Chapter 2: Logging And Blocking; Web Access Logging; Instant Messaging, Peer-To-Peer Blocking; How Im And P2P Blocking Works - M86 Security M86 User Manual

Web filtering and reporting suite
Hide thumbs Also See for M86:
Table of Contents

Advertisement

W
F
I
EB
ILTER
NTRODUCTORY

Chapter 2: Logging and Blocking

Web Access Logging

Instant Messaging, Peer-to-Peer Blocking

38
S
C
ECTION
HAPTER
One of the primary functions of the Web Filter is to log the
activity of users on the Internet. Information captured in the
log can be transferred to a reporting appliance, to be viewed
on a PC monitor or output to a printer.
Log files from the Web Filter are transferred to the SR where
they are "normalized" and then inserted into a MySQL data-
base. The SR Report Manager accesses that database to
generate queries and reports.
The Web Filter has options for blocking and/or logging the
use of Instant Messaging and Peer-to-Peer services, and
makes use of Intelligent Footprint Technology (IFT) for
greatly increasing management and control of these
popular—yet potentially harmful—applications. This section
explains how to set up and use IM and P2P.

How IM and P2P Blocking Works

IM Blocking

Instant Messaging (IM) involves direct connections between
workstations either locally or across the Internet. Using this
feature of the Web Filter, groups and/or individual client
machines can be set up to block the use of IM services
specified in the library category.
When the IM module is loaded on the server, the Web Filter
compares packets on the network with IM libraries stored on
the Web Filter. If a match is found, the Web Filter checks the
user's profile to see whether the user's connection to the IM
2: L
B
OGGING AND
LOCKING
M86 S
U
G
ECURITY
SER
UIDE

Advertisement

Table of Contents
loading

Table of Contents