Monitor or Block a Connection in Real-time
Administrators can see what websites users are currently browsing and what files are being downloaded. An active connection, browsing session or download can easily be blocked, simply by clicking the block connection icon. Very useful if you need to interrupt the download of an overlarge file.
Block Applications' Hidden Downloads
Some software applications will connect to their home pages to download updates without the user’s consent, using HTTP tunneling. Although this reduces software version administration, it also presents a security risk. Unknown applications (or Trojans) often use the same technique to download malicious files. Without the user’s consent spyware, adware and pornware can be downloaded to his or her PC. GFI WebMonitor gives you control over which sites are allowed to distribute updates, ensuring only safe sites (for example www.microsoft.com) gain behind-the-scenes access to your computers.
Hidden Downloads Monitoring
This feature allows administrators to assess the legitimacy or otherwise of downloads that are not initiated by the user or the browser. By examining the list, the administrator will be able to block or allow future downloads by adding the URL to a blacklist or whitelist respectively. This feature will block and identify background processes from downloading payloads that may be malicious in nature or use up network resources.
Through user and site bandwidth monitoring features, the administrator has the ability to track download and upload traffic and the number of URL hits over time, either on a user-by-user basis or on a website basis. Real-time monitoring is achieved through drilldown reporting complete with graphs, available within the user interface.
Allow Exceptions through Whitelist and Blacklists
Any URL or user or IP can be added permanently or temporarily to the whitelist or blacklist which will supersede all web filtering and web security policies. For example, you could temporarily grant access to a particular user for his or her personal webmail account for a specified period of time, say over employee lunch breaks.
Controlled Access to the Configuration and Monitoring
GFI WebMonitor allows you to select which users can access the program’s configuration and monitoring interfaces. You can assign rights based on either the IP of the computer from which access is being made or by the domain-authenticated username of the client trying to load the configuration. Only users in GFI WebMonitor’s authorized users or IP list will be given access.
Support for Virtual Environments
Organizations that are currently using or plan to use virtualization on their network can still install and use a range of GFI products with confidence. GFI WebMonitor supports and runs on the most common virtualization technologies in use, namely VMware, Microsoft Virtual Server and Microsoft Hyper-V.
All products are protected by the Manufacturer’s warranty, unless otherwise specified. NCDS Canada guarantees that the products shipped to you are free of any defects; should your product be deemed defective we will happily exchange the item. If the item is no longer available, we will issue you a refund. Refurbished Products have a 30 day limited warranty, unless otherwise specified. For more information about product warranties, please see our Warranty Policy.