26Now we select the type of directory service you use. In this example we will use “Local Database”.(but you would normally use your own directory tree – NT, Novell, LDAP, etc)
27Remember to ‘enable’ the policy, by ticking the box Then we scroll down to input some user names.
28We type in some user names GeorgeGeorginaJeremyGeoffThen we save
29From here we can set Categories, File types, Custom URLs, or Other Rules for your users.Or return toContentKeepermain menuSelect one of these
30There are some 30 categories to choose from Let’s see what options there are….Click the dropdown boxAnd choose for each category
31You can choose from the list, for each category “Block” will block the user. Users will see a Red Blocking screen(or you can create your own)
32The user will see a screen like this Click here to see the next option(Coaching screen)Click here to go back to Policies
33You can choose from the list, for each category “Coach” will warn the user. They will see a Green Coaching screen(or you can create your own)
34The user will see a screen like this Click here to see the next option(Authenticate)Click here to go back to Policies
35You can choose from the list, for each category “Authenticate” will challenge the user before proceeding. They will see a Blue screen asking for their username/password
36The user will see a screen like this If the user wishes to continue, they will be asked for their username/passwordClick here to see the next option(PSUs)Click here to go back to Policies
37You can choose from the list, for each category Some organisations allow their user ‘some’ time to surf the net freely. The Personal Surfing Units (or PSU), provides control over the amount of time a user can surf freely, within a particular category
38Let’s return to categories and see the next option (Time of Day) Personal Surfing Units (PSU) allows a user (or group) to access the web category for a defined period of timeHere you can set the amount of time that users are allow ‘free’ access to this category.Let’s return to categories and see the next option (Time of Day)
39The next option is “Time of Day”, where you can allow users access during particular times of the dayFor instance, allowing users to access the “News” before 8am and after 5pm and during lunch times
40You can click on the time of day (and all days will change), or day of week (and all times will change)Very Flexible
41Lets “allow”, users to access the News category You can click on the time of day (and all days will change), or day of week (and all times will change)Lets “allow”, users to access the News categorybefore 8amafter 5pmand lunchtimeWe will return to Policies to see other optionsVery Flexible
42You can control and flexibility over different file types Allow,Block,Coach,Authenticateor set Time of Day
43You can control and flexibility over different file types Allow,Block,Coach,Authenticateor set Time of Day
44You have control and flexibility over different file types Let’s return to Policies to see more optionsClick hereYou canAdd as many types as you like (these are just examples)
45You can control individual URLs if you wish (some call this the “white” and “black” list).
46And still have the flexibility over how you want it controlled. You’ll notice a new option here.“Block and Discard”. This is for things like SpyWare, where there is a lot of repeat blocking. You want it blocked, but don’t necessarily want it clogging up your blocking reports.And still have the flexibility over how you want it controlled.You can type in an individual URL
47You can use wildcards, like www.*.gov.* Allowing (in this case) access to all Government sites, world wide.
48You can even use ‘arguments’, like www.address.com/?something Lets return to Policies to see more optionsClick hereNo one else can do that !
49Other rulesFor some users, you may want to block them, but not have it appear in the reports
50You can return to Policies Other rulesAlternatively, perhaps you want sites blocked, but don’t want to generate a blocking pageOr return toContentKeepermain menuYou can return to PoliciesClick here
51Return toContentKeepermain menuAllows you to quickly see which policies are enabled and quickly see a report
52either the IP address or a username Allows you to verify the category of a URL and what would happen if a particular user or PC were to request it..andeither the IP address or a usernamenow VerifyJust type in the URL…geoff
53ContentKeeper reports to you, what the user would see. Return toContentKeepermain menuContentKeeper reports to you, what the user would see.
54This allows you to change the name of the categories, so they may be more recognisable for you Return toContentKeepermain menu
55Lets you see (and set) the port number You can turn blocking ‘on’ (or off into Silent mode, so we can just monitor.Return toContentKeepermain menuThis lets you set which categories are ‘live’ blocked
56Lets us exclude (or include) specific machines (IP addresses) Return toContentKeepermain menu
57If you would like, you can set up your own customised blocking page, with your logo and Internet usage policy detailsReturn toContentKeepermain menu
58This allows us to configure the username resolution, by the many options of IP address, or…
59Of course, there is always the ‘automatic’ setting ! Or using your own Proxy authentication. Whichever is easier and more relevant to your siteOf course, there is always the ‘automatic’ setting !Return toContentKeepermain menu
60Lets you choose your management port settings Return toContentKeepermain menu
61This allows you to manage it, remotely For failsafe, some organisations use a High Availability Module (H.A.M.)This allows you to manage it, remotelyReturn toContentKeepermain menu
62Allows you to enable/disable reclassification by users Return toContentKeepermain menu
63Provides flexibility to set up the network cards Return toContentKeepermain menu…and reports back
64Generates the point, from which authentication occurs (when/if the user is challenged by an Authenticate page.)Return toContentKeepermain menu
65Allocate a user (and password) Department heads can be given access to an automatically generated report, just of their employeesAllocate a user (and password)Then choose the departmentClick here to generate a test report
66Insert the username and password we just created ckadmin******Insert the username and password we just created
67Select the period of time, you want the report to cover (the department head can do this too)
68This is a Blocking report, based on a Policy called “geoff”. You can see who was blocked, from what machine (IP address), Time, method of blocking, etcThis is a Blocking report, based on a Policy called “geoff”.It can sorted by any of the grey buttons.We will now return to the ContentKeepermain menu
69Insert slidesNeeds new Blocking,Then sorted by each column
70Return toContentKeepermain menuContentKeeper allows you to create your own groups (in addition to your existing Directory service groups)
71Just provide the Server IP and Ck will automatically import all your usernames, groups, eDirectory, etcReturn toContentKeepermain menu
72Allows you to select which historical log file you require. Lets select the Internet Activity fileShowing you the size of each file
73You can select the format you want to save it in.
74Then you download it to a folder/directory that you nominate. Return toContentKeepermain menuThen you download it to a folder/directory that you nominate.
81We will go back to the main menu Top users by usernameWe will go back to the main menu
82Shows current Internet activity, by site, by user. Return toContentKeepermain menuShows current Internet activity, by site, by user.
83Scroll down Current Blocking report You can see who has been blocked, coached (warned) or AuthenticatedScroll down
84We will return toContentKeepermain menuYou can set ContentKeeper in “silent” mode, to see how the Policy would work. These users weren’t blocked, but would have been if the Policy “mario” was turned on.
85Let’s see what Internet activity is going on. You will see who is surfing to where in real time. It will continue to scroll down as user requests are accepted.Let’s see what Internet activity is going on.Now let’s choose to see who is being blocked.Dynamic Activity Viewer allows you to selected the activity you want to see and see it in real-time.
86Now let’s choose “Discarded Block Activity”. Live Blocking activity shows users who are being blocked, in real-time.Now let’s choose “Discarded Block Activity”.
87Now let’s choose the “Coach” activity. Live Discarded Blocking Activity shows activity that has been blocked, but does not appear In the blocking reporteg: Spyware.Now let’s choose the “Coach” activity.
88We will return to the main menu Live Coach Activity shows users that are deciding to click-thru after receiving a Coach (warning) screen.The window will scroll through, as activity occurs.We will return to the main menu
89We can choose the period of time we wish to monitor jeremyWe will search for the activity of “jeremy”.Now Generate the report.
90Choose one, or you can go back to the main menu We can choose the ones in colour.The ones in black mean there has been none of this activity in the period we have chosen (remember we chose to see activity in last hour)