<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
	<title type="text">GFI Network Security</title>
	<subtitle type="text">Leading Network Security &amp; Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips &amp; more.</subtitle>
	<link rel="alternate" type="text/html" href="https://www.firewall.cx"/>
	<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security.feed</id>
	<updated>2026-04-11T12:47:55+10:00</updated>
	<author>
		<name>Firewall.cx Website</name>
	</author>
	<generator uri="https://www.joomla.org"></generator>
	<link rel="self" type="application/atom+xml" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security.feed?type=atom"/>
	<entry>
		<title>GFI OneConnect – Stop Ransomware, Malware, Viruses, and Email hacks Before They Reach Your Exchange Server</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-oneconnect-ransomware-malware-virus-protection-exchange-continuity.html"/>
		<published>2016-11-24T00:19:41+11:00</published>
		<updated>2016-11-24T00:19:41+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-oneconnect-ransomware-malware-virus-protection-exchange-continuity.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-1a.jpg&quot; alt=&quot;gfi-oneconnect-ransomware-malware-virus-datacenter-protection-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI OneConnect – Stop Ransomware, Malware, Viruses, and Email hacks&quot; /&gt;GFI Software has just revealed &lt;strong&gt;GFI OneConnect&lt;/strong&gt; Beta – its latest &lt;strong&gt;Advanced Email Security Protection&lt;/strong&gt; product. &lt;strong&gt;GFI OneConnect&lt;/strong&gt; is a comprehensive solution that targets the &lt;strong&gt;safe and continuous delivery&lt;/strong&gt; of &lt;strong&gt;business emails&lt;/strong&gt; to &lt;strong&gt;organizations&lt;/strong&gt; around the world.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI has leveraged its years of experience with its millions of business users around the globe to create a unique &lt;strong&gt;Hybrid&lt;/strong&gt; solution consisting of an &lt;strong&gt;on-premise server&lt;/strong&gt; and &lt;strong&gt;Cloud-based solution&lt;/strong&gt; that helps IT admins and organizations protect their infrastructure from spam, malware threats, ransomware, virus and email service outages.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;GFI OneConnect&lt;/strong&gt; not only takes care of filtering all incoming email for your Exchange server but it also works as a backup service in case your Exchange server or cluster is offline.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The solution consists of the &lt;strong&gt;GFI OneConnect Server&lt;/strong&gt; that is installed on the customer’s premises. The &lt;strong&gt;OneConnect server&lt;/strong&gt; connects to the &lt;strong&gt;local Exchange server&lt;/strong&gt; on one side, and the &lt;strong&gt;GFI OneConnect Data Center&lt;/strong&gt; on the other side as shown in the diagram below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-1.jpg&quot; alt=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; style=&quot;margin: 7px;&quot; title=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Email sent to the organization’s domain is routed initially through the &lt;strong&gt;GFI OneConnect &lt;/strong&gt;. During this phase email is scanned by the two AntiVirus engines (ClamAV &amp;amp; Kaspersky) for virus, ransomware, malware etc. before forwarding them to the Exchange Server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In case the &lt;strong&gt;Exchange server is offline&lt;/strong&gt; GFI OneConnect’s &lt;strong&gt;Continuity mode&lt;/strong&gt; will send and receive all emails, until the Exchange server is back online after which all emails are automatically synchronised. All emails received while your email server was down are available to users at any moment, thanks to the connection to the cloud and the GFI OneConnect’s Datacenter.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-2.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;GFI OneConnect Admin Dashboard &quot; data-mediabox=&quot;title[GFI OneConnect Admin Dashboard::GFI OneConnect Admin Dashboard ]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-2.jpg&quot; alt=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; style=&quot;margin: 7px;&quot; title=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. GFI OneConnect Admin Dashboard (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While there is currently a beta version out - our first impressions show that this is an &lt;strong&gt;extremely promising solution&lt;/strong&gt; that has been carefully designed with the customer and IT staff in mind. According to GFI – &lt;strong&gt;&lt;em&gt;the best is yet to come&lt;/em&gt;&lt;/strong&gt; – and we know that &lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;GFI always stands by its promises&lt;/span&gt;&lt;/strong&gt; so we are really looking forward seeing the final version of this product in early 2017.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you’ve been experiencing issues with your &lt;strong&gt;Exchange server continuity&lt;/strong&gt; or have problems &lt;strong&gt;dealing with massive amounts of spam emails&lt;/strong&gt;, &lt;strong&gt;ransomware&lt;/strong&gt; and other &lt;strong&gt;security threats&lt;/strong&gt; – give &lt;strong&gt;GFI OneConnect&lt;/strong&gt;&lt;strong&gt;Beta&lt;/strong&gt; a test run and discover how it can help offload all these problems permanently, leaving you time for other more important tasks.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-1a.jpg&quot; alt=&quot;gfi-oneconnect-ransomware-malware-virus-datacenter-protection-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI OneConnect – Stop Ransomware, Malware, Viruses, and Email hacks&quot; /&gt;GFI Software has just revealed &lt;strong&gt;GFI OneConnect&lt;/strong&gt; Beta – its latest &lt;strong&gt;Advanced Email Security Protection&lt;/strong&gt; product. &lt;strong&gt;GFI OneConnect&lt;/strong&gt; is a comprehensive solution that targets the &lt;strong&gt;safe and continuous delivery&lt;/strong&gt; of &lt;strong&gt;business emails&lt;/strong&gt; to &lt;strong&gt;organizations&lt;/strong&gt; around the world.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI has leveraged its years of experience with its millions of business users around the globe to create a unique &lt;strong&gt;Hybrid&lt;/strong&gt; solution consisting of an &lt;strong&gt;on-premise server&lt;/strong&gt; and &lt;strong&gt;Cloud-based solution&lt;/strong&gt; that helps IT admins and organizations protect their infrastructure from spam, malware threats, ransomware, virus and email service outages.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;GFI OneConnect&lt;/strong&gt; not only takes care of filtering all incoming email for your Exchange server but it also works as a backup service in case your Exchange server or cluster is offline.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The solution consists of the &lt;strong&gt;GFI OneConnect Server&lt;/strong&gt; that is installed on the customer’s premises. The &lt;strong&gt;OneConnect server&lt;/strong&gt; connects to the &lt;strong&gt;local Exchange server&lt;/strong&gt; on one side, and the &lt;strong&gt;GFI OneConnect Data Center&lt;/strong&gt; on the other side as shown in the diagram below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-1.jpg&quot; alt=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; style=&quot;margin: 7px;&quot; title=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Email sent to the organization’s domain is routed initially through the &lt;strong&gt;GFI OneConnect &lt;/strong&gt;. During this phase email is scanned by the two AntiVirus engines (ClamAV &amp;amp; Kaspersky) for virus, ransomware, malware etc. before forwarding them to the Exchange Server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In case the &lt;strong&gt;Exchange server is offline&lt;/strong&gt; GFI OneConnect’s &lt;strong&gt;Continuity mode&lt;/strong&gt; will send and receive all emails, until the Exchange server is back online after which all emails are automatically synchronised. All emails received while your email server was down are available to users at any moment, thanks to the connection to the cloud and the GFI OneConnect’s Datacenter.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-2.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;GFI OneConnect Admin Dashboard &quot; data-mediabox=&quot;title[GFI OneConnect Admin Dashboard::GFI OneConnect Admin Dashboard ]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-oneconnect-ransomware-malware-virus-datacenter-protection-2.jpg&quot; alt=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; style=&quot;margin: 7px;&quot; title=&quot;Deployment model of GFI OneConnect (Server &amp;amp; Data Center)&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. GFI OneConnect Admin Dashboard (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;While there is currently a beta version out - our first impressions show that this is an &lt;strong&gt;extremely promising solution&lt;/strong&gt; that has been carefully designed with the customer and IT staff in mind. According to GFI – &lt;strong&gt;&lt;em&gt;the best is yet to come&lt;/em&gt;&lt;/strong&gt; – and we know that &lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;GFI always stands by its promises&lt;/span&gt;&lt;/strong&gt; so we are really looking forward seeing the final version of this product in early 2017.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If you’ve been experiencing issues with your &lt;strong&gt;Exchange server continuity&lt;/strong&gt; or have problems &lt;strong&gt;dealing with massive amounts of spam emails&lt;/strong&gt;, &lt;strong&gt;ransomware&lt;/strong&gt; and other &lt;strong&gt;security threats&lt;/strong&gt; – give &lt;strong&gt;GFI OneConnect&lt;/strong&gt;&lt;strong&gt;Beta&lt;/strong&gt; a test run and discover how it can help offload all these problems permanently, leaving you time for other more important tasks.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>Enforcing ICT Policies - How to Block Illegal &amp; Unwanted Websites from your Users and Guests</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/enforce-ict-policies-block-illegal-and-unwanted-websites.html"/>
		<published>2016-11-13T18:21:24+11:00</published>
		<updated>2016-11-13T18:21:24+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/enforce-ict-policies-block-illegal-and-unwanted-websites.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-1a.jpg&quot; alt=&quot;Enforcing ICT Policies - How to Block Illegal &amp;amp; Unwanted Websites for your Users and Guests&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Enforcing ICT Policies - How to Block Illegal &amp;amp; Unwanted Websites from your Users and Guests&quot; /&gt;Ensuring users follow &lt;strong&gt;company policies&lt;/strong&gt; when accessing the internet has become a real challenge for businesses and IT staff. The &lt;strong&gt;legal implications for businesses&lt;/strong&gt; not taking measures to &lt;strong&gt;enforce acceptable user policies&lt;/strong&gt; (where possible) can become very complicated and businesses can, in fact, be held &lt;strong&gt;liable for damages&lt;/strong&gt; caused by their users or guests.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A good example, found in almost every business around the world, is the offering of guest internet access to visitors. While they are usually unaware of the company’s ICT policies (nor do they really care about them) they are provided with free unrestricted access to the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Sure, the firewall will only allow DNS, HTTP and HTTPS traffic in an attempt to limit internet access and its abuse but who’s ensuring they are not accessing illegal sites/content such as pornography, gambling, etc., which are in direct violation of the ICT policy?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is where solutions like GFI WebMonitor help businesses cover this sensitive area by quickly filtering website categories in a very simple and effective way that makes it easy for anyone to add or remove specific website categories or urls.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;How To Block Legal Liability Sites&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enforcing your &lt;strong&gt;ICT Internet Usage Policy&lt;/strong&gt; via WebMonitor is a very simple and fast process. From the WebMonitor web-based dashboard, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Manage&lt;/strong&gt; and select &lt;strong&gt;Policies&lt;/strong&gt;:&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Note: Click on any image to enlarge it and view it in high-resolution&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-1l.png&quot; target=&quot;_blank&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Adding a new Policy in GFI WebMonitor&quot; data-mediabox=&quot;title[Adding a new Policy in GFI WebMonitor]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-1.png&quot; alt=&quot;Adding a new Policy in GFI WebMonitor&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Adding a new Policy in GFI WebMonitor&quot; /&gt;&lt;/a&gt;Figure 1. Adding a new Policy in GFI WebMonitor&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;At the next screen, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add Policy&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-2l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Click on the GFI WebMonitor Add Policy button&quot; data-mediabox=&quot;title[Click on the GFI WebMonitor Add Policy button]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-2.png&quot; alt=&quot;Click on the GFI WebMonitor Add Policy button&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Click on the GFI WebMonitor Add Policy button&quot; /&gt;&lt;/a&gt;Figure 2. Click on the GFI WebMonitor Add Policy button&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At the next screen add the desired &lt;strong&gt;Policy Name&lt;/strong&gt; and &lt;strong&gt;brief description&lt;/strong&gt; below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-3l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Creating the Web Policy in GFI WebMonitor using the WEBSITE element&quot; data-mediabox=&quot;title[Creating the Web Policy in GFI WebMonitor using the WEBSITE element]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-3.png&quot; alt=&quot;Creating the Web Policy in GFI WebMonitor using the WEBSITE element&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Creating the Web Policy in GFI WebMonitor using the WEBSITE element&quot; /&gt;&lt;/a&gt;Figure 3. Creating the Web Policy in GFI WebMonitor using the WEBSITE element&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click and drag&lt;/strong&gt; the &lt;strong&gt;WEBSITES&lt;/strong&gt; element (on the left) into the center of the screen as shown above.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, configure the policy to &lt;strong&gt;Block traffic&lt;/strong&gt; matching the filters we are about to create and optionally &lt;strong&gt;enable temporary access from users&lt;/strong&gt; if you wish:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-4l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Selecting Website Categories to be blocked and actions to be taken&quot; data-mediabox=&quot;title[Selecting Website Categories to be blocked and actions to be taken]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-4.png&quot; alt=&quot;Selecting Website Categories to be blocked and actions to be taken&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Selecting Website Categories to be blocked and actions to be taken&quot; /&gt;&lt;/a&gt;Figure 4. Selecting Website Categories to be blocked and actions to be taken&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Under the &lt;strong&gt;Categories&lt;/strong&gt; section &lt;strong&gt;click&lt;/strong&gt; inside the &lt;strong&gt;Insert a Site Category&lt;/strong&gt; field to reveal a drop-down list of the different categories. &lt;strong&gt;Select&lt;/strong&gt; a category by &lt;strong&gt;clicking&lt;/strong&gt; on it and then &lt;strong&gt;click&lt;/strong&gt; on the ‘&lt;strong&gt;+&lt;/strong&gt;’ symbol to add the category to this policy. Optionally you can &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;small square icon&lt;/strong&gt; next to the ‘&lt;strong&gt;+&lt;/strong&gt;’ symbol to get a pop-up window with all the categories.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Optionally select to &lt;strong&gt;enable full URL logging&lt;/strong&gt; and then &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Save&lt;/strong&gt; button at the top right corner to save and enable the policy.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;The new policy will now appear on the &lt;strong&gt;Policies dashboard&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-5.png&quot; alt=&quot;enforce-ict-policies-block-illegal-and-unwanted-websites-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Our new WebMonitor policy is now active&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. Our new WebMonitor policy is now active&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If for any reason you need to disable the policy all you need to do is &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;green power button&lt;/strong&gt; on the left and the policy is disabled immediately. A very handy feature that allows administrators to take immediate action when they notice unwanted effects from the new policies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After the policy was enabled we tried accessing a gambling website from one of our workstations and received the following message on our web browser:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-6.png&quot; alt=&quot;Our new policy blocks users from accessing gambling sites&quot; title=&quot;Our new policy blocks users from accessing gambling sites&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Our new policy blocks users from accessing gambling sites&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;GFI WebMonitor Dashboard&lt;/strong&gt; reporting &lt;strong&gt;Blocking/Warning hits&lt;/strong&gt; on the company’s policies:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-7l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;GFI WebMonitor reports our Internet usage ICT Policy is being hit &quot; data-mediabox=&quot;title[GFI WebMonitor reports our Internet usage ICT Policy is being hit ]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-7.png&quot; alt=&quot;GFI WebMonitor reports our Internet usage ICT Policy is being hit&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI WebMonitor reports our Internet usage ICT Policy is being hit&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 7. GFI WebMonitor reports our Internet usage ICT Policy is being hit (click for full dashboard image)&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The importance of properly enforcing an &lt;strong&gt;ICT Internet Usage Policy&lt;/strong&gt; cannot be underestimated. It can not only save the company from legal implications but also its users and guests from their very own actions. Solutions such as &lt;strong&gt;GFI WebMonitor&lt;/strong&gt; are designed to help businesses effectively &lt;strong&gt;apply ICT Policies&lt;/strong&gt; and control usage of &lt;strong&gt;high-risk resources&lt;/strong&gt; such as the internet.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-1a.jpg&quot; alt=&quot;Enforcing ICT Policies - How to Block Illegal &amp;amp; Unwanted Websites for your Users and Guests&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Enforcing ICT Policies - How to Block Illegal &amp;amp; Unwanted Websites from your Users and Guests&quot; /&gt;Ensuring users follow &lt;strong&gt;company policies&lt;/strong&gt; when accessing the internet has become a real challenge for businesses and IT staff. The &lt;strong&gt;legal implications for businesses&lt;/strong&gt; not taking measures to &lt;strong&gt;enforce acceptable user policies&lt;/strong&gt; (where possible) can become very complicated and businesses can, in fact, be held &lt;strong&gt;liable for damages&lt;/strong&gt; caused by their users or guests.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A good example, found in almost every business around the world, is the offering of guest internet access to visitors. While they are usually unaware of the company’s ICT policies (nor do they really care about them) they are provided with free unrestricted access to the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Sure, the firewall will only allow DNS, HTTP and HTTPS traffic in an attempt to limit internet access and its abuse but who’s ensuring they are not accessing illegal sites/content such as pornography, gambling, etc., which are in direct violation of the ICT policy?&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is where solutions like GFI WebMonitor help businesses cover this sensitive area by quickly filtering website categories in a very simple and effective way that makes it easy for anyone to add or remove specific website categories or urls.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;How To Block Legal Liability Sites&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enforcing your &lt;strong&gt;ICT Internet Usage Policy&lt;/strong&gt; via WebMonitor is a very simple and fast process. From the WebMonitor web-based dashboard, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Manage&lt;/strong&gt; and select &lt;strong&gt;Policies&lt;/strong&gt;:&lt;/p&gt;
&lt;p class=&quot;box-info&quot; style=&quot;text-align: justify;&quot;&gt;Note: Click on any image to enlarge it and view it in high-resolution&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-1l.png&quot; target=&quot;_blank&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Adding a new Policy in GFI WebMonitor&quot; data-mediabox=&quot;title[Adding a new Policy in GFI WebMonitor]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-1.png&quot; alt=&quot;Adding a new Policy in GFI WebMonitor&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Adding a new Policy in GFI WebMonitor&quot; /&gt;&lt;/a&gt;Figure 1. Adding a new Policy in GFI WebMonitor&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;At the next screen, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add Policy&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-2l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Click on the GFI WebMonitor Add Policy button&quot; data-mediabox=&quot;title[Click on the GFI WebMonitor Add Policy button]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-2.png&quot; alt=&quot;Click on the GFI WebMonitor Add Policy button&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Click on the GFI WebMonitor Add Policy button&quot; /&gt;&lt;/a&gt;Figure 2. Click on the GFI WebMonitor Add Policy button&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At the next screen add the desired &lt;strong&gt;Policy Name&lt;/strong&gt; and &lt;strong&gt;brief description&lt;/strong&gt; below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-3l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Creating the Web Policy in GFI WebMonitor using the WEBSITE element&quot; data-mediabox=&quot;title[Creating the Web Policy in GFI WebMonitor using the WEBSITE element]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-3.png&quot; alt=&quot;Creating the Web Policy in GFI WebMonitor using the WEBSITE element&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Creating the Web Policy in GFI WebMonitor using the WEBSITE element&quot; /&gt;&lt;/a&gt;Figure 3. Creating the Web Policy in GFI WebMonitor using the WEBSITE element&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click and drag&lt;/strong&gt; the &lt;strong&gt;WEBSITES&lt;/strong&gt; element (on the left) into the center of the screen as shown above.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, configure the policy to &lt;strong&gt;Block traffic&lt;/strong&gt; matching the filters we are about to create and optionally &lt;strong&gt;enable temporary access from users&lt;/strong&gt; if you wish:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-4l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;Selecting Website Categories to be blocked and actions to be taken&quot; data-mediabox=&quot;title[Selecting Website Categories to be blocked and actions to be taken]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-4.png&quot; alt=&quot;Selecting Website Categories to be blocked and actions to be taken&quot; style=&quot;border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Selecting Website Categories to be blocked and actions to be taken&quot; /&gt;&lt;/a&gt;Figure 4. Selecting Website Categories to be blocked and actions to be taken&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Under the &lt;strong&gt;Categories&lt;/strong&gt; section &lt;strong&gt;click&lt;/strong&gt; inside the &lt;strong&gt;Insert a Site Category&lt;/strong&gt; field to reveal a drop-down list of the different categories. &lt;strong&gt;Select&lt;/strong&gt; a category by &lt;strong&gt;clicking&lt;/strong&gt; on it and then &lt;strong&gt;click&lt;/strong&gt; on the ‘&lt;strong&gt;+&lt;/strong&gt;’ symbol to add the category to this policy. Optionally you can &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;small square icon&lt;/strong&gt; next to the ‘&lt;strong&gt;+&lt;/strong&gt;’ symbol to get a pop-up window with all the categories.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Optionally select to &lt;strong&gt;enable full URL logging&lt;/strong&gt; and then &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Save&lt;/strong&gt; button at the top right corner to save and enable the policy.&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;The new policy will now appear on the &lt;strong&gt;Policies dashboard&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: left;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-5.png&quot; alt=&quot;enforce-ict-policies-block-illegal-and-unwanted-websites-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Our new WebMonitor policy is now active&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. Our new WebMonitor policy is now active&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If for any reason you need to disable the policy all you need to do is &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;green power button&lt;/strong&gt; on the left and the policy is disabled immediately. A very handy feature that allows administrators to take immediate action when they notice unwanted effects from the new policies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After the policy was enabled we tried accessing a gambling website from one of our workstations and received the following message on our web browser:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-6.png&quot; alt=&quot;Our new policy blocks users from accessing gambling sites&quot; title=&quot;Our new policy blocks users from accessing gambling sites&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Our new policy blocks users from accessing gambling sites&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;GFI WebMonitor Dashboard&lt;/strong&gt; reporting &lt;strong&gt;Blocking/Warning hits&lt;/strong&gt; on the company’s policies:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-7l.png&quot; target=&quot;_blank&quot; type=&quot;image/png&quot; class=&quot;jcepopup icon-bottom-right&quot; title=&quot;GFI WebMonitor reports our Internet usage ICT Policy is being hit &quot; data-mediabox=&quot;title[GFI WebMonitor reports our Internet usage ICT Policy is being hit ]&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/enforce-ict-policies-block-illegal-and-unwanted-websites-7.png&quot; alt=&quot;GFI WebMonitor reports our Internet usage ICT Policy is being hit&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI WebMonitor reports our Internet usage ICT Policy is being hit&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 7. GFI WebMonitor reports our Internet usage ICT Policy is being hit (click for full dashboard image)&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The importance of properly enforcing an &lt;strong&gt;ICT Internet Usage Policy&lt;/strong&gt; cannot be underestimated. It can not only save the company from legal implications but also its users and guests from their very own actions. Solutions such as &lt;strong&gt;GFI WebMonitor&lt;/strong&gt; are designed to help businesses effectively &lt;strong&gt;apply ICT Policies&lt;/strong&gt; and control usage of &lt;strong&gt;high-risk resources&lt;/strong&gt; such as the internet.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>Minimise Internet Security Threats, Scan &amp; Block Malicious Content, Application Visibility and Internet Usage Reporting for Businesses</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-internet-usage-reporting-block-malicious-content.html"/>
		<published>2016-07-25T19:44:31+10:00</published>
		<updated>2016-07-25T19:44:31+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-internet-usage-reporting-block-malicious-content.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-1a.jpg&quot; alt=&quot;gfi-webmonitor-internet-usage-reporting-block-malicious-content-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;WebMonitor’s Dashboard provides in-depth internet usage and reporting&quot; /&gt;For every business, established or emerging, the Internet is an essential tool which has proved to be indispensable. The usefulness of the internet can be counteracted by abuse of it, by a business’s employees or guests. Activities such as &lt;strong&gt;downloading&lt;/strong&gt; or &lt;strong&gt;sharing illegal content&lt;/strong&gt;, &lt;strong&gt;visiting high risk websites&lt;/strong&gt; and &lt;strong&gt;accessing malicious content&lt;/strong&gt; are serious security risks for any business.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There is a very easy way of monitoring, managing and implementing effective Internet usage. GFI WebMonitor can not only provide the aforementioned, but also provide &lt;strong&gt;real – time web usage&lt;/strong&gt;. This allows for &lt;strong&gt;tracking bandwidth utilisation&lt;/strong&gt; and &lt;strong&gt;traffic patterns&lt;/strong&gt;. All this information can then be presented on an interactive dashboard. It is also an &lt;strong&gt;effective management tool,&lt;/strong&gt; providing a business with the internet usage records of its employees.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Such reports can be highly customised to provide usage information based on the following criteria/categories:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Most visited sites&lt;/li&gt;
&lt;li&gt;Most commonly searched phrases&lt;/li&gt;
&lt;li&gt;Where most bandwidth is being consumed&lt;/li&gt;
&lt;li&gt;Web application visibility&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some of the sources for web abuse that can be a time sink for employees are social media and instant messaging (unless the business operates at a level where these things are deemed necessary). Such web sites can be blocked.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI WebMonitor can also achieve other protective layers for the business by providing the ability to &lt;strong&gt;scan and block malicious content&lt;/strong&gt;. WebMonitor helps the business keep a close eye on its employees’ internet usage and browsing habits, and provides an additional layer of security.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On its main dashboard, as shown below, the different elements help in managing usage and traffic source and targets:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-1.jpg&quot; alt=&quot;WebMonitor’s Dashboard provides in-depth internet usage and reporting&quot; title=&quot;WebMonitor’s Dashboard provides in-depth internet usage and reporting&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. WebMonitor’s Dashboard provides in-depth internet usage and reporting&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor’s main dashboard contains a healthy amount of information allowing administrators and IT managers to obtain important information such as:&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;See how many &lt;strong&gt;Malicious Sites&lt;/strong&gt; were &lt;strong&gt;blocked&lt;/strong&gt; and how many &lt;strong&gt;infected files detected&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt; &lt;/span&gt;&lt;/span&gt;View the &lt;strong&gt;Top 5 Users by bandwidth&lt;/strong&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Obtain &lt;strong&gt;Bandwidth Trends&lt;/strong&gt; such as &lt;strong&gt;Download/Upload&lt;/strong&gt;, &lt;strong&gt;Throughput and Latency&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;Number of currently &lt;strong&gt;active web sessions&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;Top 5 internet categories&lt;/strong&gt; of sites visited by the users&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Top 5 Web Applications&lt;/strong&gt; used to access the internet&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Knowing which applications are used to access the internet is very important to any business. Web applications like YouTube, Bittorrent, etc. can be clearly identified and blocked, providing IT managers and administrators a ringside view of web utilisation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On the flip side, if a certain application or website is blocked and a user tries to access it, he/she will encounter an &lt;strong&gt;Access Denied&lt;/strong&gt; page rendered by GFI WebMonitor. This notification should be enough for the user to be deterred from trying it again:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-2.jpg&quot; alt=&quot;WebMonitor effectively blocks malicious websites while notifying users trying to access it&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor effectively blocks malicious websites while notifying users trying to access it&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. WebMonitor effectively blocks malicious websites while notifying users trying to access it&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For the purpose of this article, a deliberate attempt was made to download an ISO file using Bittorent. As per the policy the download page was part of the block policy. Hence GFI WebMonitor not only blocked the user from accessing the file, it also displayed the violation stating the user’s machine IP Address and the policy that was violated. This is a clear demonstration of how the management of web application can be effective.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some of the other great dashboards include bandwidth insight. The following image shows the total download and upload for a specific period. The projected values and peaks can be easily traced as well.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-3b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor’s Bandwidth graphs&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-3.jpg&quot; alt=&quot;WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic&quot; /&gt;&lt;/a&gt;Figure 3. WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another useful dashboard is that of &lt;strong&gt;activity&lt;/strong&gt;. This provides information about total users, their web request, and a projection of the next 30 days, as shown in the following image:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-4b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor allows detailed tracking&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-4.jpg&quot; alt=&quot;WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy&quot; /&gt;&lt;/a&gt;Figure 4. WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Security dashboard&lt;/strong&gt; is perhaps one of the most important. This shows all the breaches based on &lt;strong&gt;category&lt;/strong&gt;, &lt;strong&gt;type&lt;/strong&gt; and &lt;strong&gt;top blocked web based applications&lt;/strong&gt; that featured within certain policy violations.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-5b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;The Security dashboard allows tracking of web security incidents and security policy violations&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;The Security dashboard&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-5.jpg&quot; alt=&quot;The Security dashboard allows tracking of web security incidents and security policy violations&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;The Security dashboard allows tracking of web security incidents and security policy violations&quot; /&gt;&lt;/a&gt;Figure 5. The Security dashboard allows tracking of web security incidents and security policy violations&amp;nbsp;(click to enlarge)&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Running Web Reports&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The easiest way to manage and produce the information gathered is to run reports. The various categories provided allow the user to run and view information of Internet usage depending on management requirements. The following image shows the different options available on the left panel:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-6b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor internet web usage reports are highly customisable and provide detailed information&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor internet web usage reports&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-6.jpg&quot; alt=&quot;WebMonitor internet web usage reports are highly customisable and provide detailed information&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor internet web usage reports are highly customisable and provide detailed information&quot; /&gt;&lt;/a&gt;Figure 6. WebMonitor internet web usage reports are highly customisable and provide detailed information (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;But often management would rather take a pulse of the current situation. GFI WebMonitor caters to that requirement very well. The best place to look for instant information regarding certain key aspects of resource usage is the &lt;strong&gt;Web Insights &lt;/strong&gt;section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If management wanted to review the bandwidth information, the following dashboard would give that information readily:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-7b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;The Web Insight section keeps an overall track of internet usage&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;The Web Insight section&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-7.jpg&quot; alt=&quot;The Web Insight section keeps an overall track of internet usage&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;The Web Insight section keeps an overall track of internet usage&quot; /&gt;&lt;/a&gt;Figure 7. The Web Insight section keeps an overall track of internet usage (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This provides a percentage view of how much data contributes to &lt;strong&gt;download&lt;/strong&gt; or &lt;strong&gt;upload&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Security Insights&lt;/strong&gt; shows all current activities and concerns that needs attention:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-8b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor Security Insights dashboard displaying important web security reports&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor Security Insights dashboard&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-8.jpg&quot; alt=&quot;WebMonitor Security Insights dashboard displaying important web security reports&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor Security Insights dashboard displaying important web security reports&quot; /&gt;&lt;/a&gt;Figure 8. WebMonitor Security Insights dashboard displaying important web security reports (click to enlarge)&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Conclusion&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There is no doubt GFI WebMonitor becomes a very &lt;strong&gt;effective tool&lt;/strong&gt; that allows &lt;strong&gt;businesses to monitor&lt;/strong&gt; and &lt;strong&gt;control internet access&lt;/strong&gt; for &lt;strong&gt;employees&lt;/strong&gt;, &lt;strong&gt;guests&lt;/strong&gt; and other &lt;strong&gt;internet users&lt;/strong&gt;. Its intuitive interface allows administrators and IT Managers to quickly obtain the information they require but also put the necessary &lt;strong&gt;security policies&lt;/strong&gt; in place to &lt;strong&gt;minimise security threats&lt;/strong&gt; and &lt;strong&gt;internet resource abuse&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-1a.jpg&quot; alt=&quot;gfi-webmonitor-internet-usage-reporting-block-malicious-content-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;WebMonitor’s Dashboard provides in-depth internet usage and reporting&quot; /&gt;For every business, established or emerging, the Internet is an essential tool which has proved to be indispensable. The usefulness of the internet can be counteracted by abuse of it, by a business’s employees or guests. Activities such as &lt;strong&gt;downloading&lt;/strong&gt; or &lt;strong&gt;sharing illegal content&lt;/strong&gt;, &lt;strong&gt;visiting high risk websites&lt;/strong&gt; and &lt;strong&gt;accessing malicious content&lt;/strong&gt; are serious security risks for any business.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There is a very easy way of monitoring, managing and implementing effective Internet usage. GFI WebMonitor can not only provide the aforementioned, but also provide &lt;strong&gt;real – time web usage&lt;/strong&gt;. This allows for &lt;strong&gt;tracking bandwidth utilisation&lt;/strong&gt; and &lt;strong&gt;traffic patterns&lt;/strong&gt;. All this information can then be presented on an interactive dashboard. It is also an &lt;strong&gt;effective management tool,&lt;/strong&gt; providing a business with the internet usage records of its employees.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Such reports can be highly customised to provide usage information based on the following criteria/categories:&lt;/p&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Most visited sites&lt;/li&gt;
&lt;li&gt;Most commonly searched phrases&lt;/li&gt;
&lt;li&gt;Where most bandwidth is being consumed&lt;/li&gt;
&lt;li&gt;Web application visibility&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some of the sources for web abuse that can be a time sink for employees are social media and instant messaging (unless the business operates at a level where these things are deemed necessary). Such web sites can be blocked.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI WebMonitor can also achieve other protective layers for the business by providing the ability to &lt;strong&gt;scan and block malicious content&lt;/strong&gt;. WebMonitor helps the business keep a close eye on its employees’ internet usage and browsing habits, and provides an additional layer of security.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On its main dashboard, as shown below, the different elements help in managing usage and traffic source and targets:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-1.jpg&quot; alt=&quot;WebMonitor’s Dashboard provides in-depth internet usage and reporting&quot; title=&quot;WebMonitor’s Dashboard provides in-depth internet usage and reporting&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. WebMonitor’s Dashboard provides in-depth internet usage and reporting&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor’s main dashboard contains a healthy amount of information allowing administrators and IT managers to obtain important information such as:&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;See how many &lt;strong&gt;Malicious Sites&lt;/strong&gt; were &lt;strong&gt;blocked&lt;/strong&gt; and how many &lt;strong&gt;infected files detected&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt; &lt;/span&gt;&lt;/span&gt;View the &lt;strong&gt;Top 5 Users by bandwidth&lt;/strong&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Obtain &lt;strong&gt;Bandwidth Trends&lt;/strong&gt; such as &lt;strong&gt;Download/Upload&lt;/strong&gt;, &lt;strong&gt;Throughput and Latency&lt;/strong&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;Number of currently &lt;strong&gt;active web sessions&lt;/strong&gt;.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;Top 5 internet categories&lt;/strong&gt; of sites visited by the users&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;&lt;span style=&quot;font: 7pt 'Times New Roman';&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Top 5 Web Applications&lt;/strong&gt; used to access the internet&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Knowing which applications are used to access the internet is very important to any business. Web applications like YouTube, Bittorrent, etc. can be clearly identified and blocked, providing IT managers and administrators a ringside view of web utilisation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;On the flip side, if a certain application or website is blocked and a user tries to access it, he/she will encounter an &lt;strong&gt;Access Denied&lt;/strong&gt; page rendered by GFI WebMonitor. This notification should be enough for the user to be deterred from trying it again:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-2.jpg&quot; alt=&quot;WebMonitor effectively blocks malicious websites while notifying users trying to access it&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor effectively blocks malicious websites while notifying users trying to access it&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. WebMonitor effectively blocks malicious websites while notifying users trying to access it&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;For the purpose of this article, a deliberate attempt was made to download an ISO file using Bittorent. As per the policy the download page was part of the block policy. Hence GFI WebMonitor not only blocked the user from accessing the file, it also displayed the violation stating the user’s machine IP Address and the policy that was violated. This is a clear demonstration of how the management of web application can be effective.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Some of the other great dashboards include bandwidth insight. The following image shows the total download and upload for a specific period. The projected values and peaks can be easily traced as well.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-3b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor’s Bandwidth graphs&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-3.jpg&quot; alt=&quot;WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic&quot; /&gt;&lt;/a&gt;Figure 3. WebMonitor’s Bandwidth graphs help monitor the organisation’s upload/download traffic (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Another useful dashboard is that of &lt;strong&gt;activity&lt;/strong&gt;. This provides information about total users, their web request, and a projection of the next 30 days, as shown in the following image:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-4b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor allows detailed tracking&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-4.jpg&quot; alt=&quot;WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy&quot; /&gt;&lt;/a&gt;Figure 4. WebMonitor allows detailed tracking of current and projected user web requests with very high accuracy (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Security dashboard&lt;/strong&gt; is perhaps one of the most important. This shows all the breaches based on &lt;strong&gt;category&lt;/strong&gt;, &lt;strong&gt;type&lt;/strong&gt; and &lt;strong&gt;top blocked web based applications&lt;/strong&gt; that featured within certain policy violations.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-5b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;The Security dashboard allows tracking of web security incidents and security policy violations&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;The Security dashboard&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-5.jpg&quot; alt=&quot;The Security dashboard allows tracking of web security incidents and security policy violations&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;The Security dashboard allows tracking of web security incidents and security policy violations&quot; /&gt;&lt;/a&gt;Figure 5. The Security dashboard allows tracking of web security incidents and security policy violations&amp;nbsp;(click to enlarge)&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Running Web Reports&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The easiest way to manage and produce the information gathered is to run reports. The various categories provided allow the user to run and view information of Internet usage depending on management requirements. The following image shows the different options available on the left panel:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-6b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor internet web usage reports are highly customisable and provide detailed information&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor internet web usage reports&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-6.jpg&quot; alt=&quot;WebMonitor internet web usage reports are highly customisable and provide detailed information&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor internet web usage reports are highly customisable and provide detailed information&quot; /&gt;&lt;/a&gt;Figure 6. WebMonitor internet web usage reports are highly customisable and provide detailed information (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;But often management would rather take a pulse of the current situation. GFI WebMonitor caters to that requirement very well. The best place to look for instant information regarding certain key aspects of resource usage is the &lt;strong&gt;Web Insights &lt;/strong&gt;section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If management wanted to review the bandwidth information, the following dashboard would give that information readily:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-7b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;The Web Insight section keeps an overall track of internet usage&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;The Web Insight section&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-7.jpg&quot; alt=&quot;The Web Insight section keeps an overall track of internet usage&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;The Web Insight section keeps an overall track of internet usage&quot; /&gt;&lt;/a&gt;Figure 7. The Web Insight section keeps an overall track of internet usage (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This provides a percentage view of how much data contributes to &lt;strong&gt;download&lt;/strong&gt; or &lt;strong&gt;upload&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Security Insights&lt;/strong&gt; shows all current activities and concerns that needs attention:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-8b.jpg&quot; target=&quot;_blank&quot; class=&quot;jcepopup&quot; title=&quot;WebMonitor Security Insights dashboard displaying important web security reports&quot; data-mediabox=&quot;1&quot; data-mediabox-title=&quot;WebMonitor Security Insights dashboard&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-usage-reporting-block-malicious-content-8.jpg&quot; alt=&quot;WebMonitor Security Insights dashboard displaying important web security reports&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;WebMonitor Security Insights dashboard displaying important web security reports&quot; /&gt;&lt;/a&gt;Figure 8. WebMonitor Security Insights dashboard displaying important web security reports (click to enlarge)&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Conclusion&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;There is no doubt GFI WebMonitor becomes a very &lt;strong&gt;effective tool&lt;/strong&gt; that allows &lt;strong&gt;businesses to monitor&lt;/strong&gt; and &lt;strong&gt;control internet access&lt;/strong&gt; for &lt;strong&gt;employees&lt;/strong&gt;, &lt;strong&gt;guests&lt;/strong&gt; and other &lt;strong&gt;internet users&lt;/strong&gt;. Its intuitive interface allows administrators and IT Managers to quickly obtain the information they require but also put the necessary &lt;strong&gt;security policies&lt;/strong&gt; in place to &lt;strong&gt;minimise security threats&lt;/strong&gt; and &lt;strong&gt;internet resource abuse&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>Increase your Enterprise or SMB Organization Security via Internet Application &amp; User Control. Limit Threats and Internet Abuse at the Workplace</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-internet-application-user-control.html"/>
		<published>2016-05-24T18:00:50+10:00</published>
		<updated>2016-05-24T18:00:50+10:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-internet-application-user-control.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-1a.jpg&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor Enterprise and SMB intenet application control and monitoring&quot; /&gt;In this era of constantly pushing for &lt;strong&gt;more productivity&lt;/strong&gt; and &lt;strong&gt;greater efficiency&lt;/strong&gt;, it is essential that every resource devoted to &lt;strong&gt;web access within a business&lt;/strong&gt; is utilised for business benefit. Unless the company concerned is in the business of gaming or social media, etc. it is unwise to use resources like &lt;strong&gt;internet/web access&lt;/strong&gt;, and the infrastructure supporting it, for a purpose other than business. Like they say, “Nothing personal, just business”&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With this in mind, IT administrators have their hands full ensuring management of web applications and their communication with the Internet. The cost of not ensuring this is loss of productivity, misuse of bandwidth and potential security breaches. As a business it is prudent to block any unproductive web application e.g. gaming, social media etc. and restrict or strictly monitor file sharing to mitigate information leakages.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is widely accepted that in this area firewalls are of little use. Port blocking is not the preferred solution as it has a similar effect to a sledge hammer. What is required is the fineness of a scalpel to parse out the business usage from the personal and manage those business requirements accordingly. To be able to manage web application at such a level, it is essential to be able to identify and associate the request with its respective web application. Anything in line with business applications goes through, the rest are blocked.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is where WebMonitor excels in terms of delivering this level of precision and efficiency. It identifies access requests from supported applications using inspection technology and helps IT administrators to allow or block them. Hence, the administrators can allow certain applications for certain departments while blocking certain other applications as part of a blanket ban, thus enhancing the browsing experience of all users.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So, to achieve this, the process is to use the unified policy system of WebMonitor. The policies can be configured specifically for application control or, within the same policy, several application controls can be combined using other filtering technologies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a look at the policy panel of WebMonitor:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-1b.png&quot; target=&quot;_blank&quot; title=&quot;WebMonitor Policy Panel interface. Add, delete, create internet access policies with ease&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-1.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor Policy Panel interface. Add, delete, create internet access policies with ease (click to enlarge)&quot; /&gt;&lt;/a&gt;Figure 1. WebMonitor Policy Panel interface. Add, delete, create internet access policies with ease (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to discover the controls that are available against a certain application, the application needs to be dragged into the panel. For example, if we were to create a policy to block Google Drive we would be dragging that into the panel itself.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the related controls show up, we can select an application or application category the policy will apply to.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The rest of the configuration from this point will allow creating definitions for the following:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Filter options&lt;/li&gt;
&lt;li&gt;Scope of the policy&lt;/li&gt;
&lt;li&gt;Actions to be taken&lt;/li&gt;
&lt;li&gt;Handling of exceptions&lt;/li&gt;
&lt;li&gt;Managing notifications&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All of the above are ready to be implemented in a ‘drag – and – drop’ method. GFI WebMonitor will commence controlling access of the configured application to the Internet the moment the policy is saved.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So, going back to the example of creating the ‘&lt;strong&gt;block Google Drive&lt;/strong&gt;’ policy, the steps are quite simple:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1. Click on ‘&lt;strong&gt;Add Policy&lt;/strong&gt;’ as show in the following image:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-2.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor Click on the “Add Policy” button to being creating a policy to block internet access&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. Click on the “Add Policy” button to being creating a policy to block internet access&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enter a &lt;strong&gt;Name&lt;/strong&gt; and &lt;strong&gt;description&lt;/strong&gt; in the relevant fields:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-3b.png&quot; target=&quot;_blank&quot; title=&quot;GFI WebMonitor Adding policy name and description in GFI WebMonitor to block an application network-wide &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-3.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor Adding policy name and description in GFI WebMonitor to block an application network-wide&quot; /&gt;&lt;/a&gt;Figure 3. Adding policy name and description in WebMonitor to block an application network-wide (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3. As this policy applies to ‘&lt;strong&gt;all&lt;/strong&gt;’, at this moment there is no need to configure the scope. This can be done on a per &lt;strong&gt;user&lt;/strong&gt;, &lt;strong&gt;group&lt;/strong&gt; or &lt;strong&gt;IP address&lt;/strong&gt; only basis.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4. Drag in the &lt;strong&gt;Application Block&lt;/strong&gt; from the left panel (as shown in the following image), Select ‘&lt;strong&gt;Block&lt;/strong&gt;’ in the ‘Allow, Block, Warn, Monitor’ section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5. In the &lt;strong&gt;Application Category&lt;/strong&gt; section, select ‘&lt;strong&gt;File Transfer&lt;/strong&gt;’ as shown in the image below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-4b.png&quot; target=&quot;_blank&quot; title=&quot;GFI WebMonitor GFI WebMonitor: Blocking the File Transfer application category from the internet &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-4.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor GFI WebMonitor: Blocking the File Transfer application category from the internet &quot; /&gt;&lt;/a&gt;Figure 4. WebMonitor: Blocking the File Transfer application category from the internet (click to enlarge)&lt;/p&gt;
&lt;p&gt;6. Click on the ‘&lt;strong&gt;Applications&lt;/strong&gt;’ Tab and start typing ‘&lt;strong&gt;Google Drive&lt;/strong&gt;’ in the field. The drop down list will include Google Drive. Select it and then press enter. The application will be added. Now Click on Save.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We need to keep in mind that the policy is operational the moment the &lt;strong&gt;Save&lt;/strong&gt; button, located at the top right corner, is clicked.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now if any user tries to access the web application Google Drive, he/she will be presented with the ‘&lt;strong&gt;Block Page&lt;/strong&gt;’ rendered by GFI WebMonitor. At the same time, any Google Drive thick client installed on the user’s machine will not be able to connect to the Internet&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, and reiterated through the above steps, the process of creating and implementing a &lt;strong&gt;web access management policy&lt;/strong&gt; in &lt;strong&gt;WebMonitor&lt;/strong&gt; is quite simple. Given the length and breadth of configuration options within the applications and the scope, this proves to be a very &lt;strong&gt;powerful tool&lt;/strong&gt; that will make the task of managing and ensuring &lt;strong&gt;proper usage of web access&lt;/strong&gt;, simple and effective for IT Administrators in small and large &lt;strong&gt;enterprise networks&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-1a.jpg&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor Enterprise and SMB intenet application control and monitoring&quot; /&gt;In this era of constantly pushing for &lt;strong&gt;more productivity&lt;/strong&gt; and &lt;strong&gt;greater efficiency&lt;/strong&gt;, it is essential that every resource devoted to &lt;strong&gt;web access within a business&lt;/strong&gt; is utilised for business benefit. Unless the company concerned is in the business of gaming or social media, etc. it is unwise to use resources like &lt;strong&gt;internet/web access&lt;/strong&gt;, and the infrastructure supporting it, for a purpose other than business. Like they say, “Nothing personal, just business”&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With this in mind, IT administrators have their hands full ensuring management of web applications and their communication with the Internet. The cost of not ensuring this is loss of productivity, misuse of bandwidth and potential security breaches. As a business it is prudent to block any unproductive web application e.g. gaming, social media etc. and restrict or strictly monitor file sharing to mitigate information leakages.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;It is widely accepted that in this area firewalls are of little use. Port blocking is not the preferred solution as it has a similar effect to a sledge hammer. What is required is the fineness of a scalpel to parse out the business usage from the personal and manage those business requirements accordingly. To be able to manage web application at such a level, it is essential to be able to identify and associate the request with its respective web application. Anything in line with business applications goes through, the rest are blocked.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This is where WebMonitor excels in terms of delivering this level of precision and efficiency. It identifies access requests from supported applications using inspection technology and helps IT administrators to allow or block them. Hence, the administrators can allow certain applications for certain departments while blocking certain other applications as part of a blanket ban, thus enhancing the browsing experience of all users.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So, to achieve this, the process is to use the unified policy system of WebMonitor. The policies can be configured specifically for application control or, within the same policy, several application controls can be combined using other filtering technologies.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a look at the policy panel of WebMonitor:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-1b.png&quot; target=&quot;_blank&quot; title=&quot;WebMonitor Policy Panel interface. Add, delete, create internet access policies with ease&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-1.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor Policy Panel interface. Add, delete, create internet access policies with ease (click to enlarge)&quot; /&gt;&lt;/a&gt;Figure 1. WebMonitor Policy Panel interface. Add, delete, create internet access policies with ease (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to discover the controls that are available against a certain application, the application needs to be dragged into the panel. For example, if we were to create a policy to block Google Drive we would be dragging that into the panel itself.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the related controls show up, we can select an application or application category the policy will apply to.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The rest of the configuration from this point will allow creating definitions for the following:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;Filter options&lt;/li&gt;
&lt;li&gt;Scope of the policy&lt;/li&gt;
&lt;li&gt;Actions to be taken&lt;/li&gt;
&lt;li&gt;Handling of exceptions&lt;/li&gt;
&lt;li&gt;Managing notifications&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;All of the above are ready to be implemented in a ‘drag – and – drop’ method. GFI WebMonitor will commence controlling access of the configured application to the Internet the moment the policy is saved.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;So, going back to the example of creating the ‘&lt;strong&gt;block Google Drive&lt;/strong&gt;’ policy, the steps are quite simple:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;1. Click on ‘&lt;strong&gt;Add Policy&lt;/strong&gt;’ as show in the following image:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-2.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor Click on the “Add Policy” button to being creating a policy to block internet access&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;Figure 2. Click on the “Add Policy” button to being creating a policy to block internet access&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Enter a &lt;strong&gt;Name&lt;/strong&gt; and &lt;strong&gt;description&lt;/strong&gt; in the relevant fields:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-3b.png&quot; target=&quot;_blank&quot; title=&quot;GFI WebMonitor Adding policy name and description in GFI WebMonitor to block an application network-wide &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-3.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor Adding policy name and description in GFI WebMonitor to block an application network-wide&quot; /&gt;&lt;/a&gt;Figure 3. Adding policy name and description in WebMonitor to block an application network-wide (click to enlarge)&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;3. As this policy applies to ‘&lt;strong&gt;all&lt;/strong&gt;’, at this moment there is no need to configure the scope. This can be done on a per &lt;strong&gt;user&lt;/strong&gt;, &lt;strong&gt;group&lt;/strong&gt; or &lt;strong&gt;IP address&lt;/strong&gt; only basis.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;4. Drag in the &lt;strong&gt;Application Block&lt;/strong&gt; from the left panel (as shown in the following image), Select ‘&lt;strong&gt;Block&lt;/strong&gt;’ in the ‘Allow, Block, Warn, Monitor’ section.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;5. In the &lt;strong&gt;Application Category&lt;/strong&gt; section, select ‘&lt;strong&gt;File Transfer&lt;/strong&gt;’ as shown in the image below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-4b.png&quot; target=&quot;_blank&quot; title=&quot;GFI WebMonitor GFI WebMonitor: Blocking the File Transfer application category from the internet &quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-application-user-control-4.png&quot; alt=&quot;gfi-webmonitor-internet-application-user-control-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor GFI WebMonitor: Blocking the File Transfer application category from the internet &quot; /&gt;&lt;/a&gt;Figure 4. WebMonitor: Blocking the File Transfer application category from the internet (click to enlarge)&lt;/p&gt;
&lt;p&gt;6. Click on the ‘&lt;strong&gt;Applications&lt;/strong&gt;’ Tab and start typing ‘&lt;strong&gt;Google Drive&lt;/strong&gt;’ in the field. The drop down list will include Google Drive. Select it and then press enter. The application will be added. Now Click on Save.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We need to keep in mind that the policy is operational the moment the &lt;strong&gt;Save&lt;/strong&gt; button, located at the top right corner, is clicked.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now if any user tries to access the web application Google Drive, he/she will be presented with the ‘&lt;strong&gt;Block Page&lt;/strong&gt;’ rendered by GFI WebMonitor. At the same time, any Google Drive thick client installed on the user’s machine will not be able to connect to the Internet&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As mentioned earlier, and reiterated through the above steps, the process of creating and implementing a &lt;strong&gt;web access management policy&lt;/strong&gt; in &lt;strong&gt;WebMonitor&lt;/strong&gt; is quite simple. Given the length and breadth of configuration options within the applications and the scope, this proves to be a very &lt;strong&gt;powerful tool&lt;/strong&gt; that will make the task of managing and ensuring &lt;strong&gt;proper usage of web access&lt;/strong&gt;, simple and effective for IT Administrators in small and large &lt;strong&gt;enterprise networks&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>GFI WebMonitor Installation: Gateway / Proxy Mode, Upgrades, Supported O/S &amp; Architectures (32/64bit)</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-installation-setup-gateway-proxy-mode.html"/>
		<published>2016-03-14T17:11:18+11:00</published>
		<updated>2016-03-14T17:11:18+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-installation-setup-gateway-proxy-mode.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is an awarded &lt;strong&gt;gateway monitoring&lt;/strong&gt; and &lt;strong&gt;internet access control solution&lt;/strong&gt; designed to help organizations deal with &lt;strong&gt;user internet traffic&lt;/strong&gt;, &lt;strong&gt;monitor&lt;/strong&gt; and &lt;strong&gt;control bandwidth consumption&lt;/strong&gt;, &lt;strong&gt;protect computers&lt;/strong&gt; from &lt;strong&gt;internet malware/viruses&lt;/strong&gt; and other &lt;strong&gt;internet-based threats&lt;/strong&gt; plus much more. GFI WebMonitor supports two different &lt;strong&gt;installation modes&lt;/strong&gt;: &lt;strong&gt;Gateway mode&lt;/strong&gt; and &lt;strong&gt;Simple Proxy mode&lt;/strong&gt;. We’ll be looking into each mode and help administrators and engineers understand which is best, along with the prerequisites and caveats of each mode.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Proxy vs Gateway Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Proxy mode&lt;/strong&gt;, also named &lt;strong&gt;Simple Proxy mode&lt;/strong&gt; is the simplest way to install GFI WebMonitor. You can deploy this on any computer that has access to the internet. In&amp;nbsp;&lt;strong&gt;Simple Proxy mode&lt;/strong&gt;, all client web-browser traffic (HTTP/HTTPS) is directed through GFI WebMonitor. To enable this type of setup, you will need an internet facing router that can forward traffic and block ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With GFI WebMonitor functioning in &lt;strong&gt;Simple Proxy mode&lt;/strong&gt;, each client machine must also be configured to use the server as a web proxy for HTTP and HTTPS protocols. GFI WebMonitor comes with built-in &lt;strong&gt;Web Proxy Auto-Discovery&lt;/strong&gt; (&lt;strong&gt;WPAD&lt;/strong&gt;) &lt;strong&gt;server&lt;/strong&gt; functionality that makes the process easy - simply &lt;strong&gt;enable automatic discovery of proxy server&lt;/strong&gt; for each of your client machines and they should automatically find and use WebMonitor as a proxy. In case of a domain environment, it is best to regulate this setting using a &lt;strong&gt;Group Policy Object&lt;/strong&gt; (&lt;strong&gt;GPO&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When WebMonitor is configured to function in &lt;strong&gt;Internet Gateway mode&lt;/strong&gt;, all inbound and outbound client traffic will pass through GFI WebMonitor, irrespective of whether the traffic is HTTP or non-HTTP. With &lt;strong&gt;Internet Gateway mode&lt;/strong&gt;, the client browser &lt;strong&gt;does not need to point to any specific proxy&lt;/strong&gt; – all that’s required is to &lt;strong&gt;enable&lt;/strong&gt; the &lt;strong&gt;Transparent Proxy&lt;/strong&gt; function in GFI WebMonitor.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Supported OS &amp;amp; Architectures&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whether functioning as a gateway or a web proxy, GFI WebMonitor processes all web traffic. For a smooth operation that amounts to using a server architecture capable of handling all the requests every day. When the environment is small (10-20 nodes), for instance, a 2 GHz processor and 4 GB RAM minimum with a 32-bit Windows operating system architecture will suffice.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Larger environments, such as those running the Windows Server operating system on a minimum of 8 GB RAM and multi-core CPU will require the 64-bit architecture. GFI WebMonitor works with both 32- as well as 64-bit Windows operating system architectures starting from Windows 2003 and Windows Vista.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Installation &amp;amp; Upgrading&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When installing for the first time, GFI WebMonitor starts by detecting its prerequisites. If the business is already using GFI WebMonitor, the process determines the prerequisites according to the older product instance. If the installation kit encounters an older instance, it imports the previous settings and redeploys them after completing the installation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whether installing for the first time or upgrading an older installation, the installation kit looks for any setup prerequisites necessary and installs them automatically. However, some prerequisites may require user interaction and these will come up as separate installation processes with their own user interfaces.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Installing GFI WebMonitor&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As with all GFI products, installation is a very easy follow-the-bouncing-ball process. Once the download of GFI WebMonitor is complete, execute the installer using an account with administrative privileges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If WebMonitor has been recently downloaded, you can safely skip the newer build check. When ready, &lt;strong&gt;click Next&lt;/strong&gt; to proceed:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-1.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Optional check for a new WebMonitor edition during installation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Optional check for a new WebMonitor edition during installation&lt;/p&gt;
&lt;p&gt;You will need to fill in the username and/or the IP address that will have administrative access to the web-interface of GFI WebMonitor, then &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; to select the folder to install GFI WebMonitor and finally start the installation process:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-2.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Selecting Host and Username that are allowed to access the  WebMonitor Administration interface.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Selecting Host and Username that are allowed to access the WebMonitor Administration interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the installation process is complete, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Finish&lt;/strong&gt; to finalize the setup and leave the &lt;strong&gt;Open Management Console&lt;/strong&gt; &lt;strong&gt;checked&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-3.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Installation complete – Open Management Console&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Installation complete – Open Management Console&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After this, the welcome screen of the &lt;strong&gt;GFI WebMonitor Configuration Wizard&lt;/strong&gt; appears. This will allow you to configure the server to operate in &lt;strong&gt;Simple Proxy Mode&lt;/strong&gt; or &lt;strong&gt;Gateway Mode&lt;/strong&gt;. At this point, it is recommended you &lt;strong&gt;enable JavaScript&lt;/strong&gt; in Internet Explorer or the web browser of your choice before proceeding further:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-4b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-4a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-4a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;The welcome screen once WebMonitor installation has completed&quot; /&gt;&lt;/a&gt;Figure 4. The welcome screen once WebMonitor installation has completed&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After &lt;strong&gt;clicking&lt;/strong&gt; on &lt;strong&gt;Get Started&lt;/strong&gt; to proceed, we need to select which of the two modes GFI WebMonitor will be using. We selected &lt;strong&gt;Gateway mode&lt;/strong&gt; to ensure we get the most out of the product as all internet traffic will flow through our server and provide us with greater granularity &amp;amp; control:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-5b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-5a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-5a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Selecting between Simple Proxy and Gateway mode&quot; /&gt;&lt;/a&gt;Figure 5. Selecting between Simple Proxy and Gateway mode&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Transparent Proxy&lt;/strong&gt; can be &lt;strong&gt;enabled&lt;/strong&gt; at this stage, allowing web browser clients to automatically configure themselves using the WPAD protocol. WebMonitor shows a simple network diagram to help understand how network traffic will flow to and from the internet:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-6b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-6a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-6a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Internet traffic flow in WebMonitor’s Gateway Mode&quot; /&gt;&lt;/a&gt;Figure 6. Internet traffic flow in WebMonitor’s Gateway Mode&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Administrators can select the port at which the Transparent Proxy will function and then &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Save&lt;/strong&gt; and &lt;strong&gt;Test Transparent Proxy&lt;/strong&gt;. GFI WebMonitor will confirm Transparent Proxy is working properly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; to see your trial license key or enter a new license key. &lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;Next&lt;/strong&gt; to &lt;strong&gt;enable&lt;/strong&gt; &lt;strong&gt;HTTPS scanning&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;HTTPS Scanning&lt;/strong&gt; gives you visibility into secure surfing sessions that can threaten the network's security. Malicious content may be included in sites visited or files downloaded over HTTPS. The HTTPS filtering mechanism within GFI WebMonitor enables you to scan this traffic. There are two ways to configure &lt;strong&gt;HTTPS Proxy Scanning Settings&lt;/strong&gt;, via the integrated &lt;strong&gt;HTTPS Scanning Wizard&lt;/strong&gt; or manually.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Thanks to GFI WebMonitor’s flexibility, administrators can add any HTTPS site to the &lt;strong&gt;HTTPS scanning exclusion list&lt;/strong&gt; so that it bypasses inspection.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If &lt;strong&gt;HTTPS Scanning&lt;/strong&gt; is &lt;strong&gt;disabled&lt;/strong&gt;, GFI WebMonitor enables users to browse HTTPS websites without decrypting and inspecting their contents.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When ready, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; again and provide the full path of the database. &lt;strong&gt;Click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; again to enter and validate the Admin username and password. Then, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; to restart the services. You can now enter your email details and &lt;strong&gt;click Finish&lt;/strong&gt; to end the installation.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-7b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-7a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-7a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor’s main control panel&quot; /&gt;&lt;/a&gt;Figure 7. GFI WebMonitor’s main control panel&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the installation and initial configuration of GFI WebMonitor is complete, the system will begin gathering useful information on our users’ internet usage.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we examined &lt;strong&gt;WebMonitor Simple Proxy&lt;/strong&gt; and &lt;strong&gt;Gateway installation mode&lt;/strong&gt; and saw the benefits of each method. We proceeded with the &lt;strong&gt;Gateway mode&lt;/strong&gt; to provide us with &lt;strong&gt;greater flexibility&lt;/strong&gt;, &lt;strong&gt;granularity&lt;/strong&gt; and &lt;strong&gt;reporting&lt;/strong&gt; of our &lt;strong&gt;users’ internet usage&lt;/strong&gt;. The next articles will continue covering &lt;strong&gt;in-depth functionality&lt;/strong&gt; and &lt;strong&gt;reporting&lt;/strong&gt; of GFI’s WebMonitor.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is an awarded &lt;strong&gt;gateway monitoring&lt;/strong&gt; and &lt;strong&gt;internet access control solution&lt;/strong&gt; designed to help organizations deal with &lt;strong&gt;user internet traffic&lt;/strong&gt;, &lt;strong&gt;monitor&lt;/strong&gt; and &lt;strong&gt;control bandwidth consumption&lt;/strong&gt;, &lt;strong&gt;protect computers&lt;/strong&gt; from &lt;strong&gt;internet malware/viruses&lt;/strong&gt; and other &lt;strong&gt;internet-based threats&lt;/strong&gt; plus much more. GFI WebMonitor supports two different &lt;strong&gt;installation modes&lt;/strong&gt;: &lt;strong&gt;Gateway mode&lt;/strong&gt; and &lt;strong&gt;Simple Proxy mode&lt;/strong&gt;. We’ll be looking into each mode and help administrators and engineers understand which is best, along with the prerequisites and caveats of each mode.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Proxy vs Gateway Mode&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Proxy mode&lt;/strong&gt;, also named &lt;strong&gt;Simple Proxy mode&lt;/strong&gt; is the simplest way to install GFI WebMonitor. You can deploy this on any computer that has access to the internet. In&amp;nbsp;&lt;strong&gt;Simple Proxy mode&lt;/strong&gt;, all client web-browser traffic (HTTP/HTTPS) is directed through GFI WebMonitor. To enable this type of setup, you will need an internet facing router that can forward traffic and block ports.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With GFI WebMonitor functioning in &lt;strong&gt;Simple Proxy mode&lt;/strong&gt;, each client machine must also be configured to use the server as a web proxy for HTTP and HTTPS protocols. GFI WebMonitor comes with built-in &lt;strong&gt;Web Proxy Auto-Discovery&lt;/strong&gt; (&lt;strong&gt;WPAD&lt;/strong&gt;) &lt;strong&gt;server&lt;/strong&gt; functionality that makes the process easy - simply &lt;strong&gt;enable automatic discovery of proxy server&lt;/strong&gt; for each of your client machines and they should automatically find and use WebMonitor as a proxy. In case of a domain environment, it is best to regulate this setting using a &lt;strong&gt;Group Policy Object&lt;/strong&gt; (&lt;strong&gt;GPO&lt;/strong&gt;).&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When WebMonitor is configured to function in &lt;strong&gt;Internet Gateway mode&lt;/strong&gt;, all inbound and outbound client traffic will pass through GFI WebMonitor, irrespective of whether the traffic is HTTP or non-HTTP. With &lt;strong&gt;Internet Gateway mode&lt;/strong&gt;, the client browser &lt;strong&gt;does not need to point to any specific proxy&lt;/strong&gt; – all that’s required is to &lt;strong&gt;enable&lt;/strong&gt; the &lt;strong&gt;Transparent Proxy&lt;/strong&gt; function in GFI WebMonitor.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Supported OS &amp;amp; Architectures&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whether functioning as a gateway or a web proxy, GFI WebMonitor processes all web traffic. For a smooth operation that amounts to using a server architecture capable of handling all the requests every day. When the environment is small (10-20 nodes), for instance, a 2 GHz processor and 4 GB RAM minimum with a 32-bit Windows operating system architecture will suffice.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Larger environments, such as those running the Windows Server operating system on a minimum of 8 GB RAM and multi-core CPU will require the 64-bit architecture. GFI WebMonitor works with both 32- as well as 64-bit Windows operating system architectures starting from Windows 2003 and Windows Vista.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Installation &amp;amp; Upgrading&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When installing for the first time, GFI WebMonitor starts by detecting its prerequisites. If the business is already using GFI WebMonitor, the process determines the prerequisites according to the older product instance. If the installation kit encounters an older instance, it imports the previous settings and redeploys them after completing the installation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Whether installing for the first time or upgrading an older installation, the installation kit looks for any setup prerequisites necessary and installs them automatically. However, some prerequisites may require user interaction and these will come up as separate installation processes with their own user interfaces.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Installing GFI WebMonitor&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;As with all GFI products, installation is a very easy follow-the-bouncing-ball process. Once the download of GFI WebMonitor is complete, execute the installer using an account with administrative privileges.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If WebMonitor has been recently downloaded, you can safely skip the newer build check. When ready, &lt;strong&gt;click Next&lt;/strong&gt; to proceed:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-1.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Optional check for a new WebMonitor edition during installation&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Optional check for a new WebMonitor edition during installation&lt;/p&gt;
&lt;p&gt;You will need to fill in the username and/or the IP address that will have administrative access to the web-interface of GFI WebMonitor, then &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; to select the folder to install GFI WebMonitor and finally start the installation process:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-2.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Selecting Host and Username that are allowed to access the  WebMonitor Administration interface.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Selecting Host and Username that are allowed to access the WebMonitor Administration interface.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the installation process is complete, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Finish&lt;/strong&gt; to finalize the setup and leave the &lt;strong&gt;Open Management Console&lt;/strong&gt; &lt;strong&gt;checked&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-3.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Installation complete – Open Management Console&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Installation complete – Open Management Console&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After this, the welcome screen of the &lt;strong&gt;GFI WebMonitor Configuration Wizard&lt;/strong&gt; appears. This will allow you to configure the server to operate in &lt;strong&gt;Simple Proxy Mode&lt;/strong&gt; or &lt;strong&gt;Gateway Mode&lt;/strong&gt;. At this point, it is recommended you &lt;strong&gt;enable JavaScript&lt;/strong&gt; in Internet Explorer or the web browser of your choice before proceeding further:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-4b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-4a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-4a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;The welcome screen once WebMonitor installation has completed&quot; /&gt;&lt;/a&gt;Figure 4. The welcome screen once WebMonitor installation has completed&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After &lt;strong&gt;clicking&lt;/strong&gt; on &lt;strong&gt;Get Started&lt;/strong&gt; to proceed, we need to select which of the two modes GFI WebMonitor will be using. We selected &lt;strong&gt;Gateway mode&lt;/strong&gt; to ensure we get the most out of the product as all internet traffic will flow through our server and provide us with greater granularity &amp;amp; control:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-5b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-5a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-5a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Selecting between Simple Proxy and Gateway mode&quot; /&gt;&lt;/a&gt;Figure 5. Selecting between Simple Proxy and Gateway mode&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Transparent Proxy&lt;/strong&gt; can be &lt;strong&gt;enabled&lt;/strong&gt; at this stage, allowing web browser clients to automatically configure themselves using the WPAD protocol. WebMonitor shows a simple network diagram to help understand how network traffic will flow to and from the internet:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-6b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-6a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-6a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Internet traffic flow in WebMonitor’s Gateway Mode&quot; /&gt;&lt;/a&gt;Figure 6. Internet traffic flow in WebMonitor’s Gateway Mode&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Administrators can select the port at which the Transparent Proxy will function and then &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Save&lt;/strong&gt; and &lt;strong&gt;Test Transparent Proxy&lt;/strong&gt;. GFI WebMonitor will confirm Transparent Proxy is working properly.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; to see your trial license key or enter a new license key. &lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;Next&lt;/strong&gt; to &lt;strong&gt;enable&lt;/strong&gt; &lt;strong&gt;HTTPS scanning&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;HTTPS Scanning&lt;/strong&gt; gives you visibility into secure surfing sessions that can threaten the network's security. Malicious content may be included in sites visited or files downloaded over HTTPS. The HTTPS filtering mechanism within GFI WebMonitor enables you to scan this traffic. There are two ways to configure &lt;strong&gt;HTTPS Proxy Scanning Settings&lt;/strong&gt;, via the integrated &lt;strong&gt;HTTPS Scanning Wizard&lt;/strong&gt; or manually.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Thanks to GFI WebMonitor’s flexibility, administrators can add any HTTPS site to the &lt;strong&gt;HTTPS scanning exclusion list&lt;/strong&gt; so that it bypasses inspection.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If &lt;strong&gt;HTTPS Scanning&lt;/strong&gt; is &lt;strong&gt;disabled&lt;/strong&gt;, GFI WebMonitor enables users to browse HTTPS websites without decrypting and inspecting their contents.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When ready, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; again and provide the full path of the database. &lt;strong&gt;Click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; again to enter and validate the Admin username and password. Then, &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;Next&lt;/strong&gt; to restart the services. You can now enter your email details and &lt;strong&gt;click Finish&lt;/strong&gt; to end the installation.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;a href=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-7b.png&quot; target=&quot;_blank&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-installation-setup-gateway-proxy-mode-7a.png&quot; alt=&quot;gfi-webmonitor-installation-setup-gateway-proxy-mode-7a&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI WebMonitor’s main control panel&quot; /&gt;&lt;/a&gt;Figure 7. GFI WebMonitor’s main control panel&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the installation and initial configuration of GFI WebMonitor is complete, the system will begin gathering useful information on our users’ internet usage.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we examined &lt;strong&gt;WebMonitor Simple Proxy&lt;/strong&gt; and &lt;strong&gt;Gateway installation mode&lt;/strong&gt; and saw the benefits of each method. We proceeded with the &lt;strong&gt;Gateway mode&lt;/strong&gt; to provide us with &lt;strong&gt;greater flexibility&lt;/strong&gt;, &lt;strong&gt;granularity&lt;/strong&gt; and &lt;strong&gt;reporting&lt;/strong&gt; of our &lt;strong&gt;users’ internet usage&lt;/strong&gt;. The next articles will continue covering &lt;strong&gt;in-depth functionality&lt;/strong&gt; and &lt;strong&gt;reporting&lt;/strong&gt; of GFI’s WebMonitor.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>GFI WebMonitor: Monitor &amp; Secure User Internet Activity, Stop Illegal File Sharing - Downloads (Torrents), Web Content Filtering For Organizations</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting.html"/>
		<published>2016-02-07T12:11:34+11:00</published>
		<updated>2016-02-07T12:11:34+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-1.jpg&quot; alt=&quot;gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-1&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Stop Illegal downloading at work - GFI Webmonitor&quot; /&gt;In our previous article we analysed the &lt;strong&gt;risks and implications involved for businesses&lt;/strong&gt; when there are no security or &lt;strong&gt;restriction policies and systems&lt;/strong&gt; in place to &lt;strong&gt;stop users&lt;/strong&gt; &lt;strong&gt;distributing illegal content &lt;/strong&gt;(torrents). We also spoke about &lt;strong&gt;unauthorized access to company systems&lt;/strong&gt;, &lt;strong&gt;sharing sensitive company information&lt;/strong&gt; and more. This article talks about how specialized systems such as &lt;strong&gt;WebMonitor&lt;/strong&gt; are &lt;strong&gt;capable&lt;/strong&gt; of helping businesses &lt;strong&gt;stop torrent applications&lt;/strong&gt; accessing the internet, &lt;strong&gt;control the websites users access&lt;/strong&gt;, &lt;strong&gt;block&lt;/strong&gt; &lt;strong&gt;remote control software&lt;/strong&gt; (Teamviewer, Remote Desktop, Ammy Admin etc) and put a &lt;strong&gt;stop&lt;/strong&gt; to &lt;strong&gt;users wasting bandwidth&lt;/strong&gt;, &lt;strong&gt;time&lt;/strong&gt; and &lt;strong&gt;company money&lt;/strong&gt; while at work.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is more than just an application. It can help IT departments design and enforce internet security policies by blocking or allowing specific applications and services accessing the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is also capable of providing detailed reports of users’ web activity – a useful feature that ensure users are not accessing online resources they shouldn’t, and provide the business with the ability to check users’ activities in case of an attack, malware or security incident.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is not a new product - it carries over a decade of development and has served millions of users since its introduction into the IT market. With awards from popular IT security magazines, Security Experts, IT websites and more, it’s the preferred solution when it comes to a complete web filtering and security monitoring solution.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Blocking Unwanted Applications: Application Control – Not Port Control&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-2.jpg&quot; alt=&quot;Blocking Unwanted Applications: Application Control&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Blocking Unwanted Applications: Application Control&quot; /&gt;Senior IT Managers, engineers and administrators surely remember the days where controlling TCP/UDP ports at the Firewall level was enough to block or provide applications access to the internet. For some years now, this is no longer a valid way of application control, as most ‘unwanted’ applications can smartly use common ports such as HTTP (80) or HTTPS (443) to circumvent security policies, passing inspection and freely accessing the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to effectively block unwanted applications, businesses must realize that it is necessary to have a security Gateway device that can &lt;strong&gt;correctly identify the applications&lt;/strong&gt; requesting access to the internet, regardless the port they are trying to use – aka &lt;strong&gt;Application Control&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Application Control&lt;/strong&gt; is a sophisticated technique that requires upper layer (OSI Model) inspection of data packets as they flow through the gateway or proxy, e.g. GFI WebMonitor. The gateway/proxy executes deep packet level inspection to identify the application requesting access to the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to correctly identify the application the gateway must be aware of it, which means it has to be listed in its local database.&lt;/p&gt;
&lt;h2&gt;The Practical Benefits Of Internet Application Control &amp;amp; Web Monitoring Solution&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a more practical look at the benefits an organization has when implementing an &lt;strong&gt;Application Control&lt;/strong&gt; &amp;amp; &lt;strong&gt;Web Monitoring&lt;/strong&gt; solution:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;
&lt;div&gt;Block file sharing applications such as Torrents&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Stop users distributing illegal content (games, applications, movies, music, etc)&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Block remote access applications such as TeamViewer, Remote Desktop, VNC, Ammy Admin and more.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Stop unauthorized access to the organization’s systems via remote access applications&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Block access to online storage services such as DropBox, Google Drive, Hubic and others&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Avoid users sharing sensitive information such as company documents via online storage services&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Save valuable bandwidth for the organization, its users, remote branches and VPN users&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Protect the network from malware, viruses and other harmful software downloadable via the internet&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Properly enforce different security policies to different users and groups&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Protect against possible security breaches and minimize responsibility in case of an infringement incident&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;And much more&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above list contains a few of the major benefits that solutions such as WebMonitor can offer to organizations.&lt;/p&gt;
&lt;h2&gt;Why Web Monitoring &amp;amp; Content Filtering is Considered Mandatory&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Web Monitoring is a very sensitive topic for many organizations and its users, mainly because users do not want others to know what they are doing on their computer. The majority of users perceive web monitoring as spying on them to see what sites they are accessing and if they are wasting time on websites and internet resources unrelated to work, however, users do not understand the problems and security risks that are mostly likely to arise if no monitoring or content filtering mechanism is in place.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In fact the damage caused by users irresponsibly visiting high-risk sites and surfing the internet without any limits is way bigger than most companies might think and there are some really great examples that help prove this point. The USA FBI site has a page with examples of internet scams and risks from social media network sites.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If we assume your organization is one of the luckiest ones that hasn’t been hit (yet) from irresponsible user internet activities, then we are here to assure you that &lt;strong&gt;it’s simply a matter of time&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-3.jpg&quot; alt=&quot;Stop wasting company bandwidth from user downloads&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Stop wasting company bandwidth from user downloads&quot; /&gt;Apart from the imminent security risk, users who have uncontrollable access are also wasting bandwidth – that’s bandwidth the organization is paying for - and are likely to slow down the internet for the rest who are legitimately trying to get work done. In cases where VPNs are running over the same lines then VPN users, remote branches and mobile users are most likely to experience slow connection speeds when accessing the organization’s resources over the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This problem becomes even more evident when asymmetrical WAN lines are in use, such as ADSL lines. With asymmetrical WAN lines, a single user who is uncontrollably uploading photos, movies (via torrent) or other content can affect all other users downloading since bottlenecks can easily occur when one of the two streams (downstream or upstream) is in heavy usage. This is a main characteristic of asymmetrical WAN lines.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, if there is an organization security policy in place it’s most likely to contain fair internet usage guidelines for users and specify what they can and cannot do using the organization’s internet resources. The only way to enforce such a policy is through a sophisticated web monitoring &amp;amp; policy enforcement mechanism such as GFI WebMonitor.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we analysed how specialized web monitoring and control application software, such as WebMonitor, are able to control which user applications are able to access the internet, control websites users within an organization can access, block internet content while saving valuable bandwidth. With such solutions, organizations are able to enforce their internet security policies while at the same time protecting themselves from unauthorized access to their systems (remote desktop software), stop illegal activities such as torrent file sharing and more.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-1.jpg&quot; alt=&quot;gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-1&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Stop Illegal downloading at work - GFI Webmonitor&quot; /&gt;In our previous article we analysed the &lt;strong&gt;risks and implications involved for businesses&lt;/strong&gt; when there are no security or &lt;strong&gt;restriction policies and systems&lt;/strong&gt; in place to &lt;strong&gt;stop users&lt;/strong&gt; &lt;strong&gt;distributing illegal content &lt;/strong&gt;(torrents). We also spoke about &lt;strong&gt;unauthorized access to company systems&lt;/strong&gt;, &lt;strong&gt;sharing sensitive company information&lt;/strong&gt; and more. This article talks about how specialized systems such as &lt;strong&gt;WebMonitor&lt;/strong&gt; are &lt;strong&gt;capable&lt;/strong&gt; of helping businesses &lt;strong&gt;stop torrent applications&lt;/strong&gt; accessing the internet, &lt;strong&gt;control the websites users access&lt;/strong&gt;, &lt;strong&gt;block&lt;/strong&gt; &lt;strong&gt;remote control software&lt;/strong&gt; (Teamviewer, Remote Desktop, Ammy Admin etc) and put a &lt;strong&gt;stop&lt;/strong&gt; to &lt;strong&gt;users wasting bandwidth&lt;/strong&gt;, &lt;strong&gt;time&lt;/strong&gt; and &lt;strong&gt;company money&lt;/strong&gt; while at work.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is more than just an application. It can help IT departments design and enforce internet security policies by blocking or allowing specific applications and services accessing the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is also capable of providing detailed reports of users’ web activity – a useful feature that ensure users are not accessing online resources they shouldn’t, and provide the business with the ability to check users’ activities in case of an attack, malware or security incident.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;WebMonitor is not a new product - it carries over a decade of development and has served millions of users since its introduction into the IT market. With awards from popular IT security magazines, Security Experts, IT websites and more, it’s the preferred solution when it comes to a complete web filtering and security monitoring solution.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Blocking Unwanted Applications: Application Control – Not Port Control&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-2.jpg&quot; alt=&quot;Blocking Unwanted Applications: Application Control&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Blocking Unwanted Applications: Application Control&quot; /&gt;Senior IT Managers, engineers and administrators surely remember the days where controlling TCP/UDP ports at the Firewall level was enough to block or provide applications access to the internet. For some years now, this is no longer a valid way of application control, as most ‘unwanted’ applications can smartly use common ports such as HTTP (80) or HTTPS (443) to circumvent security policies, passing inspection and freely accessing the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to effectively block unwanted applications, businesses must realize that it is necessary to have a security Gateway device that can &lt;strong&gt;correctly identify the applications&lt;/strong&gt; requesting access to the internet, regardless the port they are trying to use – aka &lt;strong&gt;Application Control&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Application Control&lt;/strong&gt; is a sophisticated technique that requires upper layer (OSI Model) inspection of data packets as they flow through the gateway or proxy, e.g. GFI WebMonitor. The gateway/proxy executes deep packet level inspection to identify the application requesting access to the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In order to correctly identify the application the gateway must be aware of it, which means it has to be listed in its local database.&lt;/p&gt;
&lt;h2&gt;The Practical Benefits Of Internet Application Control &amp;amp; Web Monitoring Solution&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s take a more practical look at the benefits an organization has when implementing an &lt;strong&gt;Application Control&lt;/strong&gt; &amp;amp; &lt;strong&gt;Web Monitoring&lt;/strong&gt; solution:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li&gt;
&lt;div&gt;Block file sharing applications such as Torrents&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Stop users distributing illegal content (games, applications, movies, music, etc)&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Block remote access applications such as TeamViewer, Remote Desktop, VNC, Ammy Admin and more.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Stop unauthorized access to the organization’s systems via remote access applications&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Block access to online storage services such as DropBox, Google Drive, Hubic and others&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Avoid users sharing sensitive information such as company documents via online storage services&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Save valuable bandwidth for the organization, its users, remote branches and VPN users&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Protect the network from malware, viruses and other harmful software downloadable via the internet&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Properly enforce different security policies to different users and groups&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;Protect against possible security breaches and minimize responsibility in case of an infringement incident&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div&gt;And much more&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The above list contains a few of the major benefits that solutions such as WebMonitor can offer to organizations.&lt;/p&gt;
&lt;h2&gt;Why Web Monitoring &amp;amp; Content Filtering is Considered Mandatory&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Web Monitoring is a very sensitive topic for many organizations and its users, mainly because users do not want others to know what they are doing on their computer. The majority of users perceive web monitoring as spying on them to see what sites they are accessing and if they are wasting time on websites and internet resources unrelated to work, however, users do not understand the problems and security risks that are mostly likely to arise if no monitoring or content filtering mechanism is in place.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In fact the damage caused by users irresponsibly visiting high-risk sites and surfing the internet without any limits is way bigger than most companies might think and there are some really great examples that help prove this point. The USA FBI site has a page with examples of internet scams and risks from social media network sites.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;If we assume your organization is one of the luckiest ones that hasn’t been hit (yet) from irresponsible user internet activities, then we are here to assure you that &lt;strong&gt;it’s simply a matter of time&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-internet-filtering-block-torrents-applications-websites-reporting-3.jpg&quot; alt=&quot;Stop wasting company bandwidth from user downloads&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;Stop wasting company bandwidth from user downloads&quot; /&gt;Apart from the imminent security risk, users who have uncontrollable access are also wasting bandwidth – that’s bandwidth the organization is paying for - and are likely to slow down the internet for the rest who are legitimately trying to get work done. In cases where VPNs are running over the same lines then VPN users, remote branches and mobile users are most likely to experience slow connection speeds when accessing the organization’s resources over the internet.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This problem becomes even more evident when asymmetrical WAN lines are in use, such as ADSL lines. With asymmetrical WAN lines, a single user who is uncontrollably uploading photos, movies (via torrent) or other content can affect all other users downloading since bottlenecks can easily occur when one of the two streams (downstream or upstream) is in heavy usage. This is a main characteristic of asymmetrical WAN lines.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, if there is an organization security policy in place it’s most likely to contain fair internet usage guidelines for users and specify what they can and cannot do using the organization’s internet resources. The only way to enforce such a policy is through a sophisticated web monitoring &amp;amp; policy enforcement mechanism such as GFI WebMonitor.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we analysed how specialized web monitoring and control application software, such as WebMonitor, are able to control which user applications are able to access the internet, control websites users within an organization can access, block internet content while saving valuable bandwidth. With such solutions, organizations are able to enforce their internet security policies while at the same time protecting themselves from unauthorized access to their systems (remote desktop software), stop illegal activities such as torrent file sharing and more.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>Dealing with User Copyright Infringement (Torrents), Data Loss Prevention (DLP), Unauthorized Remote Control Applications (Teamviewer, RDP) &amp; Ransomware in the Business Environment</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats.html"/>
		<published>2016-01-25T16:20:34+11:00</published>
		<updated>2016-01-25T16:20:34+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-1.jpg&quot; alt=&quot;GFI WebMonitor - Control user copyright infringement in the Business Environment&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor - Control user copyright infringement in the Business Environment&quot; /&gt;One of the largest &lt;strong&gt;problems faced by organizations&lt;/strong&gt; of any size is &lt;strong&gt;effectively controlling user internet access &lt;/strong&gt;(from laptops, mobile devices, workstations etc), &lt;strong&gt;minimizing&lt;/strong&gt; the &lt;strong&gt;security threats&lt;/strong&gt; for the organization (ransomware – data loss prevention), &lt;strong&gt;user copyright infringement&lt;/strong&gt; (torrent downloading/sharing movies, games, music etc) and &lt;strong&gt;discover where valuable WAN-Internet bandwidth&lt;/strong&gt; is being &lt;strong&gt;wasted&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Organizations clearly understand that using a &lt;strong&gt;Firewall is no longer adequate&lt;/strong&gt; to control the websites its &lt;strong&gt;users are able to access&lt;/strong&gt;, &lt;strong&gt;remote control applications&lt;/strong&gt; (Teamviewer, Radmin, Ammyy Admin, Remote desktop etc), &lt;strong&gt;file sharing applications&lt;/strong&gt; - &lt;strong&gt;Bittorrent clients&lt;/strong&gt; (uTorrent, BitComet, Deluge, qBittorrent etc), &lt;strong&gt;online cloud storage services&lt;/strong&gt; (Dropbox, OneDrive, Google Drive, Box, Amazon Cloud Drive, Hubic etc) and other services and applications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The truth is that &lt;strong&gt;web monitoring applications&lt;/strong&gt; such as GFI’s WebMonitor are a lot more than just a web proxy or internet monitoring solution.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Web monitoring applications&lt;/strong&gt; are &lt;strong&gt;essential&lt;/strong&gt; for any type or size of network as they offer many advantages:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They stop users from abusing internet resources&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They block file-sharing applications and illegal content sharing&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They stop users using cloud-based file services to upload sensitive documents, for example saving company files to their personal DropBox, Google Drive etc.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They stop remote control applications connecting to the internet (e.g Teamviewer, Remote Desktop, Ammy Admin etc)&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They ensure user productivity is kept high by allowing access to approved internet resources and sites&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They eliminate referral ad sites and block abusive content&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They support reputation blocking to automatically filter websites based on their reputation&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They help IT departments enforce security policies to users and groups&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They provide unbelievable flexibility allowing any type or size of organization to customise its internet usage policy to its requirements&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;The Risk In The Business Environment – Illegal Downloading&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-2.jpg&quot; alt=&quot;GFI WebMonitor The Risk in the Business Environment – Illegal Downloading&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor The Risk in the Business Environment – Illegal Downloading&quot; /&gt;Most Businesses are completely unaware of how serious these matters are and the risks they are taking while dealing with other ‘more important’ matters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Companies such as the &lt;strong&gt;Motion Picture Association of America&lt;/strong&gt; (&lt;strong&gt;MPAA&lt;/strong&gt;) and the &lt;strong&gt;Recording Industry Association of America&lt;/strong&gt; (&lt;strong&gt;RIAA&lt;/strong&gt;) are in a continuous battle suing and fighting with companies, ISPs and even home users for illegally distributing movies and music.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Many users are aware of this and are now turning to their company’s internet resources, which in many cases offer faster and unlimited data transfer, to download their illegal content such as movies, games, music and other material.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An employer or business can be easily held responsible for the actions of its employees when it comes to illegal download activities, especially if no policies or systems are in place.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the case of an investigation, if the necessary security policies and web monitoring systems are in place with the purpose of preventing copyright infringement and illegal downloading, businesses are less vulnerable to the illegal implications of their users, plus it allows them to track down and find the person responsible.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Data Loss Prevention (DLP) – Stop Users From Uploading Sensitive/Critical Documents&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-2a.jpg&quot; alt=&quot;GFI WebMonitor Stop Users from Uploading Sensitive - Critical Company Documents&quot; width=&quot;250&quot; height=&quot;142&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor Stop Users from Uploading Sensitive - Critical Company Documents&quot; /&gt;While illegal downloading is one major threat for businesses, stopping users &lt;strong&gt;sharing company data and sensitive information&lt;/strong&gt; (aka &lt;strong&gt;Data Loss Prevention&lt;/strong&gt; or &lt;strong&gt;DLP&lt;/strong&gt;) is another big problem.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the explosion of (free) cloud-based storage services such as DropBox, OneDrive, Google Drive and others, users can quickly and easily upload any type of document directly from their workplace to their personal cloud storage and instantaneously share it with anyone in the world, without the company’s consent or knowledge.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The smartly designed cloud-storage applications are able to use HTTP &amp;amp; HTTPS to transfer files, and circumvent firewall security policies and other types of protection.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;More specialised application proxies such as GFI’s WebMonitor can effectively detect and block these applications, saving businesses major security breaches and damages.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Block Unauthorized Remote Control Applications (TeamViewer, Ammy Admin, Remote Desktop, VNC etc) &amp;amp; Ransomware&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Remote control applications such as Teamviewer, Ammy Admin, Remote Desktop and others have been causing major security issues in organizations around the world. In most cases, users run these clients so they can then remotely access and control their workstation from home, continuing their “downloads” or transfer files to their home PC and other unauthorized activities.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In other cases, these remote applications become targets for pirates and hackers, who try to hijack sessions that have been left running by users.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Ransomware&lt;/strong&gt; is a new type of threat where, through an application running on the user’s workstations, hackers are able to gain access and encrypt files found on the computers, even network drives and shares within a company.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-3.jpg&quot; alt=&quot;GFI WebMonitor - Avoid Ransomware - Hackers via Remote Desktop/Control Applications&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor - Avoid Ransomware - Hackers via Remote Desktop/Control Applications&quot; /&gt;In late 2015, popular &lt;strong&gt;Ammy Admin&lt;/strong&gt; – a remote control software, was &lt;a href=&quot;https://news.softpedia.com/news/ammyy-admin-website-used-to-distribute-at-least-5-different-malware-versions-496091.shtml&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;injected with malicious code&quot;&gt;injected with malicious code&lt;/a&gt; and unaware home and corporate users downloaded and used the free software. &lt;strong&gt;Infected by at least five different malware versions&lt;/strong&gt;, they gave attackers full access and control over the PC. Some of the malware facilitated stealing banking details, encrypting user files in exchange for money to decrypt them and many more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In another case during 2015, attackers began &lt;a href=&quot;https://news.softpedia.com/news/new-ransomware-infects-computers-via-windows-remote-desktop-services-495067.shtml&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;installing ransomware on computers running Remote Desktop Services&quot;&gt;installing ransomware on computers running Remote Desktop Services&lt;/a&gt;. The attackers obtained access via brute-force attack and then installed their malware which started scanning for specific file extensions. A ransom of $1000 USD was requested in order to have the files decrypted.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Blocking this type of applications is a major issue for companies as users uncontrollably make use of them, not realizing they are putting their company at serious risk.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Use of such applications should be heavily monitored and restricted because they pose a significant threat to businesses.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI’s WebMonitor’s extensive application list has the ability to detect and effectively block these and many other similar applications, putting an end to this major security threat.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;internet today&lt;/strong&gt; is certainly &lt;strong&gt;not a safe place&lt;/strong&gt; for users or &lt;strong&gt;organizations&lt;/strong&gt;. &lt;strong&gt;Security threats&lt;/strong&gt; resulting from &lt;strong&gt;users downloading and distributing illegal content&lt;/strong&gt;, &lt;strong&gt;sharing company sensitive information&lt;/strong&gt;, &lt;strong&gt;uncontrollably accessing&lt;/strong&gt; their &lt;strong&gt;systems&lt;/strong&gt; from home or other locations and the potential hazard of &lt;strong&gt;attackers gaining access&lt;/strong&gt; to &lt;strong&gt;internal systems&lt;/strong&gt; via &lt;strong&gt;RDP programs&lt;/strong&gt;, is real. Avoid getting your company caught with its pants down and seek ways to &lt;strong&gt;tighten and enforce security policies&lt;/strong&gt; that will help &lt;strong&gt;protect&lt;/strong&gt; them from these ever &lt;strong&gt;present threats&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-1.jpg&quot; alt=&quot;GFI WebMonitor - Control user copyright infringement in the Business Environment&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor - Control user copyright infringement in the Business Environment&quot; /&gt;One of the largest &lt;strong&gt;problems faced by organizations&lt;/strong&gt; of any size is &lt;strong&gt;effectively controlling user internet access &lt;/strong&gt;(from laptops, mobile devices, workstations etc), &lt;strong&gt;minimizing&lt;/strong&gt; the &lt;strong&gt;security threats&lt;/strong&gt; for the organization (ransomware – data loss prevention), &lt;strong&gt;user copyright infringement&lt;/strong&gt; (torrent downloading/sharing movies, games, music etc) and &lt;strong&gt;discover where valuable WAN-Internet bandwidth&lt;/strong&gt; is being &lt;strong&gt;wasted&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Organizations clearly understand that using a &lt;strong&gt;Firewall is no longer adequate&lt;/strong&gt; to control the websites its &lt;strong&gt;users are able to access&lt;/strong&gt;, &lt;strong&gt;remote control applications&lt;/strong&gt; (Teamviewer, Radmin, Ammyy Admin, Remote desktop etc), &lt;strong&gt;file sharing applications&lt;/strong&gt; - &lt;strong&gt;Bittorrent clients&lt;/strong&gt; (uTorrent, BitComet, Deluge, qBittorrent etc), &lt;strong&gt;online cloud storage services&lt;/strong&gt; (Dropbox, OneDrive, Google Drive, Box, Amazon Cloud Drive, Hubic etc) and other services and applications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The truth is that &lt;strong&gt;web monitoring applications&lt;/strong&gt; such as GFI’s WebMonitor are a lot more than just a web proxy or internet monitoring solution.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Web monitoring applications&lt;/strong&gt; are &lt;strong&gt;essential&lt;/strong&gt; for any type or size of network as they offer many advantages:&lt;/p&gt;
&lt;ul class=&quot;check&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They stop users from abusing internet resources&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They block file-sharing applications and illegal content sharing&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They stop users using cloud-based file services to upload sensitive documents, for example saving company files to their personal DropBox, Google Drive etc.&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They stop remote control applications connecting to the internet (e.g Teamviewer, Remote Desktop, Ammy Admin etc)&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They ensure user productivity is kept high by allowing access to approved internet resources and sites&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They eliminate referral ad sites and block abusive content&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They support reputation blocking to automatically filter websites based on their reputation&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They help IT departments enforce security policies to users and groups&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;They provide unbelievable flexibility allowing any type or size of organization to customise its internet usage policy to its requirements&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;The Risk In The Business Environment – Illegal Downloading&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-2.jpg&quot; alt=&quot;GFI WebMonitor The Risk in the Business Environment – Illegal Downloading&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor The Risk in the Business Environment – Illegal Downloading&quot; /&gt;Most Businesses are completely unaware of how serious these matters are and the risks they are taking while dealing with other ‘more important’ matters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Companies such as the &lt;strong&gt;Motion Picture Association of America&lt;/strong&gt; (&lt;strong&gt;MPAA&lt;/strong&gt;) and the &lt;strong&gt;Recording Industry Association of America&lt;/strong&gt; (&lt;strong&gt;RIAA&lt;/strong&gt;) are in a continuous battle suing and fighting with companies, ISPs and even home users for illegally distributing movies and music.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Many users are aware of this and are now turning to their company’s internet resources, which in many cases offer faster and unlimited data transfer, to download their illegal content such as movies, games, music and other material.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;An employer or business can be easily held responsible for the actions of its employees when it comes to illegal download activities, especially if no policies or systems are in place.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In the case of an investigation, if the necessary security policies and web monitoring systems are in place with the purpose of preventing copyright infringement and illegal downloading, businesses are less vulnerable to the illegal implications of their users, plus it allows them to track down and find the person responsible.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Data Loss Prevention (DLP) – Stop Users From Uploading Sensitive/Critical Documents&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-2a.jpg&quot; alt=&quot;GFI WebMonitor Stop Users from Uploading Sensitive - Critical Company Documents&quot; width=&quot;250&quot; height=&quot;142&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor Stop Users from Uploading Sensitive - Critical Company Documents&quot; /&gt;While illegal downloading is one major threat for businesses, stopping users &lt;strong&gt;sharing company data and sensitive information&lt;/strong&gt; (aka &lt;strong&gt;Data Loss Prevention&lt;/strong&gt; or &lt;strong&gt;DLP&lt;/strong&gt;) is another big problem.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With the explosion of (free) cloud-based storage services such as DropBox, OneDrive, Google Drive and others, users can quickly and easily upload any type of document directly from their workplace to their personal cloud storage and instantaneously share it with anyone in the world, without the company’s consent or knowledge.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The smartly designed cloud-storage applications are able to use HTTP &amp;amp; HTTPS to transfer files, and circumvent firewall security policies and other types of protection.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;More specialised application proxies such as GFI’s WebMonitor can effectively detect and block these applications, saving businesses major security breaches and damages.&lt;/p&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Block Unauthorized Remote Control Applications (TeamViewer, Ammy Admin, Remote Desktop, VNC etc) &amp;amp; Ransomware&lt;/strong&gt;&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Remote control applications such as Teamviewer, Ammy Admin, Remote Desktop and others have been causing major security issues in organizations around the world. In most cases, users run these clients so they can then remotely access and control their workstation from home, continuing their “downloads” or transfer files to their home PC and other unauthorized activities.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In other cases, these remote applications become targets for pirates and hackers, who try to hijack sessions that have been left running by users.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Ransomware&lt;/strong&gt; is a new type of threat where, through an application running on the user’s workstations, hackers are able to gain access and encrypt files found on the computers, even network drives and shares within a company.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-webmonitor-copyright-infringement-data-loss-rdp-ransomware-security-threats-3.jpg&quot; alt=&quot;GFI WebMonitor - Avoid Ransomware - Hackers via Remote Desktop/Control Applications&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI WebMonitor - Avoid Ransomware - Hackers via Remote Desktop/Control Applications&quot; /&gt;In late 2015, popular &lt;strong&gt;Ammy Admin&lt;/strong&gt; – a remote control software, was &lt;a href=&quot;https://news.softpedia.com/news/ammyy-admin-website-used-to-distribute-at-least-5-different-malware-versions-496091.shtml&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;injected with malicious code&quot;&gt;injected with malicious code&lt;/a&gt; and unaware home and corporate users downloaded and used the free software. &lt;strong&gt;Infected by at least five different malware versions&lt;/strong&gt;, they gave attackers full access and control over the PC. Some of the malware facilitated stealing banking details, encrypting user files in exchange for money to decrypt them and many more.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In another case during 2015, attackers began &lt;a href=&quot;https://news.softpedia.com/news/new-ransomware-infects-computers-via-windows-remote-desktop-services-495067.shtml&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot; title=&quot;installing ransomware on computers running Remote Desktop Services&quot;&gt;installing ransomware on computers running Remote Desktop Services&lt;/a&gt;. The attackers obtained access via brute-force attack and then installed their malware which started scanning for specific file extensions. A ransom of $1000 USD was requested in order to have the files decrypted.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Blocking this type of applications is a major issue for companies as users uncontrollably make use of them, not realizing they are putting their company at serious risk.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Use of such applications should be heavily monitored and restricted because they pose a significant threat to businesses.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI’s WebMonitor’s extensive application list has the ability to detect and effectively block these and many other similar applications, putting an end to this major security threat.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Summary&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;internet today&lt;/strong&gt; is certainly &lt;strong&gt;not a safe place&lt;/strong&gt; for users or &lt;strong&gt;organizations&lt;/strong&gt;. &lt;strong&gt;Security threats&lt;/strong&gt; resulting from &lt;strong&gt;users downloading and distributing illegal content&lt;/strong&gt;, &lt;strong&gt;sharing company sensitive information&lt;/strong&gt;, &lt;strong&gt;uncontrollably accessing&lt;/strong&gt; their &lt;strong&gt;systems&lt;/strong&gt; from home or other locations and the potential hazard of &lt;strong&gt;attackers gaining access&lt;/strong&gt; to &lt;strong&gt;internal systems&lt;/strong&gt; via &lt;strong&gt;RDP programs&lt;/strong&gt;, is real. Avoid getting your company caught with its pants down and seek ways to &lt;strong&gt;tighten and enforce security policies&lt;/strong&gt; that will help &lt;strong&gt;protect&lt;/strong&gt; them from these ever &lt;strong&gt;present threats&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>Automate Software Deployment with the Help of GFI LanGuard. Quick &amp; Easy Software Installation on all PCs – Workstations &amp; Servers</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations.html"/>
		<published>2015-12-31T17:44:42+11:00</published>
		<updated>2015-12-31T17:44:42+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Deploying&lt;/strong&gt; a single &lt;strong&gt;application&lt;/strong&gt; to &lt;strong&gt;hundreds&lt;/strong&gt; of &lt;strong&gt;workstations or servers&lt;/strong&gt; can become a very difficult and time-consuming task. Thankfully, &lt;strong&gt;remote deployment&lt;/strong&gt; of &lt;strong&gt;software and applications&lt;/strong&gt; is a feature offered by &lt;strong&gt;GFI LanGuard&lt;/strong&gt;. With &lt;strong&gt;Remote Software Deployment&lt;/strong&gt;, we can &lt;strong&gt;automate&lt;/strong&gt; the &lt;strong&gt;installation&lt;/strong&gt; of pretty much any software to &lt;strong&gt;any amount of computers&lt;/strong&gt; on the network, including &lt;strong&gt;Windows servers&lt;/strong&gt; (2003,2008, 2012), &lt;strong&gt;Domain Controllers&lt;/strong&gt;, &lt;strong&gt;Windows workstations&lt;/strong&gt; and other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we’ll show how easy it is to deploy any custom software using GFI LanGuard. For our demonstration purposes, we’ll deploy Mozilla Firefox to a Windows server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To begin configuring the deployment, select the &lt;strong&gt;Remediate&lt;/strong&gt; tab from GFI LanGuard, then select the &lt;strong&gt;Deploy Custom Software&lt;/strong&gt; option as shown below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-1.png&quot; alt=&quot;Preparing the network-wide deployment of Mozilla Firefox through GFI LanGuard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Preparing the network-wide deployment of Mozilla Firefox through GFI LanGuard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Preparing the network-wide deployment of Mozilla Firefox through GFI LanGuard&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, select the &lt;strong&gt;target machine&lt;/strong&gt; from the left panel. We can select one or multiple targets using the &lt;strong&gt;CTRL&lt;/strong&gt; key. For our demonstration, we selected the &lt;strong&gt;DCSERVER&lt;/strong&gt; which is a Windows 2003 server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now, from the &lt;strong&gt;Deploy Custom Software&lt;/strong&gt; section, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add&lt;/strong&gt; to select the software to be deployed. This will present the &lt;strong&gt;Add Custom Software&lt;/strong&gt; window where we can select the path to the installation file. GFI LanGuard also provides the ability to run the setup file using custom parameters – this handy feature allows the execution of silent installations (no window/prompt shown at the target machine desktop), if supported by the application to be installed. Mozilla Firefox supports silent installation using the ‘ &lt;strong&gt;–ms&lt;/strong&gt; ‘ parameter:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-2.png&quot; alt=&quot;GFI LanGuard custom software deployment using a parameter for silent installation&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard custom software deployment using a parameter for silent installation&quot; /&gt; Figure 2. GFI LanGuard custom software deployment using a parameter for silent installation&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;When done, click on the &lt;strong&gt;Add&lt;/strong&gt; button to return back to the main screen where GFI LanGuard will display the target computer(s) &amp;amp; software selected, plus installation parameters:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-3.png&quot; alt=&quot;GFI LanGuard ready to deploy Mozilla Firefox on a Windows Server&quot; title=&quot;GFI LanGuard ready to deploy Mozilla Firefox on a Windows Server&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. GFI LanGuard ready to deploy Mozilla Firefox on a Windows Server&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Clicking&lt;/strong&gt; on the &lt;strong&gt;Deploy&lt;/strong&gt; button brings up the final window where we can either initiate the deployment immediately or schedule it for a later time. From here, we can also insert any necessary credentials but also select to notify the remote user, force a reboot after the installation and many other useful options:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-4.png&quot; alt=&quot;Final configuration options for remote deployment of Mozilla Firefox via GFI LanGuard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Final configuration options for remote deployment of Mozilla Firefox via GFI LanGuard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Final configuration options for remote deployment of Mozilla Firefox via GFI LanGuard&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard’s remote software deployment is so sophisticated that it even allows the configuration of the number of threads that will be executed on the remote computer (under the &lt;strong&gt;Advanced&lt;/strong&gt; &lt;strong&gt;options&lt;/strong&gt; link), helping ensure minimum impact for the user working on the remote system.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once complete, click on &lt;strong&gt;OK&lt;/strong&gt; to proceed with the remote deployment. LanGuard will then return back to the &lt;strong&gt;Remediation&lt;/strong&gt; window and provide real-time update of the installation process, along with a detailed log below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-5.png&quot; alt=&quot;GFI LanGuard Remote software deployment of Mozilla Firefox complete&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard Remote software deployment of Mozilla Firefox complete&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. GFI LanGuard Remote software deployment of Mozilla Firefox complete&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Installation of Mozilla Firefox was incredibly fast and to our surprise, the impact on the remote host was undetectable. We actually didn’t realise the installation was taking place until the Firefox icon appeared on the desktop. CPU history also confirm there was no additional load on the server:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-6.png&quot; alt=&quot;Successful installation of Mozilla Firefox, without any system performance impact!&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Successful installation of Mozilla Firefox, without any system performance impact!&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Successful installation of Mozilla Firefox, without any system performance impact!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;GFI LanGuard’s&lt;/strong&gt; &lt;strong&gt;software deployment&lt;/strong&gt; feature is truly impressive. It not only provides &lt;strong&gt;network administrators &lt;/strong&gt;with the ability to &lt;strong&gt;deploy software&lt;/strong&gt; on any machine on their network, but also gives &lt;strong&gt;complete control&lt;/strong&gt; on the way the software will be deployed and &lt;strong&gt;resources&lt;/strong&gt; that will be used on the remote computer during the installation. Additional options such as &lt;strong&gt;scheduling the deployment&lt;/strong&gt;, &lt;strong&gt;custom user messages&lt;/strong&gt; &lt;strong&gt;before&lt;/strong&gt; or &lt;strong&gt;after&lt;/strong&gt; the &lt;strong&gt;installation&lt;/strong&gt;, &lt;strong&gt;remote reboot&lt;/strong&gt; and many more, make GFI LanGuard it a &lt;strong&gt;necessary tool&lt;/strong&gt; for any &lt;strong&gt;organization&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Deploying&lt;/strong&gt; a single &lt;strong&gt;application&lt;/strong&gt; to &lt;strong&gt;hundreds&lt;/strong&gt; of &lt;strong&gt;workstations or servers&lt;/strong&gt; can become a very difficult and time-consuming task. Thankfully, &lt;strong&gt;remote deployment&lt;/strong&gt; of &lt;strong&gt;software and applications&lt;/strong&gt; is a feature offered by &lt;strong&gt;GFI LanGuard&lt;/strong&gt;. With &lt;strong&gt;Remote Software Deployment&lt;/strong&gt;, we can &lt;strong&gt;automate&lt;/strong&gt; the &lt;strong&gt;installation&lt;/strong&gt; of pretty much any software to &lt;strong&gt;any amount of computers&lt;/strong&gt; on the network, including &lt;strong&gt;Windows servers&lt;/strong&gt; (2003,2008, 2012), &lt;strong&gt;Domain Controllers&lt;/strong&gt;, &lt;strong&gt;Windows workstations&lt;/strong&gt; and other.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;In this article we’ll show how easy it is to deploy any custom software using GFI LanGuard. For our demonstration purposes, we’ll deploy Mozilla Firefox to a Windows server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To begin configuring the deployment, select the &lt;strong&gt;Remediate&lt;/strong&gt; tab from GFI LanGuard, then select the &lt;strong&gt;Deploy Custom Software&lt;/strong&gt; option as shown below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-1.png&quot; alt=&quot;Preparing the network-wide deployment of Mozilla Firefox through GFI LanGuard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Preparing the network-wide deployment of Mozilla Firefox through GFI LanGuard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Preparing the network-wide deployment of Mozilla Firefox through GFI LanGuard&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, select the &lt;strong&gt;target machine&lt;/strong&gt; from the left panel. We can select one or multiple targets using the &lt;strong&gt;CTRL&lt;/strong&gt; key. For our demonstration, we selected the &lt;strong&gt;DCSERVER&lt;/strong&gt; which is a Windows 2003 server.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now, from the &lt;strong&gt;Deploy Custom Software&lt;/strong&gt; section, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add&lt;/strong&gt; to select the software to be deployed. This will present the &lt;strong&gt;Add Custom Software&lt;/strong&gt; window where we can select the path to the installation file. GFI LanGuard also provides the ability to run the setup file using custom parameters – this handy feature allows the execution of silent installations (no window/prompt shown at the target machine desktop), if supported by the application to be installed. Mozilla Firefox supports silent installation using the ‘ &lt;strong&gt;–ms&lt;/strong&gt; ‘ parameter:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-2.png&quot; alt=&quot;GFI LanGuard custom software deployment using a parameter for silent installation&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard custom software deployment using a parameter for silent installation&quot; /&gt; Figure 2. GFI LanGuard custom software deployment using a parameter for silent installation&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;When done, click on the &lt;strong&gt;Add&lt;/strong&gt; button to return back to the main screen where GFI LanGuard will display the target computer(s) &amp;amp; software selected, plus installation parameters:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-3.png&quot; alt=&quot;GFI LanGuard ready to deploy Mozilla Firefox on a Windows Server&quot; title=&quot;GFI LanGuard ready to deploy Mozilla Firefox on a Windows Server&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. GFI LanGuard ready to deploy Mozilla Firefox on a Windows Server&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Clicking&lt;/strong&gt; on the &lt;strong&gt;Deploy&lt;/strong&gt; button brings up the final window where we can either initiate the deployment immediately or schedule it for a later time. From here, we can also insert any necessary credentials but also select to notify the remote user, force a reboot after the installation and many other useful options:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-4.png&quot; alt=&quot;Final configuration options for remote deployment of Mozilla Firefox via GFI LanGuard&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Final configuration options for remote deployment of Mozilla Firefox via GFI LanGuard&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Final configuration options for remote deployment of Mozilla Firefox via GFI LanGuard&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard’s remote software deployment is so sophisticated that it even allows the configuration of the number of threads that will be executed on the remote computer (under the &lt;strong&gt;Advanced&lt;/strong&gt; &lt;strong&gt;options&lt;/strong&gt; link), helping ensure minimum impact for the user working on the remote system.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once complete, click on &lt;strong&gt;OK&lt;/strong&gt; to proceed with the remote deployment. LanGuard will then return back to the &lt;strong&gt;Remediation&lt;/strong&gt; window and provide real-time update of the installation process, along with a detailed log below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-5.png&quot; alt=&quot;GFI LanGuard Remote software deployment of Mozilla Firefox complete&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard Remote software deployment of Mozilla Firefox complete&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. GFI LanGuard Remote software deployment of Mozilla Firefox complete&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Installation of Mozilla Firefox was incredibly fast and to our surprise, the impact on the remote host was undetectable. We actually didn’t realise the installation was taking place until the Firefox icon appeared on the desktop. CPU history also confirm there was no additional load on the server:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-remote-software-deployment-tool-to-servers-and-workstations-6.png&quot; alt=&quot;Successful installation of Mozilla Firefox, without any system performance impact!&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Successful installation of Mozilla Firefox, without any system performance impact!&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Successful installation of Mozilla Firefox, without any system performance impact!&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;GFI LanGuard’s&lt;/strong&gt; &lt;strong&gt;software deployment&lt;/strong&gt; feature is truly impressive. It not only provides &lt;strong&gt;network administrators &lt;/strong&gt;with the ability to &lt;strong&gt;deploy software&lt;/strong&gt; on any machine on their network, but also gives &lt;strong&gt;complete control&lt;/strong&gt; on the way the software will be deployed and &lt;strong&gt;resources&lt;/strong&gt; that will be used on the remote computer during the installation. Additional options such as &lt;strong&gt;scheduling the deployment&lt;/strong&gt;, &lt;strong&gt;custom user messages&lt;/strong&gt; &lt;strong&gt;before&lt;/strong&gt; or &lt;strong&gt;after&lt;/strong&gt; the &lt;strong&gt;installation&lt;/strong&gt;, &lt;strong&gt;remote reboot&lt;/strong&gt; and many more, make GFI LanGuard it a &lt;strong&gt;necessary tool&lt;/strong&gt; for any &lt;strong&gt;organization&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>How to Manually Deploy – Install GFI LanGuard Agent When Access is Denied By Remote Host (Server – Workstation)</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-manual-install-deploy-agent-on-computers.html"/>
		<published>2015-12-22T18:20:32+11:00</published>
		<updated>2015-12-22T18:20:32+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-manual-install-deploy-agent-on-computers.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;When IT Administrators and Managers are faced with the continuous &lt;strong&gt;failure&lt;/strong&gt; of &lt;strong&gt;GFI LanGuard Agent deployment&lt;/strong&gt; e.g (&lt;strong&gt;Access is denied&lt;/strong&gt;), it is best to switch to &lt;strong&gt;manual installation&lt;/strong&gt; in order to &lt;strong&gt;save&lt;/strong&gt; &lt;strong&gt;valuable time&lt;/strong&gt; and &lt;strong&gt;resources&lt;/strong&gt;. The &lt;strong&gt;reason of failure&lt;/strong&gt; can be due to &lt;strong&gt;incorrect credentials&lt;/strong&gt;, &lt;strong&gt;disabled account&lt;/strong&gt;, &lt;strong&gt;firewall settings&lt;/strong&gt;, &lt;strong&gt;disabled remote access on the target computer&lt;/strong&gt; and many more. &lt;strong&gt;Deploying GFI LanGuard Agents&lt;/strong&gt; is the best way to &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems.html&quot; target=&quot;_blank&quot; title=&quot;scan your network for unpatched machines or machines with critical vulnerabilities&quot;&gt;scan your network for unpatched machines or machines with critical vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-1.png&quot; alt=&quot;GFI LanGuard Agent deployment failing with Access is denied&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard Agent deployment failing with Access is denied&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. GFI LanGuard Agent deployment failing with Access is denied&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Users interested can also check our article &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations.html&quot; target=&quot;_blank&quot; title=&quot;Benefits of Deploying GFI LanGuard Agents on Workstations &amp;amp; Servers. Automate Network-wide Agent Scanning and Deployment&quot;&gt;Benefits of Deploying GFI LanGuard Agents on Workstations &amp;amp; Servers. Automate Network-wide Agent Scanning and Deployment&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Step 1 – Locate Agent Package On GFI LanGuard Server&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The GFI LanGuard Agent installation file is located in one of the following directories, depending on your operating system:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;For &lt;strong&gt;32bit operating systems&lt;/strong&gt;: &lt;strong&gt;c:\Program Files\GFI\LanGuard 11\Agent\&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;For &lt;strong&gt;64bit operating systems&lt;/strong&gt;: &lt;strong&gt;c:\Program Files (x86)\GFI\LanGuard 11\Agent\&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-2.png&quot; alt=&quot;The location of GFI LanGuard Agent on our 64bit O/S.&quot; title=&quot;The location of GFI LanGuard Agent on our 64bit O/S.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. The location of GFI LanGuard Agent on our 64bit O/S.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Step 2 – Copy The File To The Target Machine &amp;amp; Install&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the file is copied to the target machine, execute it using the following single line command prompt:&lt;/p&gt;
&lt;div class=&quot;box-download&quot; style=&quot;text-align: left;&quot;&gt;c:\LanGuard11agent.msi /qn GFIINSTALLID=&quot;&lt;strong&gt;InstallationID&lt;/strong&gt;&quot;&amp;nbsp;/norestart /L*v &quot;%temp%\LANSS_v11_AgentKitLog.csv&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: &lt;strong&gt;InstallationID&lt;/strong&gt; is an ID&amp;nbsp;that can be found in the &lt;strong&gt;crmiini.xml&lt;/strong&gt; file located on the GFI LanGuard server directory for &lt;strong&gt;32bit O/S&lt;/strong&gt;: &lt;strong&gt;c:\Program Files\GFI\LanGuard 11&amp;nbsp;Agent&lt;/strong&gt; &amp;nbsp;or &lt;strong&gt;c:\Program Files (x86)\GFI\LanGuard 11&amp;nbsp;Agent&lt;/strong&gt; for &lt;strong&gt;64bit O/S&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Following is a screenshot of the contents of our &lt;strong&gt;crmiini.xml&lt;/strong&gt; file where the installation ID is clearly shown:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-3.png&quot; alt=&quot;Installation ID in crmiini.xml file on our GFI LanGuard Server&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Installation ID in crmiini.xml file on our GFI LanGuard Server&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Installation ID in crmiini.xml file on our GFI LanGuard Server&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With this information, the &lt;strong&gt;final command line&lt;/strong&gt; (DOS) for the installation of the Agent will be as follows:&lt;/p&gt;
&lt;p class=&quot;box-download&quot; style=&quot;text-align: left;&quot;&gt;LanGuard11agent.msi /qn GFIINSTALLID=&quot; &lt;strong&gt;e86cb1c1-e555-40ed-a6d8-01564bdb969e&lt;/strong&gt;&quot;&amp;nbsp;/norestart /L*v &quot;%temp%\LANSS_v11_AgentKitLog.csv&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: Make sure the &lt;strong&gt;command prompt&lt;/strong&gt; is run with &lt;strong&gt;Administrator Privileges&lt;/strong&gt; (&lt;strong&gt;Run as Administrator&lt;/strong&gt;), to ensure you do not have any problems with the installation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here is a screenshot of the whole command executed:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-4.png&quot; alt=&quot;Successfully Installing GFI LanGuard Agent On Workstations &amp;amp; Servers&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Successfully Installing GFI LanGuard Agent On Workstations &amp;amp; Servers&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Successfully Installing GFI LanGuard Agent On Workstations &amp;amp; Servers&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that the installation is a ‘&lt;strong&gt;silent install&lt;/strong&gt;’ and &lt;strong&gt;will not present any message&lt;/strong&gt; or &lt;strong&gt;prompt the user for a reboot&lt;/strong&gt;. This makes it ideal for quick deployments where no reboot and minimum user interruption is required.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A restart will be necessary to complete the Agent initialization.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Important Notes&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After completing the manual installation of the GFI LanGuard Agent, it is necessary to remote deploy the Agent from the GFI LanGuard console as well, otherwise the GFI LanGuard server will not be aware of the Agent manually installed on the remote host.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Also, it is necessary to &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations.html&quot; target=&quot;_blank&quot; title=&quot;deploy at least one Agent remotely&quot;&gt;deploy at least one Agent remotely&lt;/a&gt; via GFI LanGuard server console, before attempting the manual deployment, in order to initially populate the Crmiini.xml file with the installation id parameters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article covered the &lt;strong&gt;manual deployment&lt;/strong&gt; of GFI’s &lt;strong&gt;LanGuard Agent&lt;/strong&gt; on &lt;strong&gt;Windows-based machines&lt;/strong&gt;. We took a look at &lt;strong&gt;common reasons&lt;/strong&gt; why &lt;strong&gt;remote deployment&lt;/strong&gt; of the &lt;strong&gt;Agent&lt;/strong&gt; might &lt;strong&gt;fail&lt;/strong&gt;, and covered step-by-step the manual installation process and &lt;strong&gt;prerequisites&lt;/strong&gt; to ensure the &lt;strong&gt;Agent is able to connect&lt;/strong&gt; to the &lt;strong&gt;GFI LanGuard server&lt;/strong&gt;.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;When IT Administrators and Managers are faced with the continuous &lt;strong&gt;failure&lt;/strong&gt; of &lt;strong&gt;GFI LanGuard Agent deployment&lt;/strong&gt; e.g (&lt;strong&gt;Access is denied&lt;/strong&gt;), it is best to switch to &lt;strong&gt;manual installation&lt;/strong&gt; in order to &lt;strong&gt;save&lt;/strong&gt; &lt;strong&gt;valuable time&lt;/strong&gt; and &lt;strong&gt;resources&lt;/strong&gt;. The &lt;strong&gt;reason of failure&lt;/strong&gt; can be due to &lt;strong&gt;incorrect credentials&lt;/strong&gt;, &lt;strong&gt;disabled account&lt;/strong&gt;, &lt;strong&gt;firewall settings&lt;/strong&gt;, &lt;strong&gt;disabled remote access on the target computer&lt;/strong&gt; and many more. &lt;strong&gt;Deploying GFI LanGuard Agents&lt;/strong&gt; is the best way to &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems.html&quot; target=&quot;_blank&quot; title=&quot;scan your network for unpatched machines or machines with critical vulnerabilities&quot;&gt;scan your network for unpatched machines or machines with critical vulnerabilities&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-1.png&quot; alt=&quot;GFI LanGuard Agent deployment failing with Access is denied&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard Agent deployment failing with Access is denied&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. GFI LanGuard Agent deployment failing with Access is denied&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Users interested can also check our article &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations.html&quot; target=&quot;_blank&quot; title=&quot;Benefits of Deploying GFI LanGuard Agents on Workstations &amp;amp; Servers. Automate Network-wide Agent Scanning and Deployment&quot;&gt;Benefits of Deploying GFI LanGuard Agents on Workstations &amp;amp; Servers. Automate Network-wide Agent Scanning and Deployment&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Step 1 – Locate Agent Package On GFI LanGuard Server&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The GFI LanGuard Agent installation file is located in one of the following directories, depending on your operating system:&lt;/p&gt;
&lt;ul class=&quot;check&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;For &lt;strong&gt;32bit operating systems&lt;/strong&gt;: &lt;strong&gt;c:\Program Files\GFI\LanGuard 11\Agent\&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;For &lt;strong&gt;64bit operating systems&lt;/strong&gt;: &lt;strong&gt;c:\Program Files (x86)\GFI\LanGuard 11\Agent\&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-2.png&quot; alt=&quot;The location of GFI LanGuard Agent on our 64bit O/S.&quot; title=&quot;The location of GFI LanGuard Agent on our 64bit O/S.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. The location of GFI LanGuard Agent on our 64bit O/S.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Step 2 – Copy The File To The Target Machine &amp;amp; Install&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the file is copied to the target machine, execute it using the following single line command prompt:&lt;/p&gt;
&lt;div class=&quot;box-download&quot; style=&quot;text-align: left;&quot;&gt;c:\LanGuard11agent.msi /qn GFIINSTALLID=&quot;&lt;strong&gt;InstallationID&lt;/strong&gt;&quot;&amp;nbsp;/norestart /L*v &quot;%temp%\LANSS_v11_AgentKitLog.csv&lt;/div&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: &lt;strong&gt;InstallationID&lt;/strong&gt; is an ID&amp;nbsp;that can be found in the &lt;strong&gt;crmiini.xml&lt;/strong&gt; file located on the GFI LanGuard server directory for &lt;strong&gt;32bit O/S&lt;/strong&gt;: &lt;strong&gt;c:\Program Files\GFI\LanGuard 11&amp;nbsp;Agent&lt;/strong&gt; &amp;nbsp;or &lt;strong&gt;c:\Program Files (x86)\GFI\LanGuard 11&amp;nbsp;Agent&lt;/strong&gt; for &lt;strong&gt;64bit O/S&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Following is a screenshot of the contents of our &lt;strong&gt;crmiini.xml&lt;/strong&gt; file where the installation ID is clearly shown:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-3.png&quot; alt=&quot;Installation ID in crmiini.xml file on our GFI LanGuard Server&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Installation ID in crmiini.xml file on our GFI LanGuard Server&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Installation ID in crmiini.xml file on our GFI LanGuard Server&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;With this information, the &lt;strong&gt;final command line&lt;/strong&gt; (DOS) for the installation of the Agent will be as follows:&lt;/p&gt;
&lt;p class=&quot;box-download&quot; style=&quot;text-align: left;&quot;&gt;LanGuard11agent.msi /qn GFIINSTALLID=&quot; &lt;strong&gt;e86cb1c1-e555-40ed-a6d8-01564bdb969e&lt;/strong&gt;&quot;&amp;nbsp;/norestart /L*v &quot;%temp%\LANSS_v11_AgentKitLog.csv&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Note: Make sure the &lt;strong&gt;command prompt&lt;/strong&gt; is run with &lt;strong&gt;Administrator Privileges&lt;/strong&gt; (&lt;strong&gt;Run as Administrator&lt;/strong&gt;), to ensure you do not have any problems with the installation.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Here is a screenshot of the whole command executed:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-manual-install-deploy-agent-on-computers-4.png&quot; alt=&quot;Successfully Installing GFI LanGuard Agent On Workstations &amp;amp; Servers&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;Successfully Installing GFI LanGuard Agent On Workstations &amp;amp; Servers&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Successfully Installing GFI LanGuard Agent On Workstations &amp;amp; Servers&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Notice that the installation is a ‘&lt;strong&gt;silent install&lt;/strong&gt;’ and &lt;strong&gt;will not present any message&lt;/strong&gt; or &lt;strong&gt;prompt the user for a reboot&lt;/strong&gt;. This makes it ideal for quick deployments where no reboot and minimum user interruption is required.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;A restart will be necessary to complete the Agent initialization.&lt;/p&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;Important Notes&lt;/h2&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After completing the manual installation of the GFI LanGuard Agent, it is necessary to remote deploy the Agent from the GFI LanGuard console as well, otherwise the GFI LanGuard server will not be aware of the Agent manually installed on the remote host.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Also, it is necessary to &lt;a href=&quot;https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations.html&quot; target=&quot;_blank&quot; title=&quot;deploy at least one Agent remotely&quot;&gt;deploy at least one Agent remotely&lt;/a&gt; via GFI LanGuard server console, before attempting the manual deployment, in order to initially populate the Crmiini.xml file with the installation id parameters.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article covered the &lt;strong&gt;manual deployment&lt;/strong&gt; of GFI’s &lt;strong&gt;LanGuard Agent&lt;/strong&gt; on &lt;strong&gt;Windows-based machines&lt;/strong&gt;. We took a look at &lt;strong&gt;common reasons&lt;/strong&gt; why &lt;strong&gt;remote deployment&lt;/strong&gt; of the &lt;strong&gt;Agent&lt;/strong&gt; might &lt;strong&gt;fail&lt;/strong&gt;, and covered step-by-step the manual installation process and &lt;strong&gt;prerequisites&lt;/strong&gt; to ensure the &lt;strong&gt;Agent is able to connect&lt;/strong&gt; to the &lt;strong&gt;GFI LanGuard server&lt;/strong&gt;.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>Benefits of Deploying GFI LanGuard Agents on Workstations &amp; Servers. Automate Network-wide Agent Scanning &amp; Deployment</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations.html"/>
		<published>2015-12-10T01:08:35+11:00</published>
		<updated>2015-12-10T01:08:35+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1a.jpg&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI LanGuard Agent Deployment&quot; /&gt;GFI LanGuard Agents&lt;/strong&gt; are designed to be &lt;strong&gt;deployed on local &lt;/strong&gt;(network) or &lt;strong&gt;remote servers&lt;/strong&gt; and &lt;strong&gt;workstations&lt;/strong&gt;. Once installed, the GFI LanGuard Agents can then be configured via LanGuard’s main server console, giving the &lt;strong&gt;administrator full control&lt;/strong&gt; as to when the &lt;strong&gt;Agents will scan the host&lt;/strong&gt; they are installed on, and &lt;strong&gt;communicate their status&lt;/strong&gt; to the &lt;strong&gt;GFI LanGuard server&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Those concerned about system resources will be pleased to know that the GFI LanGuard Agent does not consume any CPU cycles or resources while idle. During the time of scanning, once a day for a few minutes, the scan process is kept at a low priority to ensure that it does not interfere or impact the host’s performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard Agents communicate with the GFI LanGuard server using &lt;strong&gt;TCP port 1070&lt;/strong&gt;, however this can be configured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s see how we can install the GFI LanGuard Agent from the server’s console.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First open GFI LanGuard and select &lt;strong&gt;Agents Management&lt;/strong&gt; from the &lt;strong&gt;Configuration&lt;/strong&gt; tab:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Deploy GFI LanGuard Agents on Servers and Workstations&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Select Agents Management and the Deploy Agents&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, you can choose between &lt;strong&gt;Local domain&lt;/strong&gt; or &lt;strong&gt;Custom&lt;/strong&gt; to define your target(s):&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-2.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Defining Target rules for GFI LanGuard Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Defining Target rules for GFI LanGuard Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since we’ve selected &lt;strong&gt;Custom&lt;/strong&gt;, we need to &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add new rule&lt;/strong&gt; to add our targets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The targets can be defined via their &lt;strong&gt;Computer name&lt;/strong&gt; (shown below), &lt;strong&gt;Domain name&lt;/strong&gt; or &lt;strong&gt;Organization Unit&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-3.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Defining our target hosts using their Computer name&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Defining our target hosts using their Computer name&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When complete, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; to return to the previous window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We now see all computer hosts selected:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-4.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Viewing selected hosts for Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Viewing selected hosts for Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Advance Settings option on the lower left area of the window, allows us to configure the automatic discovery of machines with Agents installed, setup up the &lt;strong&gt;Audit schedule&lt;/strong&gt; of the agent (when it will scan its host and update the LanGuard server), &lt;strong&gt;Scan profile&lt;/strong&gt; used by the Agent, plus an extremely handy feature called &lt;strong&gt;Auto Remediation&lt;/strong&gt; which enables GFI LanGuard to automatically download and install missing updates, service packs, uninstall unauthorized applications and more, on the remote computers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-5.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Agent Advanced Settings – Audit Schedule tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. GFI LanGuard - Agent Advanced Settings – Audit Schedule tab&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The screenshot below shows us the &lt;strong&gt;Auto Remediation&lt;/strong&gt; tab settings:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-6.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-6&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Agent Advanced Settings – Auto Remediation tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Agent Advanced Settings – Auto Remediation tab&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When done, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; to save the selected settings and return back to the previous window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Next&lt;/strong&gt; to move to the next step. At this point, we need to enter the administrator credentials of the remote machine(s) so that GFI LanGuard can log into the remote machines and deploy the agent. Enter the username and password and &lt;strong&gt;hit&lt;/strong&gt; &lt;strong&gt;Next &lt;/strong&gt;and then&lt;strong&gt; Finish &lt;/strong&gt;at the last window:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-7.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-7&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Entering the necessary credentials for the Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 7. Entering the necessary credentials for the Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard will now being the deployment of its &lt;strong&gt;Agent&lt;/strong&gt; to the selected remote hosts:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-8.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-8&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - preparing for the Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 8. GFI LanGuard preparing for the Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After a while, the LanGuard Agent will report its installation status. Where successfully, we will see the &lt;strong&gt;Installed&lt;/strong&gt; message, otherwise a &lt;strong&gt;Pending install&lt;/strong&gt; message will continue to be displayed along with an error if it was unsuccessful:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-9.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-9&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - LanGuard Agent installation status&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 9. LanGuard Agent installation status&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Common problems not allowing the successful &lt;strong&gt;Agent&lt;/strong&gt; deployment are &lt;strong&gt;incorrect credentials&lt;/strong&gt;, &lt;strong&gt;Firewall&lt;/strong&gt; or &lt;strong&gt;user rights&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To check the status of the installed &lt;strong&gt;Agent&lt;/strong&gt;, we can simply select the desired host, &lt;strong&gt;right-click&lt;/strong&gt; and select &lt;strong&gt;Agent Diagnostic&lt;/strong&gt; as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-10.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-10&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Accessing GFI LanGuard Agent Diagnostics&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 10. Accessing GFI LanGuard Agent Diagnostics&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Agent Diagnostic&lt;/strong&gt; window is an extremely helpful feature as it provides a great amount of information on the Agent and the remote host. In addition, at the end of the &lt;strong&gt;Diagnosis Activity Window&lt;/strong&gt;, we’ll find a zip file that contains all the presented information. This file can use email to GFI’s support in case of Agent problems:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-11.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-11&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Running the Agent Diagnostics report&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 11. Running the Agent Diagnostics report&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;GFI LanGuard Agent&lt;/strong&gt; is an &lt;strong&gt;extremely useful feature&lt;/strong&gt; that allows the &lt;strong&gt;automatic monitoring&lt;/strong&gt;, &lt;strong&gt;patching&lt;/strong&gt; and &lt;strong&gt;updating&lt;/strong&gt; of the host machine, leaving &lt;strong&gt;IT Administrators&lt;/strong&gt; and &lt;strong&gt;Managers&lt;/strong&gt; to deal with other &lt;strong&gt;important tasks&lt;/strong&gt;. Thanks to its &lt;strong&gt;Domain&lt;/strong&gt; &amp;amp; &lt;strong&gt;Workgroup&lt;/strong&gt; support, &lt;strong&gt;GFI LanGuard&lt;/strong&gt; it can &lt;strong&gt;handle&lt;/strong&gt; &lt;strong&gt;any type and size of environment&lt;/strong&gt;. If you haven’t used it yet, &lt;strong&gt;download your copy&lt;/strong&gt; of GFI LanGuard and give it a try – you’ll be surprised how much &lt;strong&gt;valuable information&lt;/strong&gt; you’ll get on your &lt;strong&gt;systems security &amp;amp; patching status&lt;/strong&gt; and the time you’ll save!&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1a.jpg&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI LanGuard Agent Deployment&quot; /&gt;GFI LanGuard Agents&lt;/strong&gt; are designed to be &lt;strong&gt;deployed on local &lt;/strong&gt;(network) or &lt;strong&gt;remote servers&lt;/strong&gt; and &lt;strong&gt;workstations&lt;/strong&gt;. Once installed, the GFI LanGuard Agents can then be configured via LanGuard’s main server console, giving the &lt;strong&gt;administrator full control&lt;/strong&gt; as to when the &lt;strong&gt;Agents will scan the host&lt;/strong&gt; they are installed on, and &lt;strong&gt;communicate their status&lt;/strong&gt; to the &lt;strong&gt;GFI LanGuard server&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Those concerned about system resources will be pleased to know that the GFI LanGuard Agent does not consume any CPU cycles or resources while idle. During the time of scanning, once a day for a few minutes, the scan process is kept at a low priority to ensure that it does not interfere or impact the host’s performance.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard Agents communicate with the GFI LanGuard server using &lt;strong&gt;TCP port 1070&lt;/strong&gt;, however this can be configured.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Let’s see how we can install the GFI LanGuard Agent from the server’s console.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;First open GFI LanGuard and select &lt;strong&gt;Agents Management&lt;/strong&gt; from the &lt;strong&gt;Configuration&lt;/strong&gt; tab:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Deploy GFI LanGuard Agents on Servers and Workstations&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Select Agents Management and the Deploy Agents&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, you can choose between &lt;strong&gt;Local domain&lt;/strong&gt; or &lt;strong&gt;Custom&lt;/strong&gt; to define your target(s):&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-2.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-2&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Defining Target rules for GFI LanGuard Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Defining Target rules for GFI LanGuard Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Since we’ve selected &lt;strong&gt;Custom&lt;/strong&gt;, we need to &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add new rule&lt;/strong&gt; to add our targets.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The targets can be defined via their &lt;strong&gt;Computer name&lt;/strong&gt; (shown below), &lt;strong&gt;Domain name&lt;/strong&gt; or &lt;strong&gt;Organization Unit&lt;/strong&gt;:&lt;/p&gt;
&lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-3.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Defining our target hosts using their Computer name&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Defining our target hosts using their Computer name&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When complete, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; to return to the previous window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We now see all computer hosts selected:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-4.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Viewing selected hosts for Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Viewing selected hosts for Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The Advance Settings option on the lower left area of the window, allows us to configure the automatic discovery of machines with Agents installed, setup up the &lt;strong&gt;Audit schedule&lt;/strong&gt; of the agent (when it will scan its host and update the LanGuard server), &lt;strong&gt;Scan profile&lt;/strong&gt; used by the Agent, plus an extremely handy feature called &lt;strong&gt;Auto Remediation&lt;/strong&gt; which enables GFI LanGuard to automatically download and install missing updates, service packs, uninstall unauthorized applications and more, on the remote computers.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-5.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Agent Advanced Settings – Audit Schedule tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. GFI LanGuard - Agent Advanced Settings – Audit Schedule tab&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The screenshot below shows us the &lt;strong&gt;Auto Remediation&lt;/strong&gt; tab settings:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-6.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-6&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Agent Advanced Settings – Auto Remediation tab&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Agent Advanced Settings – Auto Remediation tab&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;When done, &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; to save the selected settings and return back to the previous window.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Next&lt;/strong&gt; to move to the next step. At this point, we need to enter the administrator credentials of the remote machine(s) so that GFI LanGuard can log into the remote machines and deploy the agent. Enter the username and password and &lt;strong&gt;hit&lt;/strong&gt; &lt;strong&gt;Next &lt;/strong&gt;and then&lt;strong&gt; Finish &lt;/strong&gt;at the last window:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-7.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-7&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Entering the necessary credentials for the Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 7. Entering the necessary credentials for the Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard will now being the deployment of its &lt;strong&gt;Agent&lt;/strong&gt; to the selected remote hosts:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-8.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-8&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - preparing for the Agent deployment&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 8. GFI LanGuard preparing for the Agent deployment&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;After a while, the LanGuard Agent will report its installation status. Where successfully, we will see the &lt;strong&gt;Installed&lt;/strong&gt; message, otherwise a &lt;strong&gt;Pending install&lt;/strong&gt; message will continue to be displayed along with an error if it was unsuccessful:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-9.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-9&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - LanGuard Agent installation status&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 9. LanGuard Agent installation status&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Common problems not allowing the successful &lt;strong&gt;Agent&lt;/strong&gt; deployment are &lt;strong&gt;incorrect credentials&lt;/strong&gt;, &lt;strong&gt;Firewall&lt;/strong&gt; or &lt;strong&gt;user rights&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To check the status of the installed &lt;strong&gt;Agent&lt;/strong&gt;, we can simply select the desired host, &lt;strong&gt;right-click&lt;/strong&gt; and select &lt;strong&gt;Agent Diagnostic&lt;/strong&gt; as shown below:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-10.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-10&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Accessing GFI LanGuard Agent Diagnostics&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 10. Accessing GFI LanGuard Agent Diagnostics&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;Agent Diagnostic&lt;/strong&gt; window is an extremely helpful feature as it provides a great amount of information on the Agent and the remote host. In addition, at the end of the &lt;strong&gt;Diagnosis Activity Window&lt;/strong&gt;, we’ll find a zip file that contains all the presented information. This file can use email to GFI’s support in case of Agent problems:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-11.png&quot; alt=&quot;gfi-languard-how-to-deploy-agent-network-wide-on-servers-workstations-11&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Running the Agent Diagnostics report&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 11. Running the Agent Diagnostics report&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The &lt;strong&gt;GFI LanGuard Agent&lt;/strong&gt; is an &lt;strong&gt;extremely useful feature&lt;/strong&gt; that allows the &lt;strong&gt;automatic monitoring&lt;/strong&gt;, &lt;strong&gt;patching&lt;/strong&gt; and &lt;strong&gt;updating&lt;/strong&gt; of the host machine, leaving &lt;strong&gt;IT Administrators&lt;/strong&gt; and &lt;strong&gt;Managers&lt;/strong&gt; to deal with other &lt;strong&gt;important tasks&lt;/strong&gt;. Thanks to its &lt;strong&gt;Domain&lt;/strong&gt; &amp;amp; &lt;strong&gt;Workgroup&lt;/strong&gt; support, &lt;strong&gt;GFI LanGuard&lt;/strong&gt; it can &lt;strong&gt;handle&lt;/strong&gt; &lt;strong&gt;any type and size of environment&lt;/strong&gt;. If you haven’t used it yet, &lt;strong&gt;download your copy&lt;/strong&gt; of GFI LanGuard and give it a try – you’ll be surprised how much &lt;strong&gt;valuable information&lt;/strong&gt; you’ll get on your &lt;strong&gt;systems security &amp;amp; patching status&lt;/strong&gt; and the time you’ll save!&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>How to Configure Email Alerts in GFI LanGuard 2015 – Automating Alerts in GFI LanGuard</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-configure-automated-email-alert-option.html"/>
		<published>2015-11-23T09:00:00+11:00</published>
		<updated>2015-11-23T09:00:00+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-configure-automated-email-alert-option.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p&gt;One of the most &lt;strong&gt;important features&lt;/strong&gt; in any &lt;strong&gt;network security monitoring&lt;/strong&gt; and &lt;strong&gt;patch management application&lt;/strong&gt; such as &lt;strong&gt;GFI’s LanGuard&lt;/strong&gt; is the ability to &lt;strong&gt;automate tasks&lt;/strong&gt; e.g&lt;strong&gt; automatic network scanning, email alerts&lt;/strong&gt; etc. This allows IT Administrators, Network Engineers, IT Managers and other IT Department members, continue working on other important matters while they have their peace of mind that the security application is keeping things under control and will &lt;strong&gt;alert&lt;/strong&gt; them instantly upon &lt;strong&gt;any changes detected within the network or even vulnerability status of the hosts monitored&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;GFI LanGuard’s email alerting feature&lt;/strong&gt; can be easily accessed either from the main &lt;strong&gt;Dashboard&lt;/strong&gt; where usually the &lt;strong&gt;Alerting Options&lt;/strong&gt; notification warning appears at the bottom of the screen:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-1.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-1&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard email alerting Option Notification&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. GFI LanGuard email alerting Option Notification&lt;/p&gt;
&lt;p&gt;Or alternatively, by selecting &lt;strong&gt;Configuration&lt;/strong&gt; from the main menu and then &lt;strong&gt;Alerting Options&lt;/strong&gt; from the left side area below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-2.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-2&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard Accessing Alerting Options via the menu&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Accessing Alerting Options via the menu&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once in the &lt;strong&gt;Alerting Options&lt;/strong&gt; section, simply &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;click here&lt;/strong&gt; link to open the &lt;strong&gt;Alerting Options Properties&lt;/strong&gt; window. Here, we enter the details of the email account that will be used, recipients and smtp server details:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-3.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-3&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard Entering email, recipient &amp;amp; smtp account details&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Entering email, recipient &amp;amp; smtp account details&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the information has been correctly provided, we can &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Verify Settings&lt;/strong&gt; button and the system will send the recipients a test notification email. In case of an IT department, a group email address can be configured to ensure all members of the department receive alerts and notifications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, at the &lt;strong&gt;Notification&lt;/strong&gt; tab we can enable and configure a daily report that will be sent at a specific time of the day and also select the report format. GFI LanGuard supports multiple formats such as PDF, HTML, MHT, RTF, XLS, XLSX &amp;amp; PNG.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-4.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-4&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard Notification Window settings&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. GFI LanGuard Notification Window settings&lt;/p&gt;
&lt;p&gt;When done, simply click on the &lt;strong&gt;OK&lt;/strong&gt; button to return back to the &lt;strong&gt;Alerting Options&lt;/strong&gt; window.&lt;/p&gt;
&lt;p&gt;GFI LanGuard will now send an automated email alert on a daily basis whenever there are changes identified after a scan.&lt;/p&gt;
&lt;p&gt;This article showed how &lt;strong&gt;GFI LanGuard&lt;/strong&gt;, a &lt;strong&gt;network security scanner&lt;/strong&gt;, &lt;strong&gt;vulnerability scanner&lt;/strong&gt; and &lt;strong&gt;patch management application&lt;/strong&gt;, can be configured to &lt;strong&gt;automatically send email alerts&lt;/strong&gt; and &lt;strong&gt;reports&lt;/strong&gt; on &lt;strong&gt;network changes&lt;/strong&gt; after every scan.&lt;/p&gt;</summary>
		<content type="html">&lt;p&gt;One of the most &lt;strong&gt;important features&lt;/strong&gt; in any &lt;strong&gt;network security monitoring&lt;/strong&gt; and &lt;strong&gt;patch management application&lt;/strong&gt; such as &lt;strong&gt;GFI’s LanGuard&lt;/strong&gt; is the ability to &lt;strong&gt;automate tasks&lt;/strong&gt; e.g&lt;strong&gt; automatic network scanning, email alerts&lt;/strong&gt; etc. This allows IT Administrators, Network Engineers, IT Managers and other IT Department members, continue working on other important matters while they have their peace of mind that the security application is keeping things under control and will &lt;strong&gt;alert&lt;/strong&gt; them instantly upon &lt;strong&gt;any changes detected within the network or even vulnerability status of the hosts monitored&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;GFI LanGuard’s email alerting feature&lt;/strong&gt; can be easily accessed either from the main &lt;strong&gt;Dashboard&lt;/strong&gt; where usually the &lt;strong&gt;Alerting Options&lt;/strong&gt; notification warning appears at the bottom of the screen:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-1.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-1&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard email alerting Option Notification&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. GFI LanGuard email alerting Option Notification&lt;/p&gt;
&lt;p&gt;Or alternatively, by selecting &lt;strong&gt;Configuration&lt;/strong&gt; from the main menu and then &lt;strong&gt;Alerting Options&lt;/strong&gt; from the left side area below:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-2.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-2&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard Accessing Alerting Options via the menu&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Accessing Alerting Options via the menu&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once in the &lt;strong&gt;Alerting Options&lt;/strong&gt; section, simply &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;click here&lt;/strong&gt; link to open the &lt;strong&gt;Alerting Options Properties&lt;/strong&gt; window. Here, we enter the details of the email account that will be used, recipients and smtp server details:&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-3.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-3&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard Entering email, recipient &amp;amp; smtp account details&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Entering email, recipient &amp;amp; smtp account details&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once the information has been correctly provided, we can &lt;strong&gt;click&lt;/strong&gt; on the &lt;strong&gt;Verify Settings&lt;/strong&gt; button and the system will send the recipients a test notification email. In case of an IT department, a group email address can be configured to ensure all members of the department receive alerts and notifications.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Finally, at the &lt;strong&gt;Notification&lt;/strong&gt; tab we can enable and configure a daily report that will be sent at a specific time of the day and also select the report format. GFI LanGuard supports multiple formats such as PDF, HTML, MHT, RTF, XLS, XLSX &amp;amp; PNG.&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-configure-automated-email-alert-option-4.png&quot; alt=&quot;gfi-languard-configure-automated-email-alert-option-4&quot; style=&quot;border: 1px solid #000000;&quot; title=&quot;GFI LanGuard Notification Window settings&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. GFI LanGuard Notification Window settings&lt;/p&gt;
&lt;p&gt;When done, simply click on the &lt;strong&gt;OK&lt;/strong&gt; button to return back to the &lt;strong&gt;Alerting Options&lt;/strong&gt; window.&lt;/p&gt;
&lt;p&gt;GFI LanGuard will now send an automated email alert on a daily basis whenever there are changes identified after a scan.&lt;/p&gt;
&lt;p&gt;This article showed how &lt;strong&gt;GFI LanGuard&lt;/strong&gt;, a &lt;strong&gt;network security scanner&lt;/strong&gt;, &lt;strong&gt;vulnerability scanner&lt;/strong&gt; and &lt;strong&gt;patch management application&lt;/strong&gt;, can be configured to &lt;strong&gt;automatically send email alerts&lt;/strong&gt; and &lt;strong&gt;reports&lt;/strong&gt; on &lt;strong&gt;network changes&lt;/strong&gt; after every scan.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
	<entry>
		<title>How to Scan Your Network and Discover Unpatched, Vulnerable, High-Risk Servers or Workstations using GFI LanGuard 2015</title>
		<link rel="alternate" type="text/html" href="https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems.html"/>
		<published>2015-11-17T15:16:00+11:00</published>
		<updated>2015-11-17T15:16:00+11:00</updated>
		<id>https://www.firewall.cx/tools-tips-reviews/products/gfi-network-security/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems.html</id>
		<author>
			<name>Administrator</name>
		</author>
		<summary type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1a.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI LanGuard - System Protected&quot; /&gt;This article shows how any &lt;strong&gt;IT Administrator&lt;/strong&gt;, &lt;strong&gt;network engineer&lt;/strong&gt; or &lt;strong&gt;security auditor&lt;/strong&gt; can quickly &lt;strong&gt;scan a network&lt;/strong&gt; using &lt;strong&gt;GFI’s LanGuard&lt;/strong&gt; and &lt;strong&gt;identify&lt;/strong&gt; the different &lt;strong&gt;systems&lt;/strong&gt; such as &lt;strong&gt;Windows&lt;/strong&gt;, &lt;strong&gt;Linux&lt;/strong&gt;, &lt;strong&gt;Android&lt;/strong&gt; etc. More importantly, we’ll show how to &lt;strong&gt;uncover vulnerable&lt;/strong&gt;, &lt;strong&gt;unpatched&lt;/strong&gt; or &lt;strong&gt;high-risk Windows systems&lt;/strong&gt; including &lt;strong&gt;Windows Server 2003&lt;/strong&gt;, &lt;strong&gt;Windows Server 2008&lt;/strong&gt;, &lt;strong&gt;Windows Server 2012 R2&lt;/strong&gt;, &lt;strong&gt;Domain Controllers&lt;/strong&gt;, &lt;strong&gt;Linux Servers&lt;/strong&gt; such as &lt;strong&gt;RedHat Enterprise&lt;/strong&gt;, &lt;strong&gt;CentOS&lt;/strong&gt;, &lt;strong&gt;Ubuntu&lt;/strong&gt;, &lt;strong&gt;Debian&lt;/strong&gt;, &lt;strong&gt;openSuse&lt;/strong&gt;, &lt;strong&gt;Fedora, &lt;/strong&gt;any type of &lt;strong&gt;Windows workstation&lt;/strong&gt; (XP, Vista, 7, 8, 8.1,10) and Apple OS X.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI’s LanGuard is a swiss-army knife that combines a &lt;strong&gt;network security tool&lt;/strong&gt;, &lt;strong&gt;vulnerability scanner&lt;/strong&gt; and &lt;strong&gt;patching management system&lt;/strong&gt; all in &lt;strong&gt;one package&lt;/strong&gt;. Using the &lt;strong&gt;network scanning functionality&lt;/strong&gt;, LanGuard will &lt;strong&gt;automatically scan the whole network&lt;/strong&gt; and use the provided credentials to log into every located host and &lt;strong&gt;discover additional vulnerabilities&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To begin, we launch GFI LanGuard and at the startup screen, select the &lt;strong&gt;Scan&lt;/strong&gt; Tab as shown below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard - Initializing Scan For Vulnerable Host Detection&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Launching GFI LanGuard 2015&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, in the &lt;strong&gt;Scan Target&lt;/strong&gt; section, select &lt;strong&gt;Custom target properties&lt;/strong&gt; (box with dots) and &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add new rule&lt;/strong&gt;. This will bring us to the final window where we can add &lt;strong&gt;any IP address range&lt;/strong&gt; or &lt;strong&gt;CIDR subnet&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-2.png&quot; alt=&quot;&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Adding your IP Network – Subnet to LanGuard for scanning&quot; data-alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-2&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Adding your IP Network – Subnet to LanGuard for scanning&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;enter&lt;/strong&gt; the IP address range you would like LanGuard to scan, e.g 192.168.5.1 to 192.168.5.254 and &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;OK&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The new IP address range should now appear in the &lt;strong&gt;Custom target properties&lt;/strong&gt; window:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-3.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Adding your IP Network – Subnet to LanGuard for scanning&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Custom target properties displays selected IP address range&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; to close the&lt;strong&gt; Custom target properties&lt;/strong&gt; window and return back to the &lt;strong&gt;Scan area&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-4.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Returning back to LanGuard’s Scan area.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Returning back to LanGuard’s Scan area&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point, we can enter the credentials (Username/Password) to be used for remotely accessing hosts discovered (e.g domain administrator credentials is a great idea) and selectively &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Scan Options&lt;/strong&gt; to reveal additional useful options to be used during our scan, such as &lt;strong&gt;Credential Settings&lt;/strong&gt; and &lt;strong&gt;Power saving options&lt;/strong&gt;. &lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; when done:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-5.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Additional Scan Options in GFI’s LanGuard 2015&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. Additional Scan Options in GFI’s LanGuard 2015&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can now hit &lt;strong&gt;Scan&lt;/strong&gt; to begin the host discovery and scan process:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-6.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-6&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Initiating the discovery process in GFI LanGuard 2015.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Initiating the discovery process in GFI LanGuard 2015&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard will being scanning the selected IP subnet and list all hosts found in the &lt;strong&gt;Scan Results Overview&lt;/strong&gt; window area. As shown in the above screenshot, each &lt;strong&gt;host will be identified&lt;/strong&gt; according to its &lt;strong&gt;operating system&lt;/strong&gt; and will be accessed for &lt;strong&gt;open ports&lt;/strong&gt;, &lt;strong&gt;vulnerabilities&lt;/strong&gt; and &lt;strong&gt;missing operating system&lt;/strong&gt; &amp;amp; &lt;strong&gt;application patches&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The full scan profile selected will force GFI LanGuard to run a complete detailed scan of every host.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once complete, GFI LanGuard 2015 displays a &lt;strong&gt;full report summary&lt;/strong&gt; for every host and an overal summary for the network:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-7.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-7&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard 2015 overall scan summary and results.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 7. GFI LanGuard 2015 overall scan summary and results&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Users can select each host individually from the &lt;strong&gt;left window&lt;/strong&gt; and their &lt;strong&gt;Scan Results&lt;/strong&gt; will be diplayed on the &lt;strong&gt;right window area&lt;/strong&gt; (Scan Results Details). This method allows quick navigation through each host, but also allows the administrator or network security auditor to quickly locate specific scan results they are after.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained how to &lt;strong&gt;configure GFI LanGuard 2015&lt;/strong&gt; to &lt;strong&gt;scan an IP subnet network&lt;/strong&gt;, &lt;strong&gt;identify host operating systems&lt;/strong&gt;, log into remote systems, &lt;strong&gt;scan for vulnerabilities&lt;/strong&gt;, &lt;strong&gt;missing operating system&lt;/strong&gt; and &lt;strong&gt;application patches&lt;/strong&gt;, &lt;strong&gt;open ports&lt;/strong&gt; and other &lt;strong&gt;critical security issues&lt;/strong&gt;. IT Managers, network engineers and security auditors should defiantely &lt;strong&gt;try GFI LanGuard&lt;/strong&gt; and see how easy &amp;amp; automated their job can become with such a &lt;strong&gt;powerfull network security tool&lt;/strong&gt; in their hands.&lt;/p&gt;</summary>
		<content type="html">&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1a.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1a&quot; style=&quot;margin: 7px; float: left;&quot; title=&quot;GFI LanGuard - System Protected&quot; /&gt;This article shows how any &lt;strong&gt;IT Administrator&lt;/strong&gt;, &lt;strong&gt;network engineer&lt;/strong&gt; or &lt;strong&gt;security auditor&lt;/strong&gt; can quickly &lt;strong&gt;scan a network&lt;/strong&gt; using &lt;strong&gt;GFI’s LanGuard&lt;/strong&gt; and &lt;strong&gt;identify&lt;/strong&gt; the different &lt;strong&gt;systems&lt;/strong&gt; such as &lt;strong&gt;Windows&lt;/strong&gt;, &lt;strong&gt;Linux&lt;/strong&gt;, &lt;strong&gt;Android&lt;/strong&gt; etc. More importantly, we’ll show how to &lt;strong&gt;uncover vulnerable&lt;/strong&gt;, &lt;strong&gt;unpatched&lt;/strong&gt; or &lt;strong&gt;high-risk Windows systems&lt;/strong&gt; including &lt;strong&gt;Windows Server 2003&lt;/strong&gt;, &lt;strong&gt;Windows Server 2008&lt;/strong&gt;, &lt;strong&gt;Windows Server 2012 R2&lt;/strong&gt;, &lt;strong&gt;Domain Controllers&lt;/strong&gt;, &lt;strong&gt;Linux Servers&lt;/strong&gt; such as &lt;strong&gt;RedHat Enterprise&lt;/strong&gt;, &lt;strong&gt;CentOS&lt;/strong&gt;, &lt;strong&gt;Ubuntu&lt;/strong&gt;, &lt;strong&gt;Debian&lt;/strong&gt;, &lt;strong&gt;openSuse&lt;/strong&gt;, &lt;strong&gt;Fedora, &lt;/strong&gt;any type of &lt;strong&gt;Windows workstation&lt;/strong&gt; (XP, Vista, 7, 8, 8.1,10) and Apple OS X.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI’s LanGuard is a swiss-army knife that combines a &lt;strong&gt;network security tool&lt;/strong&gt;, &lt;strong&gt;vulnerability scanner&lt;/strong&gt; and &lt;strong&gt;patching management system&lt;/strong&gt; all in &lt;strong&gt;one package&lt;/strong&gt;. Using the &lt;strong&gt;network scanning functionality&lt;/strong&gt;, LanGuard will &lt;strong&gt;automatically scan the whole network&lt;/strong&gt; and use the provided credentials to log into every located host and &lt;strong&gt;discover additional vulnerabilities&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;To begin, we launch GFI LanGuard and at the startup screen, select the &lt;strong&gt;Scan&lt;/strong&gt; Tab as shown below:&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-1&quot; style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; title=&quot;GFI LanGuard - Initializing Scan For Vulnerable Host Detection&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 1. Launching GFI LanGuard 2015&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Next, in the &lt;strong&gt;Scan Target&lt;/strong&gt; section, select &lt;strong&gt;Custom target properties&lt;/strong&gt; (box with dots) and &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Add new rule&lt;/strong&gt;. This will bring us to the final window where we can add &lt;strong&gt;any IP address range&lt;/strong&gt; or &lt;strong&gt;CIDR subnet&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-2.png&quot; alt=&quot;&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Adding your IP Network – Subnet to LanGuard for scanning&quot; data-alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-2&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 2. Adding your IP Network – Subnet to LanGuard for scanning&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;enter&lt;/strong&gt; the IP address range you would like LanGuard to scan, e.g 192.168.5.1 to 192.168.5.254 and &lt;strong&gt;click&lt;/strong&gt; &lt;strong&gt;OK&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The new IP address range should now appear in the &lt;strong&gt;Custom target properties&lt;/strong&gt; window:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-3.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-3&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Adding your IP Network – Subnet to LanGuard for scanning&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 3. Custom target properties displays selected IP address range&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Now &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; to close the&lt;strong&gt; Custom target properties&lt;/strong&gt; window and return back to the &lt;strong&gt;Scan area&lt;/strong&gt;:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-4.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-4&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard - Returning back to LanGuard’s Scan area.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 4. Returning back to LanGuard’s Scan area&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;At this point, we can enter the credentials (Username/Password) to be used for remotely accessing hosts discovered (e.g domain administrator credentials is a great idea) and selectively &lt;strong&gt;click&lt;/strong&gt; on &lt;strong&gt;Scan Options&lt;/strong&gt; to reveal additional useful options to be used during our scan, such as &lt;strong&gt;Credential Settings&lt;/strong&gt; and &lt;strong&gt;Power saving options&lt;/strong&gt;. &lt;strong&gt;Click&lt;/strong&gt; on &lt;strong&gt;OK&lt;/strong&gt; when done:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-5.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-5&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Additional Scan Options in GFI’s LanGuard 2015&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 5. Additional Scan Options in GFI’s LanGuard 2015&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;We can now hit &lt;strong&gt;Scan&lt;/strong&gt; to begin the host discovery and scan process:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-6.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-6&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;Initiating the discovery process in GFI LanGuard 2015.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 6. Initiating the discovery process in GFI LanGuard 2015&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;GFI LanGuard will being scanning the selected IP subnet and list all hosts found in the &lt;strong&gt;Scan Results Overview&lt;/strong&gt; window area. As shown in the above screenshot, each &lt;strong&gt;host will be identified&lt;/strong&gt; according to its &lt;strong&gt;operating system&lt;/strong&gt; and will be accessed for &lt;strong&gt;open ports&lt;/strong&gt;, &lt;strong&gt;vulnerabilities&lt;/strong&gt; and &lt;strong&gt;missing operating system&lt;/strong&gt; &amp;amp; &lt;strong&gt;application patches&lt;/strong&gt;.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;The full scan profile selected will force GFI LanGuard to run a complete detailed scan of every host.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Once complete, GFI LanGuard 2015 displays a &lt;strong&gt;full report summary&lt;/strong&gt; for every host and an overal summary for the network:&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;img src=&quot;https://www.firewall.cx/images/stories/gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-7.png&quot; alt=&quot;gfi-languard-scan-network-and-discover-vulnerable-unpatched-high-risk-systems-7&quot; style=&quot;display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;&quot; title=&quot;GFI LanGuard 2015 overall scan summary and results.&quot; /&gt;&lt;/p&gt;
&lt;p style=&quot;text-align: center;&quot; align=&quot;center&quot;&gt;Figure 7. GFI LanGuard 2015 overall scan summary and results&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;Users can select each host individually from the &lt;strong&gt;left window&lt;/strong&gt; and their &lt;strong&gt;Scan Results&lt;/strong&gt; will be diplayed on the &lt;strong&gt;right window area&lt;/strong&gt; (Scan Results Details). This method allows quick navigation through each host, but also allows the administrator or network security auditor to quickly locate specific scan results they are after.&lt;/p&gt;
&lt;p style=&quot;text-align: justify;&quot;&gt;This article explained how to &lt;strong&gt;configure GFI LanGuard 2015&lt;/strong&gt; to &lt;strong&gt;scan an IP subnet network&lt;/strong&gt;, &lt;strong&gt;identify host operating systems&lt;/strong&gt;, log into remote systems, &lt;strong&gt;scan for vulnerabilities&lt;/strong&gt;, &lt;strong&gt;missing operating system&lt;/strong&gt; and &lt;strong&gt;application patches&lt;/strong&gt;, &lt;strong&gt;open ports&lt;/strong&gt; and other &lt;strong&gt;critical security issues&lt;/strong&gt;. IT Managers, network engineers and security auditors should defiantely &lt;strong&gt;try GFI LanGuard&lt;/strong&gt; and see how easy &amp;amp; automated their job can become with such a &lt;strong&gt;powerfull network security tool&lt;/strong&gt; in their hands.&lt;/p&gt;</content>
		<category term="GFI Network Security" />
	</entry>
</feed>
