Policies and create a new Policy.
2. In Policy Name field, enter Authentication Test .
GFI WebMonitor
3 Configuring GFI WebMonitor for Trial | 17
3. In Policy Description, enter a description.
3. Change the Allow, Block, Warn, Monitor element to Block.
4. From the left sidebar, add the Websites element.
5. Locate and insert the Social Network category to block social networking websites (for blocking test purposes).
6. Insert the Users, Groups, IPs and insert the username currently logged on the machine.
7. Click Save to apply the changes.
8. Go back to your browser and open http://www.linkedin.com/. The GFI WebMonitor blocking page should now be
displayed. Note that this time the label Breached Policy has changed to 'Authentication Test'.
If the warning is displayed, then GFI WebMonitor is working correctly!
If the block did not work, make sure you have entered all details correctly, and that you have saved changes to the policy.
Try closing and re-opening the browser, and check the Real-Time Traffic dashboard in the GFI WebMonitor interface to
ensure that traffic is being routed through the proxy correctly. If you see the request with the IP, this means that you
have not forced authentication correctly and you should use IPs for your policies. If you see a different username, you
need to enter this username in the policy.
If you don’t manage to get this part working you should contact our support team so that we can help you to
troubleshoot your installation.
3.3 Filtering file downloads
You can create policies to manage file downloads based on file types. If a user tries to download a file that triggers a
configured policy, GFI WebMonitor determines what action to take, according to what you configured in that policy. This
may be one of the following actions:
Allow, Block, Warn or Monitor the file download
Scan the downloaded file for viruses
Notify specific users when the file is downloaded
Limit file downloads by placing Bandwidth or Time thresholds
3.4 Security scanning policies
One of the pre-configured polices that ship with GFI WebMonitor is pre-configured to block files that may contain
malicious content. This policy is set to apply to every user on the domain and to scan all file types using the inbuilt
BitDefender, VIPRE and Kaspersky engines. This policy is called Security Scanning Policy with Download Window and
can be modified as required.
The parameter Download Progress Window in this policy ensures that a progress window is shown whenever a users
tries to download a file.
TIP
If you don't want your users to see a download progress window, switch off this policy and enable Security
Scanning Policy without Download Window instead.
To view or edit this policy go to Manage > Policies. You can customize the policy as necessary; however, the initial setup
should suffice for the trial period.
GFI WebMonitor
3 Configuring GFI WebMonitor for Trial | 18
3.5 Application control
Using the Applications element within the policy builder, you can exert control over applications used within your
organization. This includes instant messaging apps, social networking, games, streaming apps and many more. If a policy
is breached, GFI WebMonitor uses the configured policy to determine what action to take.
When GFI WebMonitor is installed, a number of pre-configured policies are automatically configured for your
convenience. These include:
Block streaming media applications
Block P2P
Block free VPN and Tunneling applications
Block application access to Proxy and Anonymity networks
NOTE
When GFI WebMonitor is installed, these policies are switched off and must be enabled.
For your trial these policies are typically sufficient, but if you wish to create a new policy or edit one of the existing
policies, you can do this from: Manage > Policies.
3.6 Monitoring and filtering Internet browsing
Using the Websites elements, GFI WebMonitor gives you the facility to create policies aimed at monitoring and filtering
user browsing. , GFI WebMonitor determines what action to take, according to what you configured in that policy. This
may be one of the following actions:
Allow, Block, Warn or Monitor Internet browsing
Scan URLs for viruses and malicious content
Filter by reputation using inbuilt controls that apply filters based on a website's reputation
Notify specific users when certain URLs are requested
Limit - limit browsing based on surf time or bandwidth limits
GFI WebMonitor ships with a number of pre-configured policies that are typically sufficient for the purposes of the trial.
However, if you wish to create a new policy or edit one of the existing policies, you can do this from: Manage > Policies.
3.7 Configuring Exceptions
To configure exceptions in GFI WebMonitor you can either use the Blacklist and Whitelist policies or use the Exceptions
element in the policy builder, which can be added to any custom policy.
The Blacklist is a list of sites, users and IP addresses banned from performing any web activity. The Blacklist list takes
priority over all policies.
The Whitelist is a list of sites, users and IP addresses automatically excluded from all filtering policies configured in GFI
WebMonitor, allowing them to bypass filtering and scanning policies.
IMPORTANT
In GFI WebMonitor, the Blacklist takes priority over the Whitelist list. Therefore, if a site is listed in the Blacklist and
that same site is listed in the Whitelist , access to the site is blocked.
The Exceptions element can be added to any custom policy to add exceptions per policy for:
GFI WebMonitor
3 Configuring GFI WebMonitor for Trial | 19
Specific users
Groups of users
Websites and IP addresses
Specific applications
GFI WebMonitor
3 Configuring GFI WebMonitor for Trial | 20
4 Using GFI WebMonitor
4.1 Using the Dashboards
GFI WebMonitor contains 6 dashboards that provide essential information such as:
DASHBOARD
DESCRIPTION
Home
Get a quick overview of bandwidth and activity trends, as well as reminders for tasks that need to be addressed to
make your network safer. Identify Top Categories, Domains and Users on your network at a glance and be aware of
several statuses related to web browsing and security issues identified by GFI WebMonitor.
Bandwidth
Access information related to traffic and user activity that affects bandwidth consumption. The information is
presented in a graph that shows upload and download bandwidth viewed by hour, day, week or month to monitor
any spikes. The legend is filtered by category, website and users, sorted by the different columns, with search
functionality for specific items in the filter. This allows you to easily arrive to relevant information and analyze data as
required.
Activity
View web requests and user activity for a specified period. The Activity graph displays All Activity in green and
Filtered traffic in red for easy identification. The summary at the top identifies the total web requests for the selec
ted period, the number of monitored users, the day within that period when traffic was most intensive and also
gives the projected web requests for the next 30 days.
Security
Identify security risks and threats to your network environment. Focusing on the various facets of Internet security,
the dashboard offers quick information related to detection of Infected Files, Malicious and Phishing sites that have
been blocked and the top viruses that GFI WebMonitor has identified.
Real-Time
Traffic
Monitor current active connections and terminate them if necessary (for example, streaming media or large
unauthorized downloads), and view most recent connections. Filter real-time connections by Category, Website or
User to see what is going on. For example, you could filter Streaming Media when too much bandwidth is being
consumed and terminate at will. Real-time graphs of bandwidth and activity give you visual indicators of the
current situation while it happens. In this way, you can keep your eye on the situation from the perspective which
most affects you.
Quotas
The Quotas dashboard lists active Polices based on web browsing quotas and their respective status. If a quota is
exceeded, the administrator can review the listed items and decide on what action to take. If the policy is not reset,
browsing is blocked and a message displayed in the user's browser stating the reason why the browsing was
blocked and the name of the policy.
Agents
The Agents dashboard provides information related to the status of configured Agents. The information provided
enables you to quickly identify when remote users last synchronized with your GFI WebMonitor server .
4.2 Interactive Reporting
You can now take a brief look at the reporting feature of GFI WebMonitor. Reports can either be triggered directly from
within the Bandwidth, Activity and Security Dashboards or accessed from the Reports tab of the UI.
For the purpose of this trial, let us have a look at the report functionality from within the Activity Dashboard.
NOTE
At this point of your trial, there is very little data available for reporting. The reports will be more useful once a
number of days have passed with your trial.
Go to Dashboard > Activity. The Dashboard consists of a graph displaying a representation of activity on your network.
Use the various controls to extract the information you require. For example, click Filtered Only to view user browsing
grouped by policy. The graph changes according to your selection. From the bottom section, drill down further by
clicking on specific categories, websites or users.
GFI WebMonitor
4 Using GFI WebMonitor | 21
4.2.1 One-click Report Functionality
After you customize the dashboard, the view can be exported as a report or scheduled to be sent automatically as
required.
Export Report
To export the report:
1. From the top of the Dashboard, click Actions and select Export Report .
2. GFI WebMonitor displays the exported report in a separate window in your browser.
3. Click Save and select one of the following options:
OPTION
DESCRIPTION
Excel
The report is exported in Microsoft Excel format (.xls)
PDF
The report is exported in PDF format.
Word
The report is exported in Microsoft Word format (.doc)
Schedule Report
To schedule the report:
1. From the top of the Dashboard, click Actions and select Schedule Report .
2. GFI WebMonitor redirects you automatically to the Reports area.
3. Edit the report as required.
4. Save the report.
The exported report can be viewed in your browser. The top part of the report consists of a graph showing a graphical
representation of trends, while the bottom part can be used to drill-down on specific categories, domains, websites or
users.
GFI WebMonitor
4 Using GFI WebMonitor | 22
5 Support
Remember that support is available during your GFI WebMonitor trial. If you have any problems during the above steps,
you can get in touch with our support center.
30 Day Trial Guide
Now that you’ve successfully setup GFI WebMonitor, we suggest you take a look at the 30 Day Trial Guide. Here we will
take you through some recommendations for evaluating GFI WebMonitor in order to get the most value out of your GFI
WebMonitor trial.
GFI WebMonitor
5 Support | 23
6 About GFI
GFI Software Ltd provides web and mail security, archiving and fax, networking and security software and hosted IT
solutions for small to medium-sized businesses (SMBs) via an extensive global partner community. GFI products are
available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning
technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMBs, GFI satisfies the IT
needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and
Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together
support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners
throughout the world and is also a Microsoft Gold Certified Partner.
More information about GFI can be found at http://www.gfi.com.
GFI WebMonitor
6 About GFI | 24
USA, CANADA AND CENTRAL AND SOUTH AMERICA
1005 Slater Road, Suite 300, Durham, NC 27703, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
[email protected]
UK AND REPUBLIC OF IRELAND
Magna House, 18-32 London Road, Staines-upon-Thames, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
[email protected]
EUROPE, MIDDLE EAST AND AFRICA
GFI House, Territorials Street, Mriehel BKR 3000, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
[email protected]
AUSTRALIA AND NEW ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
[email protected]
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement