Home
5 Enterprise Report Manager - GRUPO MULTISERVICIOS GLOBALES
Contents
1. Preferences Ads d Guns amp Weapons v Adult 7 Image Search V Audio amp Video W Jobs V Dating amp Personals Mobile Phones NI Dictionary NI News 4 Drugs V Private Websites V Education d Web Proxies V Entertainment VI Religion 9 File Sharing V Search Engines M Finance amp Investment V Shopping d Forums dl Sports Friendship V Toolbars Gambling 4 Travel 4 Games V Violence amp Hate 4 Government d Virus amp Malware v Web Based E mail Log Bandwidth Statistics Disabled Enabled Log All File Types Disabled Enabled Current Activity Monitor Disabled Enabled Browse Time Sensitivity Note This setting has no effect when using an external report manager When using an external report manag jer configure browse time e sensitivity through the settings page of the report manager instead seconds Figure 53 Edit General Report Settings Rev 5 0 27 215 May 26 2010 Page 95 of 191 Phant m iBoss Technologies Enterprise These report settings are for the Report Manager Performance Settings You may choose between More Logging More Performance and External Report Manager This will set the logging settings for you Some of the settings may disappear depending on which setting you select It is recommended to use More Performance if you do not have an External
2. 82 Fig re44 Port Blocking MNT E 83 Figure 45 Block Specific File Extensions sesessseseessesereseereesresrrseresresrseresresseserertesseseresreeseeet 84 Figure 46 Restrict Domain Extensions eeseeeseeseseesseeserssesressresrrserssreseseresresseserertessesetenreeseeee 85 Figure 47 Configure Sleep Scie eS sisirin aea c ce pape EH Und 87 Figure 48 Internet Sleep Mode FOE estate gege Zeie 89 Figure 49 Real time Monitoring Recording iu scere ett Eugene nda 90 Figure 50 Edit My Preferentes TEN 92 Figure 51 Set or Change My Password E 93 Fig re 52 Config re Report E 94 Figure 53 Edit General Report Seltmgs ueie ro ete etta Eb SES 95 Figure 54 External Report Manager Settings iussione pucises ere IRI Ree DIR tSc NV aae eati dta IE Qe RUE 96 Figure 55 URL Logging E E 97 Figure 56 Customize Block Pages ie etes iae teen Eun bis Med hers va bum ei E toe d 98 Fig re f 1B Oss Moioe colui PO 100 Figure 58 Set Time ZOMG T 101 Figure ET 102 Figure 60 Setup Remote EE 103 Figure 61 Identify Computers amp Users seeeseseeseesesesesrrssreerssessrteresresstsererteestestesreeserseeseeesee 105 Rev 5 0 27 215 May 26 2010 Page 7 of 191 Phant m iBoss Technologies Enterprise Figur 62 Id ntify Com s NOE i inean 105 Figure 63 Importing Computers ssesseessesseestssresressttsresressttstestenserstssesstestsetestessese
3. S 186 6 7 FIRMWARE RD Em 186 7 SUBSCRIPTION MANA GEMUBENTT eoe sese cs essen ione ase to aao ee en ases ba sco a neon roo osea Feu era Na eR SEENEN 187 7 1 ADDING A SUBSCRIPTION KEN 187 8 JuOIDIEID Cold Cs geesde dE EEN M 188 S21 PASSWORD ee EE 188 8 2 RESETTING TO FACTORY DEFAULTS seassssosiaseesiiuse sad areara r a eatea nene a aE sa RE Ene A Sa aE E EAE SESS 188 8 2 1 Through the iBoss User Interface 188 8 2 2 Using the iBoss ConsolePort ec istic bei ede Set lo ee t bete a i acti hs 188 8 3 TECHNICAL EIERE Pc tese ette e eee Eee eel ela e cede vete eeE 188 9 ALPPEIN DI D des M M 189 9 WARRANTY INFORMATION eee e e e e e enn ia or aE A EO EDE a ase sana ass asa ases e se usata sa AEE EERE es asas u 189 10 GLOSSARY 0 190 11 VREGUGATORY STATEMEN Dis ccsssesssvuscecestussssscicsscsasssseusttcssestesesssvescessgvossenscecsseedseesssnesecsnatesvecstestesecseeste 191 Table of Figures Fig re 1 T ONE Proper E 12 Figure 2 1Boss User itera eios ee basa iR uis uec E d dva ed e ua iesu ede 15 Figure 3 Setup Network Connection eer 16 Figure 4 Configure Internet EE 18 Fig re 5 ER 20 Figure 6 Active Directory amp Proxy Settings eesessesereseessesressrseresresseseresresseserertenseretesressee 23 Figure 7 Proxy Cache System Information ssesseeesesseseeseesresrersetsesreesteseseersrestsrresseseresree
4. L Bytes Count Count Bogen 2161969713 11501 8212M8 08 120 000 100 000 200 70 74 29 162MB 2399KB 08 g wm wom 10 0 0 21 143MB 1296K8 08 D am Pes 2000 4 77100k8 amp J0K8 08 D 65 885 588 47724KR OS2KR op l 196 97 131 Figure 109 IP Address Statistics iBoss En Rev 5 0 27 215 May 26 2010 Page 173 of 191 Phant m iBoss Technologies Enterprise 5 5 4 1 Bandwidth Activity This graph shows the total bandwidth activity throughout the report period This graph is contained in all of the top level report subsections for reference 5 5 4 2 Top IP Address Utilization The following sections in this subsection contain the top IP Address destinations used The usage is broken into three sections Top IP Address Destinations which includes both upstream and downstream usage Top IP Address usage downstream which includes downstream usage and Top IP Address usage upstream which includes upstream usage You can mouse over a variety of items on this page like the IP Addresses themselves to get more details Top IP Address Destination Usage Below is a report of the top IP address destination usage Note You may click the IP address if available for IP Detail statistics You may click on the More button if available for more results IP Total Packet Block Bytes Count Count 5 000 000 4 500 000 Ei 216 196 97 1314 78 GB 5331798 0 4 000 000 3 500 000 op 3 000 000 E 2
5. Product Support System Settings Boss This page allows you to edit and adjust your system settings The Session Timeout allows you to adjust the number of seconds you can be idle while managing iBoss settings before you are automatically timed out A value of 0 disables the timeout You must choose a timeout equal to or greater than 5 minutes 300 seconds The Device Name is the name associated with your iBoss You may choose any name you would like Restore Factory Defaults This option allows you to set your iBoss settings back to factory defaults Internet Controls Note This resets all settings including passwords schedules filtering rules etc Preferences Session Timeout Session Timeout seconds Basic Settings iBoss 42d4 Device Name Device DNS myiboss com 09 Phantom Technologies LLC All rights All trademarks and r ed trademarks on this website are the p of their respective owmers Figure 59 Edit System Settings The Edit System Settings page allows you to edit your device name of your iBoss Restore Factory Defaults This option allows you to set your iBoss settings back to factory defaults You may also choose to Reboot amp Shutdown the device from this page Rev 5 0 27 215 May 26 2010 Page 102 of 191 Phant m iBoss Technologies 4 3 6 Setup Remote Management IBoss Jump To Please Select Y ee Web Filters
6. Product Support My iBoss iBoss Remote Management Enterprise You may enable Remote Management which will allow you to access and manage the iBoss through the web from any remote location To enable Remote Management select the enable option below Disable Enable Register Unit With Remote Managemen Internet Click the Register Unit Now button below to assign this unit to an Remote Management Account If you do not have an account created Controls you will have to create one Registration information for this unit will automatically be transferred to simplify the registration process Preferences Registration Key Each iBoss holds a unique registration key used in the Remote Management registration process This key provides security when using the Remote Management features through the web You will be prompted for this key during the online registration process You may generate a new key by clicking the Generate Key button below A Alert Generating a new key will remove this unit from any Remote Management account that it is currently assigned to Device Name iBoss Key 09 Phantom Technologies All trademarks and regis d trademarks on this website are the pro Figure 60 Setup Remote Management You may enable Remote Management which will allow you to access and manage the iBoss through the web from any remote location To enable Remote Management select the enable Rev 5 0 27 215
7. 5 5 1 Report Information Section eese 5 5 1 1 Showing Report Information for Particular Users 5 5 1 2 Quickly switching between reports T Se 5 5 2 Web Usage Stats neS de eher emet E tete odes See 5 5 2 1 Web Category Usage 5 35 2 2 Category Time Usage s 5 5 2 3 Top Visited and Blocked Domaiii tre rhet ede p te re t ten rn EF t ae N 5 5 2 4 Visited Websites EE 5 5 3 Port Statistics 5 5 3 1 Bandwidth Activity Rev 5 0 27 215 May 26 2010 Page 5 of 191 Phant m iBoss Technologies Enterprise 3 5 3 2 Top Ports OSed 170 5 5 4 VERITATE OE A E E E rc E EE P eee ee TA 172 5 5 4 1 EE TEE 174 5 5 4 2 Top IP Address Utilization isisisi 3 rie te e eet enmt ibid iier P ge 174 5 5 5 Bandwidth Staiisties tee evene ae ven Mte vene ee EEN EEN 176 5 5 5 1 Bandwidth CCP 178 5 5 5 2 Overview of Total Bandwidth Usage 178 5 5 6 ADDIICOUOf SLAUSTICS E 181 5 5 6 1 Band width PSI RET 182 5 5 6 2 Top Applications srca EE 182 6 REMOTE MANAGEMENT cissscccsssscsscesssssovsteesssencesseesssesssscnsessusccssessscsssvsnecssevsessosessessessccssesnsioeesbssseseesoess 185 6 1 SETUP ACCOUNT NEE 186 6 2 ADDING UNITS TO YOUR ACCOUNT 186 6 3 GROUPS PER 186 Le MM Ee OR 186 6 5 E En Le 186 66 oc
8. a 3 2 3 8 Add Additional Routes 3 2 3 9 Bypass IP Ranges 3 2 3 10 Add Additional Local Subnets 3 2 3 1 Register Internal Gateways 3 2 3 12 Edit Advanced Network Senge 54 33 INSTALLING THE IBOSS ON THE NETWORK scsscssescsccscsscescestosassctescescovtesecesevaceccosencestecnnestescescesucsbansedaceveesecveos 55 3 3 1 Additional Setup Steps and Notes 55 4l HOME PAGE 4 1 1 a 4 1 2 Main Meni mm 4 1 3 Shortcut Bar 4 2 CONFIGURE INTERNET CONTROLS 4 2 1 Block Specific Website Categories 4 2 1 1 Advanced Scheduling 3 oa oon cei re Gub Ope re cen T a eet ts A tee e eae D ace neuve eire 4 2 1 2 Identify Theft Phishing IP Address Blocking Page 4 2 2 Programs Protocols amp DLSP Data Leakage Protection 4 2 3 Bandwidth Throttling QoS 4 2 4 Block Specific Websites 4 2 4 1 Custom Blocklist Categories eio petere ten reed oberen dor eie tie na e i ed us 4 2 4 2 ID SICHER 4 2 1 Allow Specific Websites 4 2 1 1 C stoni Allowhst Categories nna cierre reete oett t rhe rao Ern Pee ende e tbe da Se aeia ii keii 4 2 1 2 All svlist Import oie remet ete ee eee tiet i mie on eir ON EESE OE 4 2 2 Block Specific Keywords 4 2 2 1 Key online RT EA 4 2 3 Block Specific Ports ie Pa REED a E 4 2
9. Edit General Report Settings URL Logging Ignore List Internet Controls Preferences 009 Phantom Technologies LLC All rights reserved All trademarks and re red trademarks on this website are the property of their respective owners Figure 52 Configure Report Settings The Report Settings menu allows you to choose options for configuring the report manager of the iBoss There are three options to choose from Edit General Report Settings URL Logging Ignore List and Video Recording Settings Feature Addition Upgrade Edit General Report Settings This option allows you to enable or disable logging for specified statistics in the Reports URL Logging Ignore List This option allows you to add domains which you do not wish to log to the iBoss Reports database Rev 5 0 27 215 May 26 2010 Page 94 of 191 Phant m iBoss anten Enterprise 4 3 2 1 Edit General Report Settings s e IBoss Jump To Please Select Go WebFilters About Product Support My iBoss Report Settings Boss nu Help Topics This page allows you to enable or disable logging for specified statistics in the Reports General Settings Configure iBoss for More Performance Y Log Web Statistics Internet Controls Disabled p Enabled Log the following checked categories
10. Rev 5 0 27 215 May 26 2010 Page 189 of 191 Phant m iBoss Technologies Enterprise 10 GLOSSARY Default Gateway Every non router IP device needs to configure a default gateway s IP address When the device sends out an IP packet if the destination is not on the same network the device has to send the packet to its default gateway which will then send it out towards the destination DHCP Dynamic Host Configuration Protocol This protocol automatically gives every computer on your home network an IP address DNS Server IP Address DNS stands for Domain Name System which allows Internet servers to have a domain name such as www iPhantom com and one or more IP addresses such as 208 70 74 14 A DNS server keeps a database of Internet servers and their respective domain names and IP addresses so that when a domain name is requested as in typing iphantom com into your Internet browser the user is sent to the proper IP address The DNS server IP address used by the computers on your home network is the location of the DNS server your ISP has assigned to you DSL Modem DSL stands for Digital Subscriber Line A DSL modem uses your existing phone lines to transmit data at high speeds Ethernet A standard for computer networks Ethernet networks are connected by special cables and hubs and move data around at up to 10 100 million bits per second Mbps IP Address and Network Subnet Mask IP stands for Internet Protocol
11. Phant amp m Technologies 5 5 6 Application Statistics iBoss Enterprise The application statistic section provides information regarding specific application usage on your network In this section you can determine how your different network applications are utilizing the traffic on the network in order to identity potential problems and optimize the network Application Usage Report Ia wt ge mov selon the Preteen te henge o emo Protocol B a H i Am noo 3 mm Dro 12 09 AM QUON ON CR AM CHIE OR TAM 08 15 00 12 20 PM 08 7 08 04 20 PE Clue Besse Boorse xo Zi Tad red Mh ba en cmt Comet D I Oi e rm mz H fra ES e E met msm mm o P Pio menn ime o a nae ne bs m ne mm e je Packet Block teat 7777 ot Ctm Di e sm v s P rer um mur D Po we nsa mm a a Ds oe o es bes Di vem sme mm s om bro i mee s H s keng Di we saa nn D o cm IEN mri ar D oR 1 c e e Figure 115 Application Statistics Rev 5 0 27 215 May 26 2010 Page 181 of 191 Phant m iBoss Technologies Enterprise 5 5 6 1 Bandwidth Activity This graph shows the total bandwidth activity throughout the report period This graph is contained in all of the top level report subsections for reference 5 5 6 2 Top Applications The following sections in this subsection contain the top network applications used The usage is broken into three sections Top overall usage t
12. chrislapt chrislapt chrislapt shivaji s chrislapt chrislapt chrislapt chrislapt chrislapt shivaji s chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt s0 2mdn net 1311608 728x90clicktag tag admeld com pixel admeld adprovi rovi pni bc yahoo com b P 2NNepNj8fUSukF pni bc yahoo com b P XI3FiNjB UBukF pni bc yahoo com b P kkhnztj8BfUBukF hoo com b P rONKudjefl kF pni bc yahoo com b P 3bL6Lti8fU8ukI pn1 be yahoo com b P KISOTdiSfUBuUkF iki i index php title en wikipedia or en wikipedia org w index php title vikipedi index php title ia or in en vikipedia org viki Content contr tag admeld com pixel admeld adprovi www google com url sa T amp source web8 tag admeld com pixel admeld adprovi admeld Gelz rovi rm zoho com crm ShowEntityInfo do ar voicefive com brnx3 node pli pubz www pcmag com article2 0 2817 15327 H le twitter com statuses friends timeli It andomedia com It quid c3FsMDA2fk osc webroot com b ss webrootglobalp osc webroot com rl sa T amp source webrootglobalp Figure 78 Real time URL Access Activity 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Sear
13. www iBossWebFilters com Open Source Code This product may include software code subject to the GNU General Public License GPL GNU Lesser General Public License LGPL or other open source software licenses Copies of the GPL and LGPL licenses are available upon request You may also visit www gnu org to view more information regarding open source licensing The GPL LGPL and other open source code used in Phantom Technologies Inc products are distributed without any warranty and are subject to the copyrights of their authors Upon request open source software source code is available from Phantom Technologies Inc via electronic download or shipment on a physical storage medium at cost For further details and information please visit www iphantom com opensource Rev 5 0 27 215 May 26 2010 Page 2 of 191 Phant m iBoss Technologies Enterprise Table of Contents TABLE OF FIGURES e 6 1 IBOSS ENTERPRISE WEB FILTER 0 cssssssssccssscccsscccsccssccssscssscssscnssssescncesscesecssocssesssessecssccssessesesssees 10 Tipo OVERVIEW scccscocscecertiesacetesesncsatcacestccecectaneqaucesetucutsca EPOR EE NE ERE ERE EROR ERE CPNR ERE REIR RIS PE fete 10 12 KEY FEATURES rA 10 ES MANUALS TRUGTURE e coit reiecit estere o eet pete eiat ete e ERR ege EHE Gee OE SE dace OEE N a E E ENESA ET 10 1 4 SYSTEM RGOUIREMENTS econ restek ra aor eee E R EE EREE EAA eaae RESES 11 2 SPECIFICA TIONS sess
14. 208 70 74 29 47 95 MB 64369 Oo 4 J 02 500 000 2 000 000 D 3 65 54 87 58 24 22MB 25302 0 ga 1 500 000 1 000 000 E 4 208 70 74 5 5 68MB 14674 0 500 000 E 5 209 197 115 674 14 MB 4783 0 5 196 97 131 208 70 74 29 65 54 87 58 208 70 74 5 9 197 115 67 Figure 110 Top IP Address Utilization If you click on the More button in any of these sections you will get a full list of IP Addresses which can be sorted by a variety of criteria 5 5 4 2 1 IP Address Detail By clicking on any of the listed IP Addresses on this page you will be taken to a full detail page for that IP Address Rev 5 0 27 215 May 26 2010 Page 174 of 191 Phant m iBoss Technologies Pose Current Report System Activity Schedules Information Logout Jump to Report Generated Report Dady Report 05 15 2008 a Report Name Daily Report Date 05 15 2008 05 16 2008 Show Report For Ali Lisers in This Report IP Address Detail Note You may select the Protocol to change the view IP Address 208 70 74 5 Protocol All 7 Also Known As support iphantom com Total Byte Count 5679 239 KB Total Byte Upstream 771 003 KB Total Byte Downstream 4900 156 KB Total Packet Count 14674 IP Bandwidth Activity Below is a report of IP 208 70 5 bandwidth activity Ni ou may click and drag from a starting paint and an ending point of the timeline to zoom in M3 6 be oO kbits sec 05 15 08 11
15. May 26 2010 Page 103 of 191 Phant m iBoss Technologies Enterprise Register Unit Now Click the Register Unit Now button below to assign this unit to a Remote Management Account If you do not have a Remote Management Account created you will have to create one Registration information for this unit will automatically be transferred to simplify the registration process Registration Key Each iBoss holds a unique registration key used in the Remote Management registration process This key provides security when using the Remote Management features through the web You will be prompted for this key during the online registration process You may generate a new key by clicking the Generate Key button below Important Note Generating a new key will remove this unit from any Remote Management account that it is currently assigned to Rev 5 0 27 215 May 26 2010 Page 104 of 191 Phanta m Technologies 4 4 Identify Computers amp Users iBoss En Wi Computers LA Users JS Figure 61 Identify Computers amp Users The Identify Computers amp Users has tabs at the top to switch from identified computers added user accounts and groups 4 4 4 Identify Computers iBoss mE Tems 1 5015 Items Per Page B Eeey Neas Libera ited Computers Default Filtering Policy Figure 62 Identify Computers Rev 5 0 27 215 May 26 2010 Page 105 of 191 Ph
16. adult Wild Card High Risk Apply this entry to all filtering groups No entries in list Figure 42 Block Specific Keywords Rev 5 0 27 215 May 26 2010 Page 80 of 191 Phant m iBoss Technologies Enterprise This feature allows you to create keyword Blocklists The iBoss will block Internet sites that contain these specific keywords in the URL In addition web searches using the keywords in the list s will also be blocked Pre Defined Lists You may select from pre defined keyword category lists Each category contains its own keyword list To enable a keyword list select the checkbox next to the category You may view and edit the list by clicking on the category link When you are finished click the Apply button To see the pre defined list you may click on the category name to see the pre defined list and uncheck words if you wish Custom List Enter the custom keyword that you would like to block in the text box below and click the Add Keyword button You may enter a maximum of 2000 website URL keywords across all profiles Each keyword may be a maximum of 19 characters in length letters and digits only To remove a keyword from the list select the keyword and click the Remove button located at the bottom of the page When you are finished click the Done button Note If you want a keyword to be blocked globally across all filtering groups select the Apply this
17. 1 Web Category Usage The next section shows overall web category usage It displays both total accesses and blocked accesses relative to each other You can click on any of these bars to get more detail about the particular category usage 5 5 2 1 1 Web Category Detail If you click on the bar for a particular web category you are taken to a detail page showing information pertaining to that particular category Rev 5 0 27 215 May 26 2010 Page 163 of 191 Phant m Technologies iBoss Current Generated Report System Activity Reports Schedules Settings Information Generated Report Report Name Daily Report Date 05 15 2008 05 16 2008 Show Report For All Users in rt Statistics iP Statistics Usage Statistics Applicat Web Category Detail Category Audio Video Total Hit Count 1212 Total Block Count 0 Hit And Block Activity Below is a report of the Audio Video web category hit and block activity Note You may click and drag from a starting point and an ending point of the timeline to zoom in 1 200 1 000 800 600 400 200 05 15 08 09 49 AM 05 15 08 11 19 AM 05 15 08 12 49PM 05 15 08 02 18 PM 05 15 08 03 49 PM Bu coup E Block Count m Webhits sec Top Users for Web Category Below is a report of the top users for web category Audio Video Note You may click the More button if available for more entries Total Hit l Usern
18. 108 Top Used Ponts T 170 Rev 5 0 27 215 May 26 2010 Page 8 of 191 Phant m iBoss Technologies Enterprise Figure 109s dbi EN 171 Fig r 110 IP Address Statistics eod nectadec codec dent Hr ptt enion entai iis eaa 173 Figure 111 Top IP Address Utilization eeeseseeeeeeseeesesrssreesesressrserrsresstssrertensetsresreseeseeseeesee 174 Figur 112 Top IP Address Detalles o ceacusbaiteacassaudeiencebeddaadeeeechgoteaciuequedteaustucasnedigensies 175 Figure 115 Bandwidth Statistics deeg eher 177 Figure 114 Overview of Total Bandwidth Usage eene 178 Figure 115 Bandwidth Usage Debut epi duce punti dt ede omnim bcd uie tutu du tmu aba SUE RED lee 179 Figure 110 Application EE eege 181 Figure 117 Top Applications Usage eseeeseseeseeseessieesesrsrrsrrssressrseresresstsstesteesetsteseeseesesreesee 182 Igi e 118 Application IDG cir eenegen 183 Figure 119 Remote Management ccgcisccssdeisccetscencccessiaseceuseeiseesdecbedaditbedeabeaccendanacaceeacesesdeaeld 185 Figure 120 Meer 187 Bane 121 Enter S bscripti on eege 187 Rev 5 0 27 215 May 26 2010 Page 9 of 191 Phant m iBoss Technologies Enterprise 1 iBoss Enterprise Web Filter 1 1 Overview The iBoss Enterprise is a line of web filters for medium to large networks Powerful patent pending filtering technology puts you in control of Internet usage on your network Flexible Internet
19. 29 2 Bill Host A 10 128 29 5 4 Note Each filtering group is associated with a number You can view them here Filtering Groups Other valid choices are N for No Filtering Bypass Filtering and U for Require User Login Otherwise please use a filtering group from 1 to 25 The maximum number of computers per import is 1000 If you have more than 1000 computers hes the list into sections of 1000 and import them separately Each line should not exceed 200 ytes Figure 63 Importing Computers iBoss Enterprise Rev 5 0 27 215 May 26 2010 Page 107 of 191 Phant m iBoss Technologies Enterprise There are two methods that can be used to import computers The Standard Import method is based on MAC address Computer Name and Filtering Group and is comma delimited The DNS import method allows you to import from a tab delimited list exported from a DNS server Active Directory etc The two methods are described below Please select the import method option paste the list in the box below and then click the Import Now button below Standard Import Paste information regarding computers on the network one computer per line The format of each line should look like the following Computer MAC Address Computer Name Filtering Group Number DNS Import Paste the list exported from your DNS server in the text box below Computers not found in the Unidentified Computer List will not be added
20. 4 4 5 3 2 Statistics This section allows you to configure which statistics you would like in the custom generated report The following are statistic options Web Stats Web stats include statistics relating to web browsing activity This includes top visited domains top blocked domains websites visited and website category statistics Port Stats More Logging Port Stats include statistics relating to TCP and UDP port usage on the network This includes top used ports top blocked ports etc IP Stats More Logging P Stats include statistics relating to IP traffic on the network This includes top accessed P Addresses top blocked IP Addresses etc Bandwidth Stats Bandwidth Stats include statistics relating to general bandwidth usage such as overall downstream and upstream usage Application Stats More Logging Application Stats include statistics specific to applications used on the network Note Selecting More Performance or External Report Manager from within the iBoss Report Settings will only report Web and Bandwidth Statistics 5 4 4 5 3 3 Email Settings The email settings allow you to configure options relating to the emailing of the generated report The following describes the settings in this section Rev 5 0 27 215 May 26 2010 Page 143 of 191 Phant m iBoss Technologies Enterprise Email Report To This is the email address where you would like the report sent to You can use a s
21. 4 Block Specific File Extensions oe re e Ee De ER Be dE eae Pra leo Seuerus 4 2 5 Restrict Domain EXTENSIONS ssri petere inea tte otto u lo eee Easy eod ue de nep ee ri ao pete SE 4 2 6 Configure Sleep Schedule 4 2 6 1 Sleep Mode Page 4 2 7 Real Time Monitoring Recording 4 3 EDIT MY PREFERENCES Eeer 4 3 1 Set or Change Password dee e est eerte ate bn esteri a S e ieai i 4 5 2 Configure Report Settings eati eerte eot tt neat ettet re oee tgp tie a E oa siete EE i 4 3 2 1 Edit General Report E 4 3 2 2 URL Logging Ignore List 4 3 3 Customize Block Pages ee eeina i A SE Eo ENE EE EE 4 3 3 1 Blocked Page m 4 3 4 Change Time LONE xa osi EE Ee 4 3 5 Edu System Setin MEM M 4 3 6 Setup Remote Management 4 4 IDENTIFY COMPUTERS amp USERS 4 4 1 Identify Computers 4 4 1 1 lisque met 4 4 1 2 Identifying a Computer 4 4 2 Identify Users 4 4 2 1 Adding User 4 5 eoe iai tede i EH e ERO o Ri obe ete d a EPOD R DP YR RS 4 4 2 2 Delegated ne 4 4 2 3 Importing Users 4 4 2 4 Advanced User EE Rev 5 0 27 215 May 26 2010 Page 4 of 191 Phant m iBoss Technologies Enterprise 4 4 2 5 User Internet Access Window 4 4 3 Filtering Groupe 4 4 3 1 Filtering Group Tabs is 45 FIRMWARE UPDATES P ENTE
22. 5 0 27 215 May 26 2010 Page 78 of 191 Phant m iBoss Technologies Enterprise 4 2 1 2 Allowlist Import iBoss WebFilters Allowlist Import Please paste URLs one per line The format of should look like the following Domain Max 255 chars r x domain corn google com yahoo com 009 Phantom Technologies LLC All rights reserved trademarks on this website are the property of their respective owmers Figure 41 Allowlist Import You may import a list of domains to import Please paste URLs one per line with a maximum of 255 characters per domain l P URL Once you are done click the Import Now button Rev 5 0 27 215 May 26 2010 Page 79 of 191 Phant m iBoss Technologies En 4 2 2 Block Specific Keywords e iBoss JumpTo PleaseSeedi gt aia Web Filters Product Support My iBoss iB Oss nterprise The group Default is used by default as rules of filtering for all unidentified computers This page allows you to create keyword Blocklists The iBoss will block Internet sites that contain these specific keywords in the URL In addition web searches using the keywords in the list s will also be blocked Internet Note These settings will apply even if a website is put into the allow Controls y Pre Defined Lists Below you may select from pre defined keyword category lists Each Preferences category contains its own keyword list To enable a keyword li
23. Allowed Figure 105 Last Visited Websites It contains information such as the date and time the site was visited the user that visited the site and whether the site was allowed or blocked Place your mouse over certain fields such as Description to get more detailed information You can get a full list by clicking on the More button This full list can be sorted by a variety of parameters Rev 5 0 27 215 May 26 2010 Page 167 of 191 Phant m iBoss Technologies Enterprise 5 5 3 Port Statistics The port statistic section provides information regarding TCP and UDP traffic port usage In this section you can determine how your Internet traffic is utilizing ports in order to identity potential problems and optimize the network Rev 5 0 27 215 May 26 2010 Page 168 of 191 Phant m Technologies iBoss En Eanersted Reports Jump to Report Generated Report Date Daten 05 5 2000 a Mepert Name Day A Date 05 15 2008 a Share Eegen for Ad Users in Ths Pepe Port Statistics Report Nete You may select the Fotoe to change the vate Protocol s D Bandwidth Activity Below is a report of the bandwidth activity for report Daily Report k Noter You may dick and drag from a starting pont of tha tmeing and and ending powt to 200m in LA 05 1508 12194M OUISORD419AM Ps IAM 05 1508 1220PM 051508 4 20 PM ron pue Bessen Boegen OD EE kbits sec Top Ports Used Below Is a repor
24. An IP address consists of a series of four numbers separated by periods that identifies a single unique Internet computer host in an IP network Example 192 168 2 1 It consists of 2 portions the IP network address and the host identifier The IP address is a 32 bit binary pattern which can be represented as four cascaded decimal numbers separated by aaa aaa aaa aaa where each aaa can be anything from 000 to 255 or as four cascaded binary numbers separated by bbbbbbbb bbbbbbbb bbbbbbbb bbbbbbbb where each b can either be 0 or 1 A network mask is also a 32 bit binary pattern and consists of consecutive leading 1 s followed by consecutive trailing O s such as 11111111 11111111 11111111 00000000 Therefore sometimes a network mask can also be described simply as x number of leading 1 s When both are represented side by side in their binary forms all bits in the IP address that correspond to 1 s in the network mask become part of the IP network address and the remaining bits correspond to the host ID For example if the IP address for a device is in its binary form 11011001 10110000 10010000 00000111 and if its network mask is 11111111 11111111 11110000 00000000 it means the device s network address is 11011001 10110000 10010000 00000000 and its host ID is 00000000 00000000 00000000 00000111 This is a convenient and efficient method for routers to route IP packets to their destination I SP Internet Service Provider
25. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations Web based management Graphical User I nterface GUI Many devices support a graphical user interface that is based on the web browser This means the user can use the familiar Netscape or Microsoft Internet Explorer to Control configure or monitor the device being managed Rev 5 0 27 215 May 26 2010 Page 190 of 191 Phant m iBoss Technologies Enterprise 11 REGULATORY STATEMENT FCC This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC rules CE This equipment has been tested and found to comply with the limits of the European Council Directive on the approximation of the law of the member states relating to electromagnetic compatibility 89 336 EEC according to EN 55022 Class B FCC and CE Compliance Statement This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Any changes or modifications not expressly approved by the party responsible for compliance could void the authority to operate equipment Safety This equipment is designed with the utmost care for the safety of those who install and use it However special at
26. Authentication Method This is the name of your workgroup or Domain Netbios name This is the what shows up in the drop down menu when users log in Ex phantomtech Active Directory Search Base Only in Active Directory NTLM Authentication Method This is the search base of your Active Directory server Ex dc phantomtech dc local Location Attribute Only in Active Directory NTLM Authentication Method This is the location Attribute within Active Directory if you have multiple locations WINS Server IP Address Only in Active Directory NTLM Authentication Method This is the WINS Server IP Address which is commonly the IP address of your Active Directory server Password Server IP Address Only in Active Directory NTLM Authentication Method This is the Password Server IP Address which is commonly the IP address of your Active Directory server Number of Authenticators This is the number of NTLM authenticators that try to do authentication Authentication Retry Seconds This option allows you to configure how long to retry authentication in seconds 0 disabled Rev 5 0 27 215 May 26 2010 Page 25 of 191 Phant m iBoss Technologies Enterprise Active Directory Logon Logoff Scripts When NTLM is selected use the following logon logoff scripts to add to the Group Policy Object GPO on your Active Directory server where your users log in There are two logon scripts and one logoff script Place the two logon
27. Done button when you are finished 4 Note If your directory structure is replicated or involes a top level domain or S NI SQ context you do not need to register each directory server Only the top level dir server Independent server registrations are only needed if your network o involves independent servers which are not related Global Settings Number Of Ldap Processors 25 Reboot Required Max Ldap Retries 12 Ldap Retry Interval 10 Seconds Max Retry Queue Size 20000 Ldap Retry Count 0 LDAP Server Info Name Description eee Smpe Server Host Ip i Port 389 Admin User administrator yourdomain c AdminPassword Search Base de yourdomain de com SH KENED member Match Group Key CN Location Attribute el Seach sAMAccountName s Grau Re nO Yes Use 1 Default Rules Use SSL No SSL Certificate LDAP Servers No Entries Figure 5 LDAP Settings Rev 5 0 27 215 May 26 2010 iBoss En Page 20 of 191 Phant m iBoss Technologies Enterprise Global Settings This section allows you to set global LDAP settings Number of Ldap Processors This is how many ldap processors are used within the iBoss for authentication 25 is the default Max Ldap Retries This is the number of retries before the authentication is no longer tried 12 is default Ldap Retry Interval This is the interval between retries if authentication is not success
28. En 4 3 1 Set or Change Password IBoss Jump To Please Select X ee Web Filters Product Support My iBoss Set or Change Password Bosse Administration You may set or change the password used for managing the iBoss The password may be a maximum of 24 characters in length The password recovery option is highly recommended If you forget your password you will be able to recover it through E mail if this option is selected New Password Internet Confirm New Password Controls ee 7 Enable Password Recovery S Recommended E mail Address Preferences All rights reserved All trademarks and re bsite are the property of their respective owners Figure 51 Set or Change My Password You may set or change the password used for managing the iBoss The password may be a maximum of 24 characters in length The password recovery option is if your password becomes lost you will be able to recover it through e mail if this option is selected Note Be very careful with this password It is used for configuration for your iBoss and for override functions Rev 5 0 27 215 May 26 2010 Page 93 of 191 Phant m iBoss Technologies 4 3 2 Configure Report Settings IBoss Jump To Please Select X 60o Web Filters Product Support My iBoss Report Settings iBoss Help Topics Enterprise e Preferences What do you want to do
29. Identification Method Ip Address ID MAC IP Address Apply Filtering Yes Use 1 Default Rules Computer Overrides User Is Local Proxy Server VNC Desktop Video Recording Video Recording Enable Q9 Disable VNC Port 5900 VNC Password Figure 64 Identifying a Computer To identify a computer you may enter a Computer Nickname for the computer When clicking on the button Identify Edit This Computer the ID MAC address is automatically entered for you If you have the subnet setup as IP mode the IP address will be entered here When clicking on Advanced Add you may enter in the ID MAC address or IP address for the computer you are identifying Rev 5 0 27 215 May 26 2010 Page 109 of 191 Phant m iBoss Technologies Enterprise You may either set the Apply Filtering to Yes Use Default Rules with one of the filtering groups No Bypass Filtering Rules or Require user login for this computer for the computer you are identifying When finished click the Save button If you want to cancel your changes click the Cancel button The Yes Use Default Rules will show the assigned name of the filtering group Computer Overrides User This option allows you to always have the computer filtering policy in place and not allow users to override this option Is Local Proxy Server This option is to identify if the computer you are identifying is a proxy server on your local network Note Compute
30. Internet Controls Enter Ip Address Range To Bypass IP Address Start 4 IP Address End No entries in list Preferences 2009 Phantom Technologies LLC All rights reserved All trademarks and reg red trademarks on this website are the property of their respective ovmers Figure 24 Bypass IP Range This page allows you to add IP Addresses which you would like to completely bypass the iBoss filtering engine IP Addresses listed here will not appear in your Unidentified Computers list and will completely bypass filtering This is useful for bypassing IP Address ranges that include servers VOIP based phones and other devices which do not require filtering Enter the IP Address ranges below and click the Add button To remove an IP Address range from the list select the range to remove and click the Remove button located at the bottom of the page You can add up to 50 IP Address ranges to bypass Click the Done button when you are finished Rev 5 0 27 215 May 26 2010 Page 48 of 191 Phant m iBoss Technologies En 3 2 3 10 Add Additional Local Subnets iBoss Jump To PleaseSelect ee Web Filters Product Support My Boss Additional Local Subnets IP iBos Ranges LI T This page allows you to add and define local subnets Traffic between local subnets are not filtered by the iBoss In addition the iBoss will only filter Internet traffic from subnets that are defined below Be sure to include all th
31. Local Area Network LAN Settings Dial up and Virtual Private Network settings Automatic configuration Automatic configuration may override manual settings To ensure the use of manual settings disable automatic configuration C Automatically detect settings go Use automatic configuration script Choose Settings if you need to configure a proxy server for a connection Proxy server Use a proxy server for your LAN These settings will not apply to dial up or VPN connections Address 192 168 1 10 Port 8008 Advanced C Bypass proxy server For local addresses Local Area Network LAN settings LAN Settings do not apply to dial up connections LAN settings Choose Settings above For dial up settings Figure 13 Manual Proxy with Internet Explorer Rev 5 0 27 215 May 26 2010 Page 31 of 191 Phant m iBoss Technologies Enterprise x Connection Settings E G Ll GC A Emi d 3 Ie Configure Proxies to Access the Internet Main Tabs Content Applications Privacy Security Advanced C No proxy General Network Update Encryption Auto detect proxy settings for this network Manual proxy configuration Connection HTTP Proxy 192 168 1 10 Port Configure how Firefox connects to the Internet Settings R C Use this proxy server for all protocols Offline Storage SSL Proxy Port Use up to 50 gt MB of sp
32. Mode The Internet connection is currently in Sleep Mode All Internet activity has been temporarily disabled URL Content Description Internet access is currently disabled on this computer 2010 Phantom Technologies Inc All rights reserved S All trademarks and registered trademarks on this website are the property of their respective owners Figure 48 Internet Sleep Mode Page When a page is blocked from violation of the iBoss sleep mode schedule this page will show up in the web browser to the user You may manually login and turn off Internet Sleep Mode by typing in the password and pressing Login The Sleep Mode will continue at the next scheduled time If a custom message is set this will show up above the sleeping computer Rev 5 0 27 215 May 26 2010 Page 89 of 191 Phant m Technologies iBoss E 4 2 7 Real Time Monitoring Recording iBoss Joop Te Pieew See n MSN About Product E Real time Monitoring Recording De This page atows vou to adjust the settings for the realbme user activity mongering feature The doss can are user activity an teal trme aod send emad alerte of perform desktop vadeo eecardegs when a predefined level of actreity n reacted en allows you to have im arenees of network activity User activity montoring must be enabled for the group in order for the settings to take effect If realtime user activity monitonng m disabled monitoring by tngger t
33. Model Indicates the model of your iBoss device Device Name Indicates the name given to the iBoss Current Firmware Version Indicates the firmware version installed on your iBoss Available Firmware Version Indicates the latest firmware version available for download If this version number matches the number in the Current Version field then your iBoss firmware is up to date Current Signature Version Indicates the signature version installed on your iBoss Download Install The Download Install button will appear when new firmware is available Click this button to begin downloading and installing the new firmware The Install button will appear when new firmware has been downloaded and is ready to install Click this button to begin installing the new firmware Once this process begins do not power down the iBoss until installation is complete When the installation is complete you will be redirected back to the iBoss home page Download Progress Indicates the download progress of the firmware updates Rev 5 0 27 215 May 26 2010 Page 121 of 191 Phant m iBoss Technologies Enterprise 5 Enterprise Report Manager The iBoss is equipped with an advanced report manager capable of tracking and generating statistics and a variety of aspects of network traffic This includes web statistics such as web sites visited and top visited domains as well as detailed port and IP Address accesses The report manager provides a de
34. P eee e dte 39 Global Setting S ER 39 Enable User Polling EE 40 Initial User Full Synt uso dee o ea Ote hac ens ces ear acta ncn 40 User Login Polling I riterval cieiiceeso inrer tete beide re etie tie beide tres a t 40 User Polling In Breet 40 Last Users Found Count nonsteientidi eiii eonun iei ite Bola diede 40 eDirectory Info Server Registration Settings sss 40 Alt 41 Ip Address EE 41 doli T 41 Admin Usernatme DN once rt er EE EE EE EUR EE NEE EE EE EGER TUR FERE EG ERR 41 Admin PassWord EE 41 Common Name Search Attribute tenete tenete tette 41 Username Search AttrIDUte siehe seen RH OO ERE EE HORRORE EE HORE RUE RERO ERE MERETUR 41 Group Search Attribute sse tenete tenent tnt tenete retener tnt terere tentes 41 Group Attribute Value Key uestes eiecti dite eerie iti ces i ed ie Ne Oa EE Sapiro ian 41 Location AttriDUte RR 42 Ignore WIR NEE 42 Default Filtering PoliGy eos oap tie om redeo E EA RA 42 ConnecE Blue Ce EE 42 Monitor Gu e 42 Poll User LOGINS wx eessen ano 42 IT GE 42 Rev 5 0 27 215 May 26 2010 Page 3 of 191 Phant m iBoss Technologies Enterprise User Polling Search B3SQ 5 nig aeomee ine HERO HR EE ER RERUM E EGER ERG User SSL SSL Certificate AC a Ee EE 3 2 3 7 Gu EC
35. Page 128 of 191 Phant m Technologies Website Activity Below is a report of the current real time website activity Note Items below highlighted in red are violations You may mouse over the Blue text in the Description column for more information about the entry You may click the More button for more entries in the current Daily report Apply Filters User Url Date amp Time 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 17 PM 05 26 10 02 16 PM User chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt Group URL tag admeld com match admeld adprovi api kickapps com rest comments 5133 www pcmag com light registration fo tag admeld com pixel tags bluekai com site 1392 ret html adping westley crowdscience com fin cms quantserve com dpixel id CAESEN b scorecardresearch com b c1 28c2 eld adprovi ixel x ixel r Bixel quantserve com pixel rz162034 meta wikimedia org w index php titl index php title
36. Pose Enterprise Web Filter and Enterprise Reporter User Manual Phant amp m Technologies www iBossWebFilters com Phant m iBoss Technologies Enterprise Note Please refer to the User Manual online for the latest updates at www ibosswebfilters com Copyright by Phantom Technologies Inc All rights reserved No part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language or computer language in chemical manual or otherwise without the prior written permission of Phantom Technologies Inc Phantom Technologies Inc makes no representations or warranties either expressed or implied with respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defects Further this company reserves the right to revise this publication and make changes from time to time in the contents hereof without obligation to notify any person of such revision of changes All brand and product names mentioned in this manual are trademarks and or registered trademarks of their respective holders
37. Reserved Bandwidth This is the minimum reserved bandwidth for this rule in kbit sec Min 12 kbit sec Maximum Bandwidth This is the Maximum cap of this rule in kbit sec Run On Schedule This option allows you to set a schedule time for this rule Schedule Start Hour Start time for this rule in hours on 24 hour format 0 23 Schedule Start Minute Start minute for this rule 0 59 Schedule End Hour End hour for this rule 0 23 Schedule End Minute End minute for this rule 0 59 Rev 5 0 27 215 May 26 2010 Page 72 of 191 Phant m iBoss Technologies Em 4 2 4 Block Specific Websites e IB OSS Jump To Please Select Y Go Web Filters About Product Support My iBoss 1 Defat B em Groupa GroupS D d tT Default ef Home Blocklist Bosse The group Default is used by default as rules of filtering for all unidentified computers This page allows you to block specific website URLs from being accessed on your network Enter the URL of the website you would like to block in the text box below and click the Add URL button You may enter a maximum of Internet 1000 website URLs across all profiles Each URL may be a maximum of 255 characters in length To remove a website URL from the Blocklist Controls select the URL to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished P F EE Custom Bl
38. Sharing programs FTP amp other protocols for Data Leakage Protection DLP Bandwidth Throttling QoS This option allows you to set bandwidth throttles on users groups domains or web categories Block Specific Websites This option allows you to block access to specific websites by adding them to the Block List Allow Specific Websites This option allows you to permit access to specific websites by adding them to the Allow List Block Specific Keywords This option allows you to block specific keywords from searches or full URL s by adding them to the Keyword list Block Specific Ports This option allows you to block specific ports or port ranges with Protocol and Direction Block File Extensions This option allows you to block specific file extensions from being downloaded on your network Restrict Domain Extensions This option allows you to block or allow specific domain extensions from being accessed Configure Sleep Schedule This option allows you to schedule access to the Internet on a schedule Real time Monitoring Recording This option allows you to set notification alerts for real time monitoring and recording thresholds Rev 5 0 27 215 May 26 2010 Page 60 of 191 Phant m iBoss Technologies 4 2 1 Block Specific Website Categories iBoss E o JE GEO cf Hi gg gu Hg Hd Kal aa ug n auum be coo Kr b E 20 OE 28 E Oh OE OE 0 28 o8 ub wm d ut npe Figur
39. are fe finished Enter File Extension example tor Preferences Add No entries in list 2009 Phantom Technologies LLC All rights res All trademarks and re red trademarks on this website are the property of their respective owmers Figure 45 Block Specific File Extensions This page allows you to block specific file extensions from being downloaded on your network Enter the file extension of files you would like to block in the text box below and click the Add button You may enter a maximum of 2000 file extensions across all profiles Each extension may be a maximum of 15 characters in length To remove an extension from the Blocklist select the extension to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Rev 5 0 27 215 May 26 2010 Page 84 of 191 Phant m iBoss Technologies En 4 2 5 Restrict Domain Extensions I B OSS Jump To Please Select X oe Web Filters Product Support My iBoss Default Group2 Group3 Group4 Grou Domain Extension Restrictions Bosse The group Default is used by default as rules of filtering for all unidentified computers This page allows you to block or allow specific domain extensions from being accessed You may choose to only allow the domain extensions in the list or to block the extensions in the list If you choose to only allow the domain extensions in the list then any domain access
40. as rules of filtering for all unidentified computers Internet Sleep Mode allows you to put your Internet connection to sleep disabling all Internet traffic to and from your network This is beneficial for when the Internet doesn t need to be on or accessed You may put the Internet to sleep by selecting a duration and pressing Internet the Sleep Now button This will temporarily put the Internet to sleep Controls for the duration selected You may setup a daily schedule or an advanced schedule by which to put the Internet to sleep You may also bypass the sleep schedule by selecting a duration and pressing the Bypass Now button Note When the Internet is in Sleep Mode the Internet Sleep Mode page will be displayed in the web browser if Internet access is attempted To customize the message that appears Preferences on the Internet Sleep Mode page click here You may override Internet Sleep Mode and wake up your Internet connection by entering the iBoss login password into the Internet Sleep Mode page when it is displayed Bypass Internet Sleep Force Internet To Schedule For Sleep For 1 minute v 1 minute v Sleep Schedule Disable or Sleep Daily From 12 00 pm e To 12 30 pm e or 2 Enable using Advanced Schedule 009 Phantom Technol All trademark d trademarks on thi LC All rights site are the pr Figure 47 Configure Sleep Schedule Internet Sleep Mode allows you to put your Internet
41. can perform within the report manager This only applies when you are not using an external Enterprise Reporter Rev 5 0 27 215 May 26 2010 Page 123 of 191 Phant m iBoss Technologies Enterprise Only users configured locally in the iBoss can be allowed access into the report manager Users logging in through LDAP Active directory will not have access to the report manager This only applies when you are not using an external Enterprise Reporter 5 4 Report Generation and Management After logging into the report manager the iBoss presents a page detailing the current activity This page contains information regarding what is currently occurring on the network There are several other sections within the report management section that include viewing and creating generated reports viewing and creating report schedules configuring report settings and viewing system information Rev 5 0 27 215 May 26 2010 Page 124 of 191 Phant m Technologies width Activity Below is a report of the current real time bandwidth activity Current Top Bandwidth Consumers Below is a list of the current top bandwidth consumers Please allow 20 30 seconds for data to appear Web Hit Activity Below is a report of the current real time web hit activity Website Activity Below is a report of the current real time website activity bk Note items below highlighted in red are violations You may mo
42. configuration menu is displayed Follow the options presented to configure the static IP Address settings for the iBoss 3 2 2 Configuring Network Settings via the Network You can also configure the iBoss network settings by connecting to the iBoss via a Web Browser The following instructions apply when initially configuring the iBoss IP Address settings If you have already configured the IP Address settings and wish to change them you need to log into the iBoss using its current IP Address settings In order to do this you must configure your computer to have a static IP address within the subnet of the iBoss default network settings Configure your computer to have the following static IP Address Table 3 Computer IP Address settings used to initially configure iBoss through the network I P Address 192 168 1 15 Subnet Mask 255 255 255 0 You can leave the Gateway and DNS IP Address blank on your computer as they will not be needed With these settings in place open a web browser and enter 192 168 1 10 into your Web Browser s address bar This will bring up the iBoss home page From the homepage follow the Setup Internet Connection link to configure the iBoss IP Address Settings 3 2 2 1 Configuring Network Settings via iBoss User Interface The iBoss does not require any software installation Instead its user interface can be accessed directly using a standard Internet web browser The web based user interface allows you to
43. configure your iBoss Rev 5 0 27 215 May 26 2010 Page 14 of 191 Phant m iBoss Technologies Enterprise 1 Verify that your computer has an IP address that is on the same subnet as the iBoss IP address as stated above 2 Open a standard Internet web browser application Internet Explorer Firefox etc 3 In the URL address bar enter the domain http myiBoss com and press lt enter gt This will take you to the iBoss interface If the iBoss interface does not load enter the configured P address of the iBoss default http 192 168 1 10 and press enter Note The http myiBoss com webpage is built into the iBoss so it is always accessible even though the Internet may not be http myiBoss com is the configuration portal for the iBoss You may access the user interface from any computer connected behind the iBoss Phantom Technologies Windows Internet Explorer Ci m Y e http vwww myiboss com w d Phantom Technologies Figure 2 iBoss User Interface Rev 5 0 27 215 May 26 2010 Page 15 of 191 Phant m iBoss Technologies En 3 2 3 Setup Network Connection iBoss Jump To Please Select Y Go WebFilters Product Support My iBoss Setup Network Connection Boss e Help Topics e Network What do you want to do Connection Configure Internet Connection LDAP Settings Internet Controls ES Active Directory amp Proxy Settings Active Directory Plugin Pre
44. determine which user is utilizing the IP Address the most You can get a full list of these users by clicking on the More button 5 5 5 Bandwidth Statistics The Bandwidth statistic section provides information regarding general bandwidth usages from your network General bandwidth includes overall downstream and upstream usage Rev 5 0 27 215 May 26 2010 Page 176 of 191 Phant m iBoss Technologies Reports Generated Report Jump to Report Daily repon 01 08 7009 Ed ss a cal Date 01 06 2009 01 07 2009 E Show Report For AB Users o Th Ropon Bandwidth Statistics Report Bandwidth Activity Below is a report of the bandwidth activity for report Daily report Note You 3 500 3 000 2 500 2 000 1 500 1 000 500 E se RE FUN Er tae Pu DS DS dick and drag from a starting point of the timeline and and ending pont to 206m in kbits sec MM Overview of Total Bandwidth Usage Below is a report of the top overall bandwidth consumers Note You may dick on the More button d aviitable for more results Total Packet Heen Bytes Count ped Brio nam martini 750 70M0 762 18 e c Do een Fach seess 7054k n o E Da wer mawa oar a be D4 retors compute 553298 80 0 T 4 DS Report manager 4478MB 10943K ven Overview of Downstream Bandwidth Usage Below is a report of the top users consumi
45. e Help Topics Internet What do you want to do Controls Block Specific Website Categories Reports Programs Protocols amp DLP Internet Controls be Bi Bandwidth Throttling QoS Block Specific Websites Preferences Allow Specific Websites Block Keywords Block Specific Ports Block File Extensions E Restrict Domain Extensions il Configure Sleep Schedule Real time Monitoring Recording 9 Phantom Technologies LLC All rights reserved All trademarks and reg d trademarks on this website are the property of their respective owners Figure 30 Configure Internet Controls The Configure Internet Controls menu lets you choose options for configuring the current iBoss Internet controls These are the options to choose from Block Specific Website Categories Programs Protocols amp DLP Bandwidth Throttling QoS Block Specific Websites Allows Specific Websites Block Keywords Block Specific Ports Block File Extensions Restrict Domain Extensions Configure Sleep Schedule and Real time Monitoring Recording Rev 5 0 27 215 May 26 2010 Page 59 of 191 Phant m iBoss Technologies Enterprise Block Specific Website Categories This option allows you to block or allow website content based on categories Programs Protocols amp DLP This option allows you to configure access to web applications that the iBoss can manage You may choose to block Chat Instant messenger programs File
46. iBoss to not function properly Integration Enabled Disabled Session Timeout D Password Internal Report Manager Listen Port Note This is the port on which the internal Enterprise Reporter and Network Archiver listens on Port number must be greater than 1024 and less than 65 535 Default is port 8080 Port 8080 Status IP Address 192 168 1 10 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 1 Primary DNS 192 168 1 1 Secondary DNS 0 0 0 0 MAC Address 00 00 00 00 00 00 Figure 4 Configure Internet Connection Connection Type The iBoss will need to be configured to have a static IP address Manually enter network settings for your WAN connection These settings should be a unique IP address and match your local network If you are using Active Directory or have a domain controller use this IP address for the DNS 1 address Note Secondary DNS is not required Remote Authentication Integration PAUL This feature allows Remote Authentication Integration Rev 5 0 27 215 May 26 2010 Page 18 of 191 Phant m iBoss Technologies Enterprise Internal Report Manager Listen Port This section allows you to change the port number that the iBoss reports are served from Click Save when you have finished the configuration above You have completed the WAN configuration for the Static IP Address connection type Note Once the iBoss has been configured you may retu
47. in This Report iv For es m Port Statistics IP Statistics Usage Statistics Application Statistics x Figure 100 Report Information Section The report information bar contains the name of the report as well as the date range that this report covers 5 5 1 1 Showing Report Information for Particular Users Under the option Show Report For you have the capability of selecting which report information is presented on the page If All Users in This Report is selected the information in the report pages you are viewing will contain information regarding all users in the report If you would like to view information for a particular user in the report select the user from the drop down list Only users that belong to the groups included in the report will be show here Once a user is selected all statistics on the page pertain to the particular user Regardless of whether you have all users selected or a particular user the information presented will look the same and is consistent The only thing that changes is the information on the page not the structure 5 5 1 2 Quickly switching between reports The top right section of the report information bar has a drop down list which allows you to quickly switch between reports Simply select a report from the drop down list and the current report page will be updated with the information from the newly selected report This is useful for comparing information between two or more
48. is the field that shows the friendly name of the users NTLM Login Detection This will detect NTLM authentication when users log in Log Level This is the amount of login information will be logged on the Domain Controller Login Ignore Patterns These are ignore patterns that shouldn t log users in with IP Ignore Patterns These are IP addresses that should be ignored Com Timeout Millis This is the communication timeout in milliseconds Send User FQDN This is the user Fully Qualified Domain Name ex user domain local Once finished click Save and close the window Follow the next steps to audit logon events Rev 5 0 27 215 May 26 2010 Page 35 of 191 Phant m iBoss Technologies Enterprise 3 2 3 4 1 2 Active Directory Audit Logon Events 8 Active Directory Domains and Trusts mei Active Directory Sites and Services z Active Directory Users and Computers j Certification Authority e Cluster Administrator Manage Your Server P My Computer D Somponent serviens el Computer Management Administrator a 3 Configure Your Server Wizard f Windows Explorer Control Panel d C il Data Sources ODBC as Distributed File System fa Notepad 2 DNS Printers and Faxes z Domain Controller Security Policy ES Command Prompt 9 As ii Domain Security Policy Help and Support 4i 9 Hep ge Al Event Viewer G See Users and pP T Lei Teu f Manage Your Server Gm Microsoft NET Framework 1 1 Configuratio
49. like to have keyword and safe search enforcement applied to the domain being bypassed Enter URL ex domain com Global Apply Keyword Safe Search No entries in list Figure 39 Allow Specific Websites Rev 5 0 27 215 May 26 2010 iBoss En Page 76 of 191 Phant m iBoss Technologies Enterprise This page allows you to add specific websites to your Allowlist The Allowlist is a list of specific Internet URLs that you want to allow on your network Website URLs added to this list will be allowed even if they are currently blocked in the Internet Category Blocking settings Alert f the Allow ONLY access to sites on the Allowlist option is selected only the websites in the Allowlist below will be allowed All other websites will be blocked If you want to only allow access to the Allowlist URLs on your network select the ONLY Allow access to sites on the Allowlist checkbox You may select the Enable Allowlist Navigation webpage if you wish to allow access to a built in iBoss website that will display links to all sites on the Allowlist To apply changes click the Apply button Note The Allowlist Navigation webpage will only display when the Allow ONLY feature is enabled Allow ONLY access to sites on the Allowlist Checking this option will only allow sites in list Enable Allowlist Navigation webpage This will give you a page that has a list of the allowed si
50. line The format of should look like the following Domain Max 255 chars E D domain com google com yahoo corm 2009 Phantom Technologies LLC All rights reserved All trademarks and registered trademarks on this website are the property of their respective owners Figure 38 Blocklist Import You may import a list of domains to import Please paste URLs one per line with a maximum of 255 characters per domain l P URL Once you are done click the Import Now button Rev 5 0 27 215 May 26 2010 Page 75 of 191 Phant m Technologies 4 2 1 Allow Specific Websites iBoss Jump To Please Select H E Web Filters About Product Support My iBoss Default Allowlist Boss The group Default is used by default as rules of filtering for all unidentified computers This page allows you to add specific websites to your Allowlist The Allowlist is a list of specific Internet URLs that you want to allow on your network Website URLs added to this list will be allowed even if they are currently blocked in the Internet Category Blocking settings Internet Alert If the Allow ONLY access to sites on the Allowlist option Controls A is selected only the websites in the Allowlist below will be a allowed All other websites will be blocked Preferences Preferences Below are the Allowlist preferences If you want to only allow access to the Allowlist URLs on your network
51. of 191 Phant m iBoss Technologies Enterprise 3 2 3 4 1 1 Boss Active Directory Plugin Configuration BER iBoss Ip Address 158110 0 iBoss Port gs o Security Key beer Domain Name phanomechlea Seconds Between Logns o Group Search Attribute memben Group Search Key NN Friendly Name Search Attribute Jen NTLM Login Detector ves y LogLevet edi el Login Ignore Pattems Jsophossweepupd IP Ignore Patterns fo Com Timeout Millis po rtrt hR COCNNYNNNSNCNCNCNC i s Send User FQDN Yes Status Ready Save Figure 17 iBoss Active Directory Plugin Configuration This is the configuration of the iBoss Active Directory Plugin Enter in the information for your iBoss These settings work in conjunction with the Active Directory Plugin configuration within the iBoss interface iBoss I P Address The IP address of the iBoss iBoss Port This is the port used for communication Default is 8015 Security Key This is the key that matches in the iBoss Active Directory Plugin page Domain Name This is the domain of the Active Directory Domain that the plugin is on Seconds Between Logins This is the seconds between waiting on duplicate login requests Group Search Attribute This attribute is for looking up group names Default is member Of Group Search Key This is the field within Active Directory where group names are saved Friendly Name Search Attribute This
52. r youkn com FF en vwikipedia or webcache qoogleusercontent com sesr dar youknowbest com afid 34 www google com url sa T amp source web Bt rewardtv com notice do sid 25000 0 70 channel facebook com x 2282218 Action All Source IP Description Action 10 128 30 5 Allowed 10 128 30 5 Audio Vi Allowed 10 128 30 5 Shops Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 5 Educatio Allowed 10 128 30 5 Dictiona Allowed 10 128 30 5 Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Audio Vi Allowed 10 128 30 5 Forums Allowed 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM 05 26 10 02 16 PM chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt chrislapt
53. reports 5 5 2 Web Usage Statistics This section contains information related to web browsing This includes websites visited top visited domains top blocked domains web category usage as well as other statistics As stated above most of the items are clickable and can be drilled down for more detail Rev 5 0 27 215 May 26 2010 Page 160 of 191 Phant m Technologies Belew i a report of the bandwith activity for repart Daty Negari Below i a report of Top Blocked Domain for report Daly Report kb wer ra mon dek on the Mone partan for mora ret m 9 SE Figure 101 Web Usage Statistics Rev 5 0 27 215 May 26 2010 iBoss Page 161 of 191 Phant m iBoss Technologies Enterprise The first section contains an overall bandwidth graph This graph pertains to the current selected user or all users if All Users in This Report is selected This will allow you to determine bandwidth usage by user or by report The graph provides total bandwidth as well as downstream and upstream bandwidth This also shows the number of hits and blocks per category Web Category Usage Below is a report of the bandwidth activity for report Daily Report Note You may click the web category bar for more information on the web category ER Blocked Web Hits 1200 F p ee eee Figure 102 Web Category Usage Rev 5 0 27 215 May 26 2010 Page 162 of 191 Phant m iBoss Technologies Enterprise 5 5 2
54. reserved All trademarks and re red trademarks on this website are the property of their respective ovmers Figure 44 Port Blocking Port blocking allows Internet traffic on specified ports or ranges of ports to be blocked from accessing the Internet Traffic using the specified ports will be blocked completely This allows you to enter the name port start port end protocol and direction Once you enter in the information click Enable and save Port Blocking Schedule You may choose to block these ports all the time or Block on an Advanced Schedule Rev 5 0 27 215 May 26 2010 Page 83 of 191 Phant m iBoss Technologies En 4 2 4 Block Specific File Extensions IBoss Jump To Please Select X ee Web Filters Product Support My iBoss 1 Default v gt i iBoss File Extension Blocking Enterprise The group Default is used by default as rules of filtering for all unidentified computers This page allows you to block specific file extensions from being downloaded on your network Enter the file extension of files you would like to block in the text box below and click the Add button You may enter a maximum of 2000 Internet file extensions across all profiles Each extension may be a maximum of 15 characters in length To remove an extension from the Blocklist Controls select the extension to remove and click the Remove button located at the bottom of the page Click the Done button when you
55. s and log attempted violations Examples of applications in this category are AIM AOL Instant Messenger MSN Messenger Yahoo Messenger IRC Internet Relay Chat ICQ Jabber Chat Schedule Allows you to schedule daily access for selected chat programs This option will bypass blocking for chat and instant messenger programs during the specified time Gaming This category contains online gaming applications The iBoss can block the selected program s and log attempted access violations Examples of applications in this category are World of Warcraft Everquest Everquest II StarCraft XBox Gaming Schedule Allows you to schedule daily access for selected online gaming programs This option will bypass blocking for online gaming programs during the specified time File Sharing Programs This category contains online file sharing applications The iBoss can block the selected program s and log attempted access violations Examples of applications in this category are Limewire BearShare Manolito XoloX Acquisition Ares ZP2P BitTorrent Direct Connect Edonkey File Sharing Schedule Allows you to schedule daily access for selected file sharing programs This option will bypass blocking for file sharing programs during the specified time FTP File Sharing Protocol You may choose to enable blocking for incoming and outgoing FTP Traffic Enabling this feature will allow you to block incoming outgoing or all FTP Traffic
56. select the ONLY Allow access to sites on the Allowlist checkbox You may select the Enable Allowlist Navigation webpage if you wish to allow access to a built in iBoss website that will display links to all sites on the Allowlist To apply changes click the Apply button Note The Allowlist Navigation webpage will only display when low ONLY feature is enable Allow ONLY access to sites on the Allowlist below Enable Allowlist Navigation webpage Custom Allowlist Categories Please select the custom allow list categories below to apply to this group These categories allow you to create custom lists of URLs that can be applied to multiple groups Use the custom category feature to avoid adding the same URL to multiple groups Custom 1 Custom 6 Custom 2 Custom 7 Custom 3 Custom 8 Custom 4 Custom 9 Custom 5 Custom 10 pecific URLs to This Group Enter the URL of the website you would like to allow in the text box below and click the Add URL button You may enter a maximum of 1000 website URLs across all profiles Each URL may be a maximum of 255 characters in length To remove a website URL from the Allowlist select the URL and click the Remove button located at the bottom of the page When you are finished click the Done button Select Apply Keyword Safe Search if you would still
57. the top of your LDAP directory Example If your LDAP domain is iphantom com you would use the following settings Active Directory sample dc iphantom dc com Match Group Attribute This option allows you to set the attribute within the user record found to search for groups The group names are matched to the iBoss filtering groups The group names must match exactly For example if you have a LDAP group named administrators the user record found during login would be searched for this attribute The values found would be compared to your iBoss filtering group If there is a match it would use that filtering group for that user Rev 5 0 27 215 May 26 2010 Page 21 of 191 Phant m iBoss Technologies Enterprise If a user belongs to multiple groups they will be filtered using the highest priority group based on lowest number ex filtering group 1 has the highest priority Example Active Directory sample memberOf Match Group Key If a filtering group attribute is found and contains many key value pairs you can limit the group match to a particular key For example if a group value contains CN2managers OU support you may choose to match groups to the CN key which would match the word managers to the iBoss filtering group If you leave this field blank the entire group attribute will be used Example Active Directory sample CN Location Attribute This option allows you to put the location field on where the LDAP ser
58. this page to have effect You can add up to 250 rules Click the Done button when you are finished Global Settings These are global settings for the bandwidth throttling Enable This is a global option to turn this feature on or off Logging Enabled This option logs the bandwidth throttles in the reports Total Downstream Bandwidth This sets the total amount of Downstream bandwidth on your network in kbit sec Total Upstream Bandwidth This sets the total amount of Upstream bandwidth on your network in kbit sec Once you have finished with changes any of these settings click Apply Rule Detail These are the individual settings for the bandwidth throttles you set Enabled This option is to turn this throttle on or off Traffic Direction This is the direction in which the throttle takes place either upstream or downstream Apply To This field allows you to specify if this rule is for a group or user Rev 5 0 27 215 May 26 2010 Page 71 of 191 Phant m iBoss Technologies Enterprise Group only if applied to Groups This allows you to choose the group in which this rule is set for Group only if applied to User This allows you to choose the username in which this rule is set for Match This is the rule in which this rule is set for You may choose Web Category Domain IP Addresses or TCP UDP ports Apply To Category This allows you to choose which web category to apply this rule to Minimum
59. to an Adult site 5 times within a minute it will start recording their desktop for 1 minute These settings can be configured within the iBoss interface under the Report Settings in Preferences Please refer to the Video Desktop Recording Settings section for more information Rev 5 0 27 215 May 26 2010 Page 148 of 191 Phant m iBoss Technologies En 5 4 6 Report Manager Settings This section contains settings used globally for the report manager which include email server settings and other configurable options Before any email report can be sent via email the email server settings must be configured Current Generated Report System Activity Reports Schedules Information Settings Email Server Settings SMTP Server Address Requires Login ves No Username Password Report Maintenance Settings Perform Maintenance At 2 00 AM Daily E Maximum time to perform maintenance Unlimited Perform Full Maintenance At Time Specified Above OD Yes No Email Reports if deleted for space ves No Email To Shrink Database By 25 v when full All trademarks and the f their respective owners Figure 90 Report Manager Settings Rev 5 0 27 215 May 26 2010 Page 149 of 191 Phant m iBoss Enterprise Technologies 5 4 6 1 Email Server Settings This section allows you to configure the SMTP server you would like the iBoss to use in order
60. who s base is not in the list will not be allowed Alternatively if you choose Internet the block the extensions in the list then accesses to domains with the listed domain bases will be blocked For example you may choose to Controls allow only domains that end in com and net Any domain that does not end with those extensions will be blocked Le Enter the domain extensions in the text box below and click the Add button You may enter a maximum of 2000 domain extensions across all profiles Each extension may be a maximum of 15 characters in Preferences length To remove an extension from the list select the extension to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished 4 Note Changing the option to Only allow below will only allow the domains in the list These settings do not apply to web access to direct IP addresses You can block direct IP address access by going to Internet Controls Block Specific Web Categories IP Address blocking Take the following actions for the domains in the list below Block v the domain extensions in the list Aen 009 Phantom Techno d trademarks on this All trademarks and re Figure 46 Restrict Domain Extensions This page allows you to block or allow specific domain extensions from being accessed You may choose to only allow the domain extensions in the list or to block the extensions in
61. 20AM 05 15 08 11 50AM 05 15 08 1220 PM 0565 08 1250 PM 05 15 08 01 20 PM loiBandwugh Upstream Downstream m p Users For IP Address Below Is a report of the top users for Ip Address200 70 74 5 Total Packet Block Bytes Count Count Username Bytes 89 Di chrispark 5 54MB 14209 0 5 000 4 000 D 2 chris 133 92 KB 361 n aan D gt 3 00 30 49 01 54 1 49 KB 24 u 2 000 1 000 E Chris Fark Figure 111 Top IP Address Detail Rev 5 0 27 215 May 26 2010 Page 175 of 191 Phant m iBoss Technologies Enterprise The IP Address detail page contains information pertaining to a specific IP Address The page also allows you to view specific details about the IP Address such as total bandwidth to from the destination only TCP traffic to from the destination or only UDP traffic to from the destination To change to a particular protocol select the protocol TCP UDP or All from the drop down list labeled Protocol near the top All information on the page will adjust to reflect only the selected protocol This page also contains a graph with the bandwidth activity throughout the report period for this particular IP Address You can use this to determine when and how the particular IP Address is being utilized Toward the bottom a list of top users utilizing the IP Address is listed The list is sorted from highest use to lowest This allows you to
62. Activity Settings rae Generate Report Note Report generation may take a long time to complete You wil be able to access the data within the report while the report is being generated It is recommended that report generation be Tun during non peak network hours or during non business hours Report Name Automatically generated d felt blank Descr bon Start Date Choose Date Data available after 05 26 2010 End Date Choose Date Include the Following Users amp Groups Inctude Groupe mg Induda Users ee User Location mm Comma delemked for multiple locabons Auto Delete Processed Data after reports are sent Yes No Note This option applies to the processed data chosen above If you choose to Auto Desete Processed Data after reports are sent these data statistics wil be deleted and you will no longer be able to send PDF reports with thes data You wil need to process the data agam if you wish to have POF reports sent again Email PDF Report Recipient Email Message Information Email To Email From cc Bcc Subject Message Body 3 A g Report Contact Information z Name Compary Name EB Address Address 2 3 Cty State Province ep lt Email Phone Fax Ls Report Custom Introduction and Conclusion Introducton Condusion Additional Information Recipent Settings You must c Report Prepared Ry Logo URL Company Prepared For Logo width 300 x height 180 in ei or
63. Address M Proxy server Adyanced Vv Use a proxy server For your LAN These settings will not apply to dial up or VPN connections Address 192 168 1 1 Port 8008 Advanced IV Bypass proxy server For local addresses oe Figure 12 GPO Local Area Network Settings Rev 5 0 27 215 May 26 2010 Page 30 of 191 Phant m iBoss Technologies Enterprise 9 This setting will now be enforced and the next policy update 3 2 3 3 1 3 Manually Setup Proxy Browser Settings If you are not using the Active Directory NTLM features but still want to use the iBoss as a proxy filter you will need to manually setup the Proxy Settings for the browser To do this with Internet Explorer click on Tools gt Internet Options gt Connections Tab gt LAN Settings and then check Use a proxy server for your LAN Enter the IP address of the iBoss and the proxy port number default 8008 and click OK To do this in Firefox web browser click Tools gt Options gt Advanced gt Network Tab gt Settings Button gt Select Manual proxy configuration Enter the IP address under the HTTP Proxy setting for the iBoss IP address and the proxy port default 8008 and click OK This will now prompt a user to login before using the Internet Internet Options General Security Privacy Content Connections Programs Advanced r x a i ut To set up an Internet connection click Setup
64. Bandwidth Throttling QoS iBoss iBoss E Jump To Please Select Web Filters oa Product Support My iBoss Bandwidth Throttling Packet Shaping GoS Boss e This page allows you to configure quality of service rules for bandwidth throttling and packet shaping The iBoss allows you to create dynamic rules based on a variety of criteria including users groups Ip Addresses and ports Creating rules based on users and groups allows the iBoss to track the user dynamically and apply the QoS rules regardless of the user s Ip Address Create your rules below and click the Add button to apply the rule You can disable individual rules which will cause the rule to have no effect Rules are prioritized from top to bottom starting with rule one below which has the highest priority The iBoss will apply the first rule that matches each traffic stream If no rule applies the iBoss will use default QoS packet TOS bits to determine priority Internet For each rule you can specify the minimum amount of bandwidth to reserve for traffic that matches your criteria This will guarantee that at least this much bandwidth is available for Controls critical applications when your Internet connection is completely saturated If you would like to simply throttle traffic set the minimum bandwidth to 12 kbps and set the maximum to that f which you would like to throttle the traffic to The maximum bandwidth specified how much bandwidth matching traffic
65. Block Ping ICMP You may choose to enable blocking for outgoing Ping ICMP Traffic Block SSL on Non Standard Ports You may choose to enable blocking SSL on Non Standard Ports This feature is useful for blocking File Sharing programs which use encryption over non standard ports Block Rogue Encrypted Connections You may choose to enable blocking for Rogue Encrypted Connections This option blocks invalid SSL certificates and blocks programs that use Rogue Encryptions such as UltraSurf Rev 5 0 27 215 May 26 2010 Page 68 of 191 Phant m iBoss Technologies Enterprise SSL Domain Enforcement This option validates domains with the SSL certificate Reverse DNS Lookup Support This option allows for Reverse DNS lookup support Block Newsgroups You may choose to enable blocking newsgroup traffic Block Internal Servers You may choose to enable blocking for internal Servers This option helps block programs like BitTorrent which upload as well Logging Allows you to enable or disable logging of attempted program access violations This log is found on the Reports page The logging includes date time and category Logging can be enabled while in stealth mode This is useful for monitoring your Internet usage while remaining unnoticed on the network Without logging the iBoss program blocking will still work however violations will not be logged Rev 5 0 27 215 May 26 2010 Page 69 of 191 Phant m Technologies 4 2 3
66. Clustering Port 17500 gt Note The security key must be 32 hex characters Valid characters are 0 9 and AF Security Key Master Ip Address Status Ready Sync Count 0 Cluster Member Info Name Description Node Type Slave v IP Address Host Port 17500 Connect Timeout 15 Sync Filter Settings Yes v Sync Group Settings Yes v Sync Preferences No e Sync Security Settings No Sync Nodes No e Cluster Members No Entries Figure 22 Clustering This feature allows you to configure clustering between a group of iBoss filters By clustering iBoss filters you can have settings from an iBoss master automatically replicate across all members of the cluster This allows a central management point for a group of iBoss web filters Enter information about cluster members in the required fields and click the Add button To remove a cluster member from the list select the iBoss to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Rev 5 0 27 215 May 26 2010 Page 44 of 191 Phant m iBoss Technologies Enterprise Note When creating the cluster designate a single iBoss in the cluster as the master This will be the iBoss which you want to use as the central point for configuring settings Only the master needs to have cluster members added below You can also select which settings you will want to replicate from the master t
67. Internet is in Sleep Mode Blocked Page Internet ntrol e Controls 8 Custom Message f This option allows you to insert a custom message into the Blocked Page The custom message may be up to 299 characters in length You may also enable or disable the Password Override feature that appears at the bottom of the page Preferences a Ya Custom Blocked Page Message characters left J Display Login As Different User Override Option Redirect Page This option allows you specify your own URL to use as the Blocked Page Users will be redirected to this URL instead of the default Block Page The URL may be up to 255 characters in length Enter URL http Silent Drop Selecting this option will cause the iBoss to silently drop violations and prevent the iBoss from sending a blocked page response to the user when a violation occurs DNS Block Response Ip This option allows you to redirect blocks that occurred via DNS to an external Ip Address Setting this value to 0 will allow the iBoss to handle all DNS blocks internally Setting this value to 0 is recommended Ip Address 0 Sleep Mode Page Custom Message This option allows you to insert a custom message into the Sleep Mode Page The custom message may be up to 299 characters in length You may also enable or disable the Password Override feature that appears at the bottom of the page Custom Sleep Page Message chara
68. MAC address within the subnet In addition if using Active Directory NTLM Single Signon you will still have the ability to determine the user that was generating the network traffic but you will not be able determine which computer based on its MAC address the user was operating when generating the traffic MAC Address Filtering policies on this subnet are based on the Mac Address MAC of the computer s network adapters This allows you to identify computers on your network uniquely and assign computers to different filtering groups If using Active Directory NTLM Single Signon this method also allows you to identify which computer a user was accessing when network activity occurs This feature gives you more visibility on the network especially in a NTLM Active Directory environment as it allows you to not only identify the user but associate the station that was used to generate the network traffic This option indicates that traffic originating from this subnet does not traverse any internal routers or gateways MAC Address Through Gateway This option has the same effect as the MAC Address option above except it should be chosen if traffic originating from this subnet traverses an Rev 5 0 27 215 May 26 2010 Page 50 of 191 Phant m iBoss Technologies Enterprise internal gateway or router before reaching the iBoss You must register the internal gateway or router with the iBoss through the Register Internal Gateways menu op
69. Name Christopher Park Session Time 1 Minute Time Remaining 07 58 08 00 Company Name Text Geier By or Image Goes Here CU www PhantomTechnologies com Figure 70 Internet Access Window Session The iBoss Internet Access Window is the session window for the user that is logged in This window must be kept open to remain logged in This window will show you the Name of the user logged in how long they have been logged in Session Time Time Remaining Daily time limit and which server they are logged into if you have multiple Domains The iBoss user login feature also allows you to put your own Company Name in text or put a URL for a Company Logo Image The user login feature allows you to put custom messages before a user logs in and after they log in This allows you to post company policies and rules before using the Internet to protect your company from liability conflicts Rev 5 0 27 215 May 26 2010 Page 118 of 191 Phant m iBoss Technologies En 4 4 3 Filtering Groups Bees von cf Figure 71 Edit Filtering Groups Filtering groups are used to apply different Internet filtering rules to different groups of computers on your network You may customize the group names to easily remember the different settings configured for each group Each group name may be up to 50 characters in length When using transparent login via Active Directory eDirectory or LDAP groups with a higher priori
70. Once you enter the key click Edit to save the key and then Confirm The report manager will need to be connected to the Internet to be able to confirm this key Please make sure it is plugged into the network to be able to verify the subscription key Note The report manager will not process log data and will not fully function if your subscription is not active Rev 5 0 27 215 May 26 2010 Page 158 of 191 Phant m iBoss Technologies Enterprise 5 4 8 Report Manager System Information This section contains system information pertaining to the iBoss This includes the system log the system uptime and the database size From this page you can view and clear the system event log In addition you can view how much disk space the report manager is consuming and how much disk space is available When the maximum is reached the database will automatically shrink on the maintenance interval 5 5 Viewing Reports You may view reports by clicking on the report you wish to view from the Generated Reports section of the report manager When you click on the report you will be taken to the web statistics section of the report There are five main subsections in the reports Web Port Statistics IP Statistics Bandwidth Statistics and Application Statistics They are described below Note The Port IP and Application Stats are not visible when in High Performance Mode and while using an External Report Manager Web Stats Web s
71. Page 136 of 191 Phant m iBoss Technologies Enterprise This information shows who the report was prepared by add a logo and who it was prepared for This allows you to customize the report to show that you were the one who prepared it and who it was prepared for The Logo URL allows you to add a link to an image gif or jpg to the cover page of the iBoss Report 5 4 3 4 3 5 Report Type This allows you to choose which type of report to send There are four options to choose from Executive I T Full and Custom The Executive report has the least information in the report but is used for a quick overview The I T Report show more information such as P statistics Port statistics Application Statistics and Bandwidth statistics The Full Report shows all of the contained data The Custom Report allows you to choose which you may choose which options to include in the report You may also choose to have the report automatically deleted once it is emailed Please note that email reports only provide a high level summary of the report If you would like to keep the report so that you can access the details and all of the drill down capability do not select this option Note You must have a configured SMTP server for the email setting to work This is configured through Settings tab of the report manager 5 4 3 4 4 Users Groups This section allows you to select which user groups you would like included in the report The gr
72. RPRISE REPORT MANAQGER eeeeee eene eene seen ense tasse enses enses sns en sss ense seen seen ssnsenseesenseeeeese 12 2 5 1 EXTERNAL ENTERPRISE REPORTER eret titii scevconcdssrssvescencenssvedseouseuntetesccesevvesunsensdeeesevedoeronteteds 122 5 1 1 Installing the External Boss Enterprise Reporter on the network essere 122 5 1 2 Setup Steps to Register iBoss to External Enterprise Reporter 122 5 2 ACCESSING THE REPORT MANAGER 5 reete ERR Ip HERE RSS ERES sesneevienedsepuasencnbesscesepvesonsnsdaccusevacoutenbstecs 5 3 LOGGINGINTO THE REPORT MANAGER vscssrcsssecesseoccssavansocensoocessesecsecencedsoscvocsuacensonssacessuvesereenstessoesesuessesoees 5 4 REPORT GENERATION AND MANAGEMENT 5 4 1 Current Activity eese 5 4 1 1 Real time Web Hit Activity Graph Sp o 5 4 1 2 Current Top Bandwidth Consumers eese netten nennen tret teetn enne nette ene tnnnes 5 4 1 3 Realtime Web Hit activity graphio tee reir trt retire RR ce ee era E E ed eerie Pera dun 5 4 1 4 Real time website activity 5 4 2 URL Log Section 5 4 2 1 Search Filters ve 5 4 2 2 SE EEN 5 4 3 View Reports Section eae ostii et il dedos iie pe oM Ete etico hpdetes 5 4 3 1 Report Types ass org 5 4 3 2 Deleting Reports E 5 4 3 3 Exporting PDF REPOS csser epe teet bei ei epa d ee RECETTE read 5 4 3 4 Generating a Report 5 4 4 Report Sch
73. Report and and ending por to 200m in k Nete You may cick and drag from starting pont of the bm 6 000 5 000 4 000 3000 2000 1 000 kbits sec 051568 1219 AM 0516080 19AM 05150809 19AM 051509 1220PM 05 1508 04 20 PM E Iaea E een Goen V Top IP Add s Destination Usage Below is a report of the top IP address destination usage Mp Nete vou may click the IP address f avaiable for IP Ota statistics You may did on the More button d avaslatile for more results wi Total pachet eck ul 97131478 08 5331798 0 700 70 74 29 4755MB 64369 0 65 54 07 50 2422MB 25302 0 200 70 74 5 566MB wem o Umi 709 MS62414MB 4753 a Top IP Address Usage Downstream Below is a report of the top downstream IP address destination usage e 196 987 134 655487 mnn Nete You may dck the IP address f avalable for IP Detail statistics You may dick on the More button if avaiable for more resus ru Incoming Packet Block Bytes Count Count 2164969713147 00 3219575 0 206 70 74 29 46 990 4091 0 65 54 07 58 2374MB 167091 O 208 70 74 5 491MB i01 0 70992115474 2949 0 E ous op IP Address Usage Upstream Below is a report of the top upstream IP address destination usage dp Note You may cick the IP address d avaiable for IP Detal statistics You may dick on the More button if available for more resuks
74. Report Manager If you have an External Report Manager please choose External Report manager and refer to the following General Settings Configure Boss for External Report Manager External Report Manager Settings Ip Address 10 Password IIIJ Security Key Figure 54 External Report Manager Settings This feature is only available with the Enterprise Reporter Appliance External Report Manager Settings only when External Report Manager is selected must have an external report manager for this to work This option will show if you select External Report Manager selected as your performance settings This setting should only be selected if you have the External Enterprise Reporter This allows you to set the IP address for the External Report Manager the Report Manager Database Password and the Security Key Please refer to the External Report Manager section for information on where to get these settings from Log Web Statistics only when More logging is selected This allows you to enable or disable logging for web statistics You may choose from the different categories to log Log Port Statistics only when More logging is selected This allows you to enable or disable port statistics Log IP Address Access Statistics only when More logging is selected This allows you to enable or disable IP Address statistics Log Bandwidth Category Statistics only when More logging is selected This all
75. Security key You may change the security key to a 32 hex digit key Please keep this key handy as you will need it when registering the iBoss settings to point to the external report manager Rev 5 0 27 215 May 26 2010 Page 155 of 191 Phant m iBoss anten Enterprise Please refer to the Report Settings of the iBoss Interface for instructions on how to configure the External Report Manager Settings 5 4 7 4 Configure Time only in external report manager iBoss MEE MELLE Current Generated Report Video o System Activity Reports Schedules Desktop Settings Information General Report Users Register iBoss Devices Network Settings SUDSCription Time Configure Time Date loi yoz 2009 MM DD YYYY Time 12 hr s 28 minute s Hour 0 23 Minute 0 59 Timezone America Los Angeles E 3 Phantom Techn All trademarks and re trademarks on this their respective owners Figure 97 Configure Time This section allows you to set the time zone and time for the external report manager After changing the correct time zone click Save The iBoss Enterprise Reporter will need to reboot after saving Rev 5 0 27 215 May 26 2010 Page 156 of 191 Phant m iBoss Technologies Enterprise 5 4 7 5 Network Settings only in external report manager Current Generated Report Video System Activity Reports Schedules Desktop Settings Information General Report Users Register iBoss Devices Time S
76. Settings Click the Restore Factory Defaults button You will be prompted to confirm before continuing 8 2 2 Using the iBoss Console Port Connect your computer to the console port of the iBoss Please see console setup in this manual for more information on connecting the iBoss to the console port Choose the option Restore Factory Defaults Confirm that you would like to reset the factory defaults 8 3 Technical Support Phantom Technologies Inc prides itself on supporting our products and services Please use the information below if you are in need of assistance Website Support http www iPhantom com troubleshooting html Telephone Support 1 877 PHANTECH 742 6832 E mail Support support iPhantom com Rev 5 0 27 215 May 26 2010 Page 188 of 191 Phant m iBoss Technologies Enterprise 9 APPENDIX 9 1 Warranty Information For warranty information please visit https www iPhantom com warranty html BY PROCEEDING TO USE THE PRODUCTS AND SERVICES PROVIDED BY PHANTOM TECHNOLOGIES INC YOU ACKNOWLEDGE YOUR AGREEMENT TO BE BOUND BY THE FOLLOWING TERMS AND CONDITIONS AVAILABLE AT http www iPhantom com productAndServiceAgreement html IF YOU DO NOT AGREE WITH THESE TERMS AND CONDITIONS YOU MAY NOT USE THE PRODUCTS AND SERVICES PROVIDED BY PHANTOM TECHNOLOGIES INC For the latest news features documentation and other information regarding the iBoss please visit http www PhantomTechnologies com
77. This page allows you to register gateways that are internal to your network on the LAN side of the iBoss Typically the iBoss is placed between a Layer 2 switch and the outter network Gateway Firewall If your network has any additional internal non NAT gateways that are used to route internal local subnets you can register those gateways here The iBoss will automatically integrate with the internal gateways so that you may identify and apply filtering rules to computers behind the gateway The global settings apply to all internal gateways added You must enable internal gateway integration in the global settings below for any of the settings on this page to take affect Enter the internal gateway below and click the Add button To remove a gateway from the list select the gateway to remove and click the Remove button located at the bottom of Internet the page You can add up to 1000 internal gateways Click the Done button when you are finished Controls met Note Do not add any gateways if your network is configured with a single outter gateway Place the iBoss between the outter gateway router and the internal switch to which all of the computers are connected Preferences If you register internal gateways on this page you must add the subnet which is routed by this gateway on the Additional Local Subnets page When adding the additional local subnet make sure the option Routed Through Gateway is set to yes Global S
78. Tools and click on Active Directory Users and Computers 2 Right click on the domain and select Properties then select the Group Policy tab 3 Select the Default Domain Policy and click Edit amp Active Directory Users and Computers E lol xl File Action view Window Help lej x e ome e ee zx General Managed By Group Policy 73 Active Directory Users and Com CJ Saved Queries a 8 i gp ibossweb local To improve Group Policy management upgrade to the Group Policy m C Builtin Management Console GPMC Computers Sr Current Group Policy Object Links for ibossweb Domain Controllers Da ForeignSecurityPrincipal C users A A A Group Policy Object Links No Override Disabled Default Domain Policy Group Policy Objects higher in the list have the highest priority This list obtained from IBOSSWEB ibossweb local New Add Edit Up Options Delete Properties Down Block Policy inheritance Figure 8 GPO Default Domain Policy Rev 5 0 27 215 May 26 2010 Page 28 of 191 Phant m iBoss Technologies 4 Navigate to User Configuration gt Windows Settings gt Internet Explorer Maintenance gt Connection 5 Double click on Connection Settings in the right window panel E Group Policy Object Editor gur t Settings for automatic browser c Settings for proxy Settings for user agen
79. URL Keyword Filler Location Category All Action All Callouts Only No Email This Report Now Email thes URL log to Maximum of URLs Format 500 Mimi s Seng Items 1 5 Items Per Page 2s e Prev Next Result Filters Start Date amp Time 05 26 2010 12 00 AM End Date amp Time User URL Filter Group Filter Computer MAC Source Ip Location Computer Name Category All Action Date V User Uri Source IP Description Action 05 26 10 09 24 AM chrislaptop 05 26 30 09 23 AM chrisl Figure 79 URL Log Rev 5 0 27 215 May 26 2010 Page 130 of 191 Phanta m Technologies 5 4 2 1 Search Filters iBoss En These filters allow hiding other URLs and only showing filters in which you d like to see This makes it easier to diagnose and look through the URLs You can search for date ranges users groups Mac addresses source IP addresses computer names URL or keyword filter location category action and callout Once you have made these filters click the Apply button above the search filters You can export this You may also send this report directly from this page by entering email information under the section for Email This Report Now and clicking the Send button You may also generate a report schedule by clicking on the Create Report Schedule button 5 4 2 2 Site Callouts These are callouts in which site logos are displayed and search terms are tagged For example sites like Google w
80. You may also add an optional filtering group number which should be tab delimited If the filtering group number is not present on a line the computer will be added to the default filtering group Group 1 The format of each line should look like the following and is tab delimited Computer Name Record Type lp Address Optional Filtering Group Number Note Each filtering group is associated with a number You can view them here Filtering Groups Other valid choices are N for No Filtering Bypass Filtering and U for Require User Login Otherwise please use a filtering group from 1 to 25 The maximum number of computers per import is 1000 If you have more than 1000 computers break the list into sections of 1000 and import them separately Each line should not exceed 200 bytes Scan Network You can choose to Scan Network which will search from computers online on the Local Area Network This will automatically pull the MAC Address and computer name of the computers found This will cause the iBoss to be paused while this is processing Once finished you will receive a Save dialogue which you can save Open this file in a text editor to copy and paste computers found on the network Rev 5 0 27 215 May 26 2010 Page 108 of 191 Phant m iBoss Technologies Enterprise 4 4 1 2 Identifying a Computer iBoss WebFilters Identify Computer Please enter the following information to identify this computer Computer Nickname
81. You may select the Protocol to change the view Application Web Browsing Protocol All Total Byte Count 72641 817 KB Total Byte Upstream 5221 35 KB Total Byte Downstream 67420 467 KB Total Packet Count 93820 N eee h Ac Application Bandw ity Below is a report of application Web Browsing bandwidth activity ou may click and drag from a starting point and an ending point of the timeline to zoom in 140 120 100 80 60 40 20 kbits sec 05 15 08 12 18 AM 05 15 08 05 19AM 05 15 08 09 19 AM 05 15 08 12 50 PM 05 15 08 04 50 PM Total Bandwidth Upstream Downstream u Top Users For Application Below is a report of the top users for the Web Browsing application Note You may click the More button if available for more entries You may mouse over the Blue text in the User column for more information about the entry Username Tatal Packet Block Bytes Count Count D 1 Chris Park siete Gia m D 2 00 30 48 81 54 286 2 MB 31977 0 D 3 PT PCTEST 0001 237 82 KB 534 0 Bvtes i E 4 PHANTOM SRvR 1135 01 KB 272 o D 5 PT PCDEV 0002 115 33KB 276 o Figure 117 Application Detail Rev 5 0 27 215 May 26 2010 Page 183 of 191 Phant m iBoss Technologies Enterprise The application detail page contains information pertaining to a specific application The page also allows you to view specific details about the app
82. ace for the cache ETP Proxy Port Tell me when a website asks to store data for offline use Gopher Proxy Port The following websites have stored data for offline use SOCKS Host Port SOCKS v4 SOCKS v5 No Proxy for Example mozilla org net nz 192 168 1 0 24 Automatic proxy configuration URL r Figure 14 Manual Proxy with Mozilla Firefox 3 2 3 3 1 4 Automatic Identify of Unknown Computers The automatic Identify of Unknown Computers can be found under Identify Computers amp Users You can auto identify unknown computers based on the last known proxy user for that computer Only computers that have had users access the iBoss through the proxy can be identified using this technique You can re attempt this periodically as more users will be identified as soon as they access the Boss through the proxy To attempt to auto identify unknown computers click the Auto Identify button This will identify the computers which proxy users have logged in to and place the identified computer under the Identified Computers table The Computer Nick Name will show up with the last known user with a star in front of it Note You can auto identify unknown computers based on the last known proxy user for that computer Only computers that have had users access the iBoss through the proxy can be identified using this technique You can re attempt this periodically as more users will be ident
83. age You can add up to 1000 internal gateways Click the Done button when you are finished Note Do not add any gateways if your network is configured with a single outter gateway Place the iBoss between the outter gateway router and the internal switch to which all of the computers are connected If you register internal gateways on this page you must add the subnet which is routed by this gateway on the Additional Local Subnets page When adding the additional local subnet make sure the option Routed Through Gateway is set to yes Rev 5 0 27 215 May 26 2010 Page 47 of 191 Phant m iBoss anten Enterprise 3 2 3 9 Bypass IP Ranges IBoss Jump To Please Select X ge Web Filters Product Support My iBoss Bypass Ip Range Bess 8 This page allows you to add IP Addresses which you would like to completely bypass the iBoss filtering engine IP Addresses listed here will not appear in your Unidentified Computers list and will completely bypass filtering This is useful for bypassing IP Address ranges that include servers VOIP based phones and other devices which do not require filtering Enter the IP Address ranges below and click the Add button To remove an IP Address range from the list select the range to remove and click the Remove button located at the bottom of the page You can add up to 50 IP Address ranges to bypass Click the Done button when you are finished
84. aily Report 05 15 2008 7 Report Name Daily Report Date 05 15 2008 05 16 2008 SS Show Report For All Users in This Report istics Usage Statis Applicat atistics Port Detail Note You may select the Protocol to change the view Port Number 119 Protocol Ar EJ Total Byte Count 4784160 345 KB Total Byte Upstream 115007 482 KB Total Byte Downstream 4669152 863 KB Total Packet Count 5331798 Port Bandwidth Activity Below is a report of port 119 bandwidth activity gt Note You may click and drag from a starting point and an ending point of the timeline to zoom in 6 000 5 000 4 000 3 000 2 000 1 000 05 15 08 10 50AM 05 15 08 11 20AM 05 15 08 11 50 AM 05 15 08 1220 PM 05 15 08 12 50 PM Total Bandwidth Upstream Downstream a kbits sec Top Users for Port Below is a report of the top users for port 119 Note You may click the More button if available for more entries You may mouse over the Blue text in the User column for more information about the entry Total Packet Block Username gutes Count Count 5 000 00 sone i Di ChrisPark 4 78GB 53317980 4 000 t 3 500 08 Mor vm 3000 08 2 500 08 2 000 08 a 1 500 08 1 000 08 500 000 Chris Park Figure 108 Port Detail Rev 5 0 27 215 May 26 2010 Page 171 of 191 Phant m iBoss Technologies Enterprise The port detail page contains
85. allows you to configure settings for computers that require user login Note These settings are global across all computers that require user login and only apply to computers which require user login These settings do not apply to identified computers which have bypass filtering rules or have a filtering group set for it Port Bypassing This will allow you to bypass ports on computers that require user login When a computer is set to require user login Internet access is disabled when no user is logged into the computer If you would like to allow access to certain ports even when a user is not logged in you can configure them here This is useful for programs that require port access at all times for example remote computer management Rev 5 0 27 215 May 26 2010 Page 116 of 191 Phant m iBoss Technologies Enterprise Domain Bypassing This will allow you to bypass domains on computers that require user login When a computer is set to require user login Internet access is disabled when no user is logged into the computer If you would like to allow access to certain domains even when a user is not logged in you can configure them here This is useful for sites that supply updates that require access at all times for example Operating System amp Anti virus updates or Email access Custom Internet Access Window Company Name Logo This allows you to add your company name or logo easily on the Internet Access Window when a us
86. ame Count 1 400 1 Chris Park 1212 Hits Chris Park Figure 103 Web Category Detail iBoss Rev 5 0 27 215 May 26 2010 Page 164 of 191 Phant m iBoss Technologies Enterprise 5 5 2 1 1 1 Hit and Block Category Detail Graph The Hit and Block Activity graph show the activity for the currently selected category This will give you an indication of use throughout the report period for the category selected Remember the information reflected on this page and the graph pertain to either the currently selected user or all users if that option is selected in the report information section at the top 5 5 2 1 1 2 Top Users for Web Category This section lists the top users for the selected category Users are ordered by highest hit count first Click on the More button to get a full list of users for this category The full list can be sorted by a variety of parameters 5 5 2 2 Category Time Usage Rev 5 0 27 215 May 26 2010 Page 165 of 191 Phant m iBoss Technologies Enterprise a Browse Time T T T T T T T T 1000 2 000 3000 4 000 5000 6 000 7 000 8 000 9 000 Category ExpandAW Collapse All Time LH Ads 1 hr 49 mins 16 secs More Adult 0 Seconds More Audio Video 44 mins 13 secs More Dating 0 Seconds Mate Dictionary 0 Seconds More Drugs 0 Seconds More Education 0 Seconds More Entertainment 16 mins 9 secs Mor
87. and image search results if this option is enabled For Google the SafeSearch filtering preference must be set to Use strict filtering Filter both explicit text and explicit images when this option is enabled Scan HTTP On Non Standard Ports If this feature is enabled the iBoss will scan for HTTP web requests on non standard ports Allow Legacy HTTP 1 0 Requests If this feature is enabled the iBoss will allow HTTP 1 0 requests that are missing the HOST header Disabling this feature provides a higher level of filtering security and makes bypassing the filter more difficult If this feature is enabled it may provide more compatibility with older non HTTP 1 1 compliant software Identity Theft Phishing IP Address URL Blocking Protects against potential identity theft attempts by notifying you when someone is trying to steal your personal information through Internet Phishing Enabling this feature will also block users from navigating to websites using IP address URL s Rev 5 0 27 215 May 26 2010 Page 63 of 191 Phant m iBoss Technologies Enterprise 4 2 1 1 Advanced Scheduling iBoss WebFilters 1 Default a Default Advanced Scheduling for Filtering Categories Categories saved successfully Use advanced scheduling to create custom allow and block times You may use different schedules for the weekdays and for the weekend E Green or checked indicates access is allowed during the time block specifi
88. ant m iBoss Technologies Enterprise To identify the computer you are using now click the I dentify Edit this computer button Advanced users may click the Advanced Add button to manually identify a computer For the Advanced Add you will need to know the MAC address or IP address of the computer you wish to identify You may click on Import to import computers to the identified list Please see the Computer Import section for more information Unidentified Computers This is a list of computers on the network that have not been identified To identify one of these computers click Add on the computer in the list that you wish to identify You may refresh the list by clicking on the Refresh button at the bottom of the list Default Filtering Policy These settings apply to computers that are unidentified on your network You can choose to apply the rules set by the default filtering group block all unidentified computers from accessing the Internet or set unidentified computers to require user login Note If you choose to Require user login on all unidentified computers you must add users under the Users tab to be able to login and browse the web or have LDAP setup within the iBoss for user authentication Rev 5 0 27 215 May 26 2010 Page 106 of 191 Phant m Technologies 4 4 1 1 Import Computers iBoss Web Filters Identify Computer Import There are two methods that can be used to import computers The S
89. are incorrect can cause you to lose the ability to log into the iBoss interface It is important that special care be taken when entering network routes and that you have an understanding of the effects of the route you are adding Enter Network Route IP Address Subnet Mask Gateway Preferences No entries in list 2009 Phantom Technologies LLC All rights reserved All trademarks and registered trademarks on this website are the property of Figure 23 Add Additional Routes This page allows you to register gateways that are internal to your network on the LAN side of the iBoss Typically the iBoss is placed between a Layer 2 switch and the outter network Gateway Firewall If your network has any additional internal non NAT gateways that are used to route internal local subnets you can register those gateways here The iBoss will automatically integrate with the internal gateways so that you may identify and apply filtering rules to computers behind the gateway Rev 5 0 27 215 May 26 2010 Page 46 of 191 Phant m iBoss Technologies Enterprise The global settings apply to all internal gateways added You must enable internal gateway integration in the global settings below for any of the settings on this page to take affect Enter the internal gateway below and click the Add button To remove a gateway from the list select the gateway to remove and click the Remove button located at the bottom of the p
90. at the same time only one report schedule will be processed at a time The others will be queued and each processed one at a time until all of the due schedules have been processed 5 4 4 4 Report Schedule Types There are two report schedule types daily report email schedules and custom generated report schedules Daily report email schedules allow you to email the auto generated daily reports to specified recipients It also allows you to enter a customized email message for the email Custom generated report schedules allow you to create a custom report on a schedule that includes specific statistics user groups and more You can additionally have the custom report emailed whenever a generation occurs 5 4 4 5 Creating a Report Schedule To create a report schedule click on the Create New Report Schedule located at the bottom of the report schedule list 5 4 4 5 1 General Information The general information section allows you enter the following information Schedule Name This is the name you would like to give this schedule Description This allows for a short description of this schedule Run Type This is the type of report that is chosen to be used The options are Recurring report or Single Run Schedule Active This is the option to turn the schedule active or inactive Schedule Type This indicates the type of report schedule you would like to create Report schedule types are described above Dai
91. ay Password This is the password to log into the internal gateway Connect Timeout This is the connection timeout if no response is received specified in seconds Once you have finished adding these settings click the Add button It will add it to the Internal Gateways list To test these settings click the Edit button next to the entry and it will populate the fields again that you have entered Next click the Test button to test this entry To remove an entry click the Remove button next to the gateway entry Once you are finished click the Done button Rev 5 0 27 215 May 26 2010 Page 53 of 191 Phant m iBoss Technologies En 3 2 3 12 Edit Advanced Network Settings IB OSS Jump To Please Select X ee Web Filters Product Support My iBoss iBoss Help Topics Advanced Network Settings Enterprise Advanced This page allows you to set advanced network settings Settings UDP Destination Port 8000 1024 65535 UDP Source Port 8001 1024 65535 Always On Connection 9 Enable Disable Internet Controls Preferences 009 Phantom Technologies LLC All rights reserved All trademarks and re ed trademarks on this website are the property of their respective ovmers Figure 27 Edit Advanced Network Settings The iBoss connects to the Phantom servers via UDP You may select which ports it connects through The default destination port is 8000 and default sou
92. ble connection Typically this port is connected to your firewall router Bypass Fail Safe Ports not in all versions These ports are fail safe ports which will be used instead of using the default ports It is used for fail safe features Rev 5 0 27 215 May 26 2010 Page 11 of 191 Phant m iBoss anten Enterprise 2 2 2 Console Port The Console port provides a serial RS 232 interface to the iBoss This port provides such functions such as configuring the network settings for the iBoss displaying the IP Address settings for the iBoss and restoring factory defaults When using directly to a computer you must use a NULL MODEM DB9 serial cable This port can be accessed via any console COM program On windows you can use the built in program HyperTerminal Other console programs that are available include PuTTY 2 2 2 1 Console Port Settings The settings for the console port are as follows Table 1 Serial Console Port Settings Bits Per Second 19200 Data Bits 8 Parity None Stop Bits 1 Flow Control None COM1 Properties Port Settings Bits per second Data bits Parity Stop bits Flow control Figure 1 COM Properties Rev 5 0 27 215 May 26 2010 Page 12 of 191 Phant m iBoss Technologies Enterprise 3 Getting Started This section describes initial setup and configuration of the iBoss appliance This section contains information that will hel
93. blish a connection Must Activate or Subscription Expired If you have a new Boss and need to activate your subscription or if your iBoss subscription has expired the Activate button will appear next to the filtering status field Click the Activate button to proceed with your iBoss activation Current Date amp Time Indicates the current date and time The date and time are synchronized when the iBoss establishes a connection to the gateway and are important for performing Internet scheduling and report logging The local time zone settings may be set from the Edit My Time Zone page under My Preferences Note The date amp time will only be displayed when the iBoss status is Enabled Enable Disable Button The Enable Disable button is located next to the Filtering Status field It is useful for quickly enabling and disabling your iBoss filtering If your status reads Not Enabled clicking the Enable button will enabled the iBoss filtering You may also choose to Disable for time periods such as 15 Min 30 Min 1 Hour 2 Hours 12 Hours 24 Hours or Until Re enabled 4 1 2 Main Menu The Home menu allows you to choose options for configuring the current iBoss settings There are eight options to choose from View Log Reports Configure Internet Controls Edit My Preferences Identify Computers amp Users Tools amp Utilities Setup Network Connection Update Firmware and Manage Subscription View Log Reports Thi
94. by the iBoss on their behalf with filtering applied This requires that proxy settings be placed in the browser through an Active Directory Group Policy Object or manually In this mode the proxy will analyze web requests For applications to be analyzed the iBoss must be placed inline on the network so that the iBoss can see the streams For Web 2 0 streams the policy for that computer will be applied instead of the proxy user If using the iBoss in an Active Directory environment NTLM can be used to transparently log the user onto the proxy using the Active Directory credentials This will apply to all web requests The iBoss can still be used in proxy mode in environments that do not use Active Directory In this case users will need to be created within the iBoss and the user will be prompted the first time they open a browser for their credentials To use the iBoss as a proxy filter you will need to configure the settings for it You may configure the settings by going to Configure Proxy Settings under the Setup Network Connections section You will first need to enable this feature You may change the port number that it uses by default it uses port 8008 You may then select which User Authentication Method to use If you have an Active Directory server you may select Active Directory NTLM If you do not have an Active Directory server you may still use the iBoss in Proxy mode and authenticate using the iBoss users Enter all the informat
95. c Standard Web Browser e Active iBoss Subscription 2 Specifications System Requirements Broadband Cable DSL T1 FiOS etc Internet service Network Adapter for each computer Existing Firewall and Switch Any Major Operating System running a TCP IP network i e Mac Windows Linux iBoss Enterprise 2 1 iBoss Enterprise Model Specifications The iBoss Enterprise has the following specifications Model Recommended Identifiable dentifiable Filtering Reports Generated Report Concurrent Computers Users Groups Database Reports Schedules Users Size 1550 50 100 120 120 25 10 GB 50 5 1750 101 200 240 240 50 20 GB 75 10 2150 201 300 360 360 60 20 GB 75 10 2550 301 400 480 480 75 25 GB 100 15 3550 401 600 720 720 100 35 GB 100 20 4550 601 1000 1200 1200 125 45 GB 125 25 5550 1001 1500 1800 1800 200 55 GB 250 30 6550 1501 2000 2400 2400 300 65 GB 300 35 7550 2001 3000 3600 3600 100 75 GB 300 35 2 2 Front Panel amp Back Panels 2 2 4 Ethernet Ports The back panel contains two Fast Ethernet 10 100 Mbps ports The following provides a description for each port LAN The port labeled LAN should be connected to your local area network Typically this port is connected to the switch on your LAN that is connected to all of the filtered computers on the network WAN The port labeled WAN should be connected to an Internet accessi
96. can use at any time If the maximum is set to your maximum Internet speed then the matching application can use any spare bandwidth when it is available Preferences For proper operation set the Total Downstream Bandwidth and Total Upstream Bandwidth in the Global Settings to match your bandwidth connection speed to the Internet for your network You must enable the global settings for any of the rules on this page to have effect You can add up to 250 rules Click the Done button when you are finished Global Settings Enable No v Logging Enabled Yes sl Total Downstream Bandwidth 1000000 kbit sec Total Upstream Bandwidth 1000000 kbit sec Rule Detail Figure 35 Bandwidth Throttling QoS Enabled Enabled v Traffic Direction Downstream Apply To Group v Group All Groups v Match Web Category v Apply To Category All Categories g e Minimum Reserved Bandwidth 12 Min 12 kbit sec kbit sec Maximum Bandwidth 500 kbit sec Run On Schedule Disabled v Schedule Start Hour 00 0 23 Schedule Start Minute 00 0 59 Schedule End Hour 00 0 23 Schedule End Minute 00 0 59 ER Rev 5 0 27 215 May 26 2010 Page 70 of 191 Phant m iBoss Technologies Enterprise This feature allows you to configure quality of service rules for bandwidth throttling and packet shaping The Boss allows you to create dynamic rules based on a variety of criteria including users gr
97. ch E Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Dictiona Allowed 10 128 30 5 Dictiona Allowed 10 128 30 5 Dictiona Allowed 10 128 30 5 Dictiona Allowed 10 128 30 5 Dictiona Allowed 10 128 30 5 Dictiona Allowed 10 128 30 117 Allowed 10 128 30 5 Dictiona Allowed 10 128 30 5 Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Allowed 10 128 30 5 Allowed 10 128 30 117 Allowed 10 128 30 5 Allowed 10 128 30 5 Shops Allowed 10 128 30 5 Search E Allowed 10 128 30 5 Entertai Allowed 10 128 30 5 Allowed 10 128 30 5 Technolo Allowed 10 128 30 5 Technolo Allowed Rev 5 0 27 215 May 26 2010 iBoss Enterprise Page 129 of 191 Phant m iBoss Technologies En 5 4 2 URL Log Section This section allows you to view the list of URLs You may click the IP address if available for IP statistics You may mouse over the Blue text in the description and User column for more information about the entry URL Log Note You may cick the IP address d bain for IP statistics You may mouse over the Blue text in the Description and User column for more information about the entry You may click the titie of the column to sort the results Search Filters You may ute as a wildcard for broad searches ex phantom Date format should look like 32 31 2008 Start Date 05 26 2010 Start Time 12 00 AM v End Date End Time 11 v 59 v PM v User mg Group eg Computer MAC Source Ip Computer Nome
98. cklist Categories Enterprise This page allows you to create custom Blocklist list categories Enter the URL of the website you would like to add the currently selected category in the text box below and click the Add URL button Any group that has this category checked will also have the urls in this category applied Reports e Internet Controls be Category Name Custom 1 Category Settings Current custom Blocklist category Custom v Category Schedule Preferences 9 AlwaysEnabled Enable using an Advanced Schedule Category URLs Enter URL ex domain com El Apply Keyword Safe Search No entries in list E Select all Figure 37 Custom Blocklist Categories Select the custom block list categories to apply to this group These categories allow you to create custom lists of URLs that can be applied to multiple groups Use the custom category feature to avoid adding the same URL to multiple groups This feature allows you to create custom Blocklist list categories Enter the URL of the website you would like to add the currently selected category in the text box below and click the Add URL button Any group that has this category checked will also have the URLs in this category applied Rev 5 0 27 215 May 26 2010 Page 74 of 191 Phant m iBoss Technologies Enterprise 4 2 4 2 Blocklist Import iBoss WebFilters Import Urls To Blocklist category Custom 1 Please paste URLs one per
99. connection to sleep disabling all Internet traffic to and from your network This is beneficial for when the Internet doesn t need to be on or accessed Rev 5 0 27 215 May 26 2010 Page 87 of 191 Phant m iBoss Technologies Enterprise You may manually force the Internet to sleep by selecting a time period under the Force Internet To Sleep For section and pressing the Sleep Now button You may also bypass the sleep schedule by selecting a time period under the Bypass Internet Sleep Schedule For section and pressing the Bypass Now button When manually forcing the Internet to sleep or bypassing the sleep schedule a countdown timer will show that will allow you to cancel the forced sleep or cancel the bypass You may setup a daily schedule or an Advanced Schedule by which to put the Internet to sleep under the Sleep Schedule section When the Internet is in Sleep Mode the Internet Sleep Mode page will be displayed in the web browser if Internet access is attempted To customize the message that appears on the Internet Sleep Mode page go the custom block page messages under preferences You may override Internet Sleep Mode and wake up your Internet connection by entering the iBoss login password into the Internet Sleep Mode page if it is displayed Rev 5 0 27 215 May 26 2010 Page 88 of 191 Phant m iBoss Technologies Enterprise 4 2 6 1 Sleep Mode Page iBoss Web Filters Internet Sleep
100. controls allow you to easily restrict access to specific categories of Internet destinations and manage time spent using online programs online chat and messenger programs file sharing gaming and more It utilizes an industry first advanced real time graphical user interface robust Internet traffic controls total network traffic analyzer up to the second network activity feed MRTG and a live real time URL database feed ensuring the most accurate filtering possible 1 2 Key Features Comprehensive Web Filtering I M Application Policies and Blocking Policy Scheduling Robust Reports Real Time MRTG Remote Management Individual User Login with LDAP Active Directory I ntegration Policies Users Groups Real Time URL Updates Simple amp User Friendly I nterface Plug amp Play with No Software to Install Compatible with any Operating System 1 3 Manual Structure This manual includes detailed information and instructions for installing and configuring the iBoss The Getting Started section of this manual will guide you through the initial hardware installation and setup process The Configuration section of the manual contains detailed instructions for configuring specific settings and customizing preferences Note For quick installation instructions you may also reference the iBoss Quick Installation Guide included with the product Rev 5 0 27 215 May 26 2010 Page 10 of 191 Phant m Technologies 1 4 et
101. cters left Redirect Page This option allows you specify your own URL to use as the Sleep Mode Page Users will be redirected to this URL instead of the default Sleep Mode Page The URL may be up to 255 characters in length Enter URL http Silent Drop Selecting this option will cause the iBoss to silently drop the connection when the computer is in sleep mode The user will not receive the Sleep Mode Page if this option is selected and the Internet will appear to be unavailable Figure 56 Customize Block Pages Rev 5 0 27 215 May 26 2010 Page 98 of 191 Phant m iBoss Technologies Enterprise You may customize the pages that are displayed when a website is blocked due to its content or when the Internet is in Sleep Mode Blocked Page Custom Message This option allows you to insert a custom message into the Blocked Page The custom message may be up to 299 characters in length You may also enable or disable the Password Override feature that appears at the bottom of the page Blocked Page Redirect Page This option allows you specify your own URL to use as the Blocked Page Users will be redirected to this URL instead of the default Block Page The URL may be up to 255 characters in length Blocked Page Silent Drop Selecting this option will cause the iBoss to silently drop violations and prevent the iBoss from sending a blocked page response to the user when a violation occurs Sleep Mode Custom Me
102. d daily reports as well as the user generated reports Rev 5 0 27 215 May 26 2010 Page 131 of 191 Phant m iBoss anten Enterprise Current Activity Schedules Desktop Settings Generated Reports al Report 4 lt May 2010 gt S Year Month Month Year Archived Reports Date Range View Daily Report 05 26 2010 05 27 2010 Daily Report 05 25 2010 05 26 2010 Daily Report 05 24 2010 05 25 2010 Daily Report 05 23 2010 05 24 2010 Daily Report 05 22 2010 05 23 2010 Daily Report 05 21 2010 05 22 2010 Daily Report 05 20 2010 05 21 2010 Daily Report 05 19 2010 05 20 2010 Daily Report 05 18 2010 05 19 2010 Daily Report 05 17 2010 05 18 2010 Daily Report 05 16 2010 05 17 2010 Daily Report 05 15 2010 05 16 2010 Daily Report 05 14 2010 05 15 2010 Daily Report 05 13 2010 05 14 2010 Daily Report 05 12 2010 05 13 2010 oooooooooooooooo O0Q00000000000000 Daily Report 05 11 2010 05 12 2010 Delete Selected User Generated Reports Date Range Figure 81 Generated Reports Section Rev 5 0 27 215 May 26 2010 Page 132 of 191 Phant m iBoss Technologies Enterprise 5 4 3 1 Report Types Generated reports come in two basic types auto generated daily reports and user generated reports Auto generated daily reports are automatically created by the iBoss T
103. e File Sharing 0 Seconds Mate HE Finance 2 hrs 11 mins 41 secs More Forums 0 Seconds Friendship 0 Seconds More Gambling 0 Seconds More Games 0 Seconds More Government 0 Seconds More Guns amp Weapons 0 Seconds More Jobs 0 Seconds More LH Mobile Phones 7 mins 4 secs Mate B News 1 hr 26 mins 18 secs LH Personal Websites 0 Seconds More Proxies 0 Seconds More Religion 0 Seconds More Search Engines 1 hr 15 mins 15 secs More f Shops 31 mins 26 secs More E Sports 0 Seconds More LH Toolbars 0 Seconds More LH Travel 0 Seconds More LH violence 0 Seconds Mere LH Warez 0 Seconds More webmail 1 hr 39 mins More O E Total Time 14 hrs 11 mins 3 secs T Figure 104 Category Time Usage Rev 5 0 27 215 May 26 2010 Page 166 of 191 Phant m iBoss Technologies Enterprise This section shows you the top categories based on time usage This will also show you in Hours Minutes and seconds of the amount of time spent on each category You may press the expand button to see the Top 5 Users for a specific category 5 5 2 3 Top Visited and Blocked Domain This section lists the top visited domains as well as the top blocked domains You get a full list of domains with the ability to sort by a variety of parameters by clicking on the More button 5 5 2 4 Visited Websites This section gives a detailed list of the visited websites for the report period Last Visited Sites Below is a report of the
104. e 31 Block Specific Website Categories Rev 5 0 27 215 May 26 2010 Page 61 of 191 Phant m Technologies iBoss Enterprise The Internet Category Blocking page allows you to configure the current iBoss Internet website category blocking settings log settings Stealth Mode and Identity Theft Detection options Categories These are categories from which Internet websites are grouped You may choose categories from this list that you wish to block on your network In addition to blocking access to these website categories the iBoss will also log attempted access violations if logging is enabled Examples of website categories are Ads Gambling Services Adult Content Games Sex Ed Alcohol Tobacco Government Shopping Art Guns amp Weapons Sports Auctions Health Technology Audio amp Video Image Video Search Toolbars Bikini Swimsuit Jobs Transportation Business Mobile Phones Travel Dating amp Personals News Violence amp Hate Dictionary Organizations Virus amp Malware Drugs Political Web Based E mail Education Porn Nudity Web Hosting Entertainment Private Websites Web Proxies File Sharing Real Estate Finance amp Investment Religion Forums Restaurants Food Friendship Search Engines Category Scheduling Allows you to choose whether you want the categories above that are selected to be always blocked or blocked based on a custom Advanced Day Time Schedule Note The Advanced Category Scheduling f
105. e Directory plugin is a service you install on your Active Directory server which communicates user login information with the iBoss The Active Directory plugin is one of two methods to integrate the iBoss with your Active Directory domain You can alternatively use the settings in the Active Directory amp Proxy Settings page to use logon and logoff scripts to perform Active Directory user authentication When using the alternative technique install of the Active Directory plugin is not required You may download the latest iBoss Active Directory Plugin at www ibosswebfilters com adplugin adplugin zip Using the Active Directory plugin has advantages to using logon and logoff scripts as it allows multiple distinct Active Directory domains to report user logon activity to the iBoss When using logon and logoff scripts the iBoss can only be joined to one domain In addition the plugin offloads authentication information from the iBoss and is more efficient in larger environments Register any Active Directory domain which will be communicating to the iBoss via the plugin To remove a cluster member from the list select the Domain to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Note In order for your Active Directory domain to communicate with the iBoss they must first be registered below with the correct Ip Address In addition the security key used in the main set
106. e a subnet from the list select the subnet to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Filtering Method Option The iBoss paste ability to filter a KEE Ip Address This option indicates that Ip Addresses should be used to apply a filtering policies to traffic originating on this subnet With this option you can apply policies to individual Ip Addresses but not directly to a computer based on its MAC address within the subnet In addition if using Active Directory NTLM Single Signon you will still have the ability to determine the user that was generating the network traffic but you will not be able determine which comes based on its MAC address the user was operating when generating the traffic MAC Address Filtering policies on this subnet are based on the Mac Address MAC of the computer s network adapters The ee Xu DCE ee on YU ner a and assign computers to different filtering groups If using Active Directory Signon this method also allows RE network activity occurs This feature gives you more visibility on the network especially in a NTLM Active Directory as it allows you to not only identify the user but associate the station that was used to generate the network traffic This option indicates that traffic originating from this subnet does not traverse any internal routers or gateways MAC Address Through Gateway This option has the
107. e connected The management portal automatically connects to your device using SSL and AES encryption without needing to set up a VPN A static IP address is not required for the management portal to connect to your devices It will even be able to connect to the devices through a secure firewall without having to hassle with any further configuration of the firewall 6 5 Settings Settings for your iBoss units may be managed individually or grouped together You may download a unit s settings or upload them to multiple units 6 6 Logs You may set a report to be generated and emailed to you remotely This allows you to send the daily report log to any email address you wish 6 7 Firmware Firmware updates can become available from time to time These firmware updates have new features and updates You may remotely update your iBoss unit with the latest firmware version without having direct access to it using the management portal Rev 5 0 27 215 May 26 2010 Page 186 of 191 Phant m iBoss Technologies Enterprise 7 SUBSCRIPTION MANAGEMENT The iBoss requires an active subscription to function The unit may already be pre activated when you receive it or you may need to obtain and or activate a subscription key and register the active subscription key with your iBoss To view and manage your subscription information login to the iBoss interface home page and click the Manage Subscription button i j Manage Subscriptio
108. e is supported across all eDirectory versions iBoss eDirectory Configuration eDirectory configuration is performed via the menu option Home gt Setup Network Connection gt eDirectory Settings Global Settings The global settings section contains configuration settings that apply across all registered eDirectory servers The iBoss supports the registration of multiple eDirectory servers with Rev 5 0 27 215 May 26 2010 Page 39 of 191 Phant m iBoss Technologies Enterprise independent settings and allows simultaneous monitoring of all registered servers The global settings are general settings that apply to all servers Enable User Polling This option specifies whether user polling should be used to process user logins from eDirectory With polling the iBoss will check for logins within a specified polling interval If using eDirectory events this option is not required and can be set to No I nitial User Full Sync This option specifies whether the iBoss should fully synchronize users from eDirectory with the iBoss after an iBoss reboot This option is only available if user polling is enabled When the iBoss is restarted all users are disassociated and fall within the default filtering policy With this option iBoss will pull all users from the eDirectory tree after a reboot User Login Polling I nterval This is the interval at which iBoss will check for any new logon events from eDirectory At this interval iBoss
109. e proxy See screenshot below for proxy information Purge URL From Cache This option allows you to purge individual URLs from the Proxy cache Bypass Cache URL List This option allows you to bypass URLs in the proxy Rev 5 0 27 215 May 26 2010 Page 26 of 191 Phant m iBoss Technologies iBoss System Btagmacites WebFilters System Information Logout Active Proxy Connections Total x Client Ip Active URL Connections Proxy Statistics Number Of Cache Clients 0 HTTP Requests Received 1 Avg Requests Min Since Start 0 0 Request Cache Hit Ratio 5 min 0 096 Request Cache Hit Ratio 60 min 0 096 Byte Hit Ratio 5 min 0 0 Byte Hit Ratio 60 mini 0 0 Memory Hit Ratio 5 min 0 0 Memory Hit Ratio 60 min 0 0 Disk Hit Ratio 5 min 0 0 Disk Hit Ratio 60 mini 0 0 Storage Swap Size 0 KB Storage Mem Size 108 KB Mean Object Size 0 00 KB Mean Service Time Http Requests 5 min 0 00000 sec Mean Service Time Http Requests 60 min 0 00000 sec Mean Service Time Cache Misses 5 min 0 00000 sec Mean Service Time Cache Misses 60 min 0 00000 sec Mean Service Time Cache Hits 5 min 0 00000 sec Mean Service Time Cache Hits 60 min 0 00000 sec Cache Cpu Usage 0 00 sec Cache Cpu Usage 5 min avg 0 00 sec Cache Cpu Usage 60 min avg 0 00 sec Max file descriptors 1024 Largest file descriptors in use 42 i Number file descriptors in use 40 Availab
110. e subnets on the local network You can add a top level subnet such as 10 0 0 0 255 0 0 0 if your network includes many smaller subnets and you would like to have the entire subnet on the same default policy In addition you can select to add IP Ranges if you would like to assign a default policy to a specific IP Range When the default policy for a subnet is determined the iBoss will start from the subnet at the top of Internet the list and work its way down The iBoss will always traverse all Controls subnets from top to bottom Any subnet or IP Range toward the bottom of the list will override subnets toward the top of the list and the default policy for subnets lower in the list will override the default f for subnets at the top of the list for matching IPs It is recommended that IP Subnets are used instead of IP ranges If Preferences there is a range of IPs that must have a separate default policy from the top level subnet add the subnet first that contains the IP range then add the IP range within that subnet lower in the list The Bandwidth Accounting option specifies whether the iBoss should track bandwidth statistics for the subnet or IP range If there are overlapping subnets or IP ranges in the list disable the Bandwidth Accounting option for the duplicate subnet so that bandwidth is not accounted for twice which will inflate bandwidth statistics Enter the local subnets below and click the Add button To remov
111. eacesscssessdeidaceaagazad en eadgonsue bud sa ec adn e degen 145 Fig re 88 UVNC Properties us orania Qe deseciesadedunen datesurnetasnatceendaveaiecdeadGctenezasionenaaniautes 146 Figure 89 Video Desktop Monitoring eet eEEEEEENEEE ENEE 147 Figure 90 Live Rc emule 148 Figure 91 gt Report Manager SERES osque stub en odds acu idc uncias Dui UE data sud bd 149 Figure 92 External Report Manager Settings eee epit etre iab taceo etin a Ede R uas 151 Figure 93 Report Manager Database Settings eee secca ii eno R dr epe saab iate tap n essei nba paras 151 Figure 94 Report B ee E 152 Figure 95 Add Report Manager User 1 esee rn petia apri ted sa tescceuneteuneenaceuesssadeds 153 Figure 96 Register RTE 154 Figure 97 Resister an 1Boss DeYv1GB insosn EEeteEeEEegEeEEEEEe 155 Figur RE endi M bus T M E 156 Figure 99 Configure IP Address SeUllgsuuess oss itte im oer tese ttai erede us edu eunt 157 Fig r 100 Subscription PR 158 Figure 101 Report Information Section esssseesserrssesseeseesrrsrrestesstreresrestsersstensensreseesseneeesee 160 Fipure 102 Web Usage SISESIOS eic tari p beide mae R AEE A EEE 161 Figure 103 Web Category Sage oe etes bimba Et done edo hee isisi siie raes 162 Fig re 104 Web Category E 164 Figur 105 Category Time RT 166 Figure 106 Last Visited EREM eenegen deene 167 breue E 169 Fig re
112. eature will only take effect on categories that are currently selected to be blocked in the category block list above Logging Allows you to enable and disable logging of violation attempts for the current set of blocked website categories Log reports may be viewed on the iBoss Reports page The report information includes date time user website address and category of the violation Stealth Mode Allows you to stealthily monitor Internet activity without blocking access to forbidden sites With both Logging and Stealth Mode enabled you can monitor Internet web surfing activity by viewing the log reports on the iBoss Reports page while remaining unnoticed to Internet users on the network Note Websites and online applications will not be blocked while the iBoss is in Stealth Mode Strict SafeSearch Enforcement Allows you to enforce strict safe search on the Google and Yahoo search engines This includes image searching If this option is enabled and the user does not have search engine preferences set to strict safe searching the search will be blocked This allows an extra layer of enforcement to prevent unwanted adult and explicit content from being search on these search engines Rev 5 0 27 215 May 26 2010 Page 62 of 191 Phant m iBoss Technologies Enterprise This setting only applies to Yahoo and Google search engines For Yahoo the search preference for SafeSearch Filter must be set to Filter out adult Web video
113. ectory authentication using the plugin on the server eDirectory Settings This option allows you to setup the iBoss with your eDirectory servers for transparent authentication Clustering This option allows you to setup multiple iBoss devices in a clustered environment to have settings synced automatically Add Additional Routes This option allows you to add additional network routes for the iBoss Bypass IP Ranges This option allows you to bypass IP ranges which you would like to completely bypass the iBoss filtering engine Add Additional Local Subnets This option allows you to add additional local subnets Register Internal Gateways This option allows you to register gateways that are internal to your network on the LAN side of the iBoss Edit Advanced Settings This option allows you to configure the advanced network settings Rev 5 0 27 215 May 26 2010 Page 17 of 191 Phant m iBoss Technologies 3 2 3 1 Configure Internet Connection iBoss Jump To Please Select ge Web Filters Product Support My iBoss Internet Connection Boss e a Basic Configuration Reports Connection Type Static IP Address EI IP Address 192 me 1 10 Subnet Mask 255 255 255 0 Internet Default Gateway 192 168 3 1 a Controls eo Primary DNS 192 168 DN 1 a Secondary DNS D 0 0 0 Preferences Remote Authentication Integration exti authentication system will cause the
114. ed En Red or unchecked indicates access is blocked during the time block specified Select a Category to Schedule Advertisements e A Alert For the Advanced Category Scheduling to function the category to be scheduled must be currently blocked on the Internet Category Blocking setup page Day Monday Tuesday Wednesday Thursday Friday Saturday Sunday b Apply Schedule To Selected Category for CurrentDay Only Above v Filtering Categories Schedule Select All Early Morning 12A 12 30A 1A 1 30A 2A 2 30A 3A 3 30A 4A 4 30A 5A 5 30A 6A 6 30A 7A 7 30A ERE selwe Mid Day 8A 8 30A 9A 9 30A 10A 10 30A 11A 11 30A 12P 12 30P 1P 1 30P 2P 2 30P 3P 3 30P Night ap 4 30P 5P 5 30P 6P 6 30P 7P 7 30P 8P 8 30P 9P 9 30P 10P 10 30P 11P 11 30P Si i e wie ele el 2009 Phantom Technologies LLC All rights reserved All trademarks and registered trademarks on this website are the property of their respective owners Figure 32 Advanced Scheduling Rev 5 0 27 215 May 26 2010 Page 64 of 191 Phant m iBoss Technologies Enterprise You may use advanced scheduling to create custom allow and block times for Filtering Categories Web Programs and the Sleep Schedule You may use different schedules for the different days of the week simply select the day and set the schedule For Filtering Categories you will have to select a Category to Sched
115. edules 5 4 4 1 Deleting Report Schedules a D 5 4 4 2 Editing Report Schedules ess siiin erene rE E S EERE RE P AOE E AETA 5 4 4 3 Report Schedule Processing 4 4 niti ert atea rre Uri lo eie dei b E i RAE SE 5 4 4 4 Report Schedule Types e 5 4 4 5 Creating a Report Schedule 2 bereit RR HERES EUMD HTRO OEEDO OREHODE EEE Einari RSs 5 4 4 6 Report Schedule Space Usage Secton nennen netnetn enne Ee 5 4 5 Automatic Desktop Recording Monitor Control DRMC 5 4 5 1 Installmg VN isto ee tereti ESENE 5 4 5 2 Registering a Computer to DRMC 5 4 5 3 Video Desktop 5 4 5 4 Video Desktop Recordings 5 4 5 5 Recording Thresholds ees i S 5 4 6 Report Manager Setting M 5 4 6 1 Email Server Setting S m 5 4 6 2 Report Maintenance Settings sese 5 4 7 External Report Manager Enterprise Reporter Settings 5 4 7 1 Report Manager Database Settings only in external report manager m 5 4 7 2 Report Users only in external report manager 5 4 7 3 Register Boss Devices only in external report manager 5 4 7 4 Configure Time only in external report manager 5 4 7 5 Network Settings only in external report manager 5 4 7 6 Subscription only in the external report manager 5 4 6 Report Manager System Information eese eene enne ne trennen trennen nenne 537 VIEWING REPORTS cc E
116. eeeressesseesees 107 Figure 64 Identifying a el 109 Pure ER rt BL P 111 Figure G0 teu QE c 113 Figure 67 Importing KEE 114 Figure 68 Advanced E 116 Figure 69 Internet Access Window Login ssssesesessesseserssesssesressrseresressessresreestestesreseeseeneeesee 118 Figure 70 Internet Access Window Session s eesseseessessrssreesesressrseresresstssresteeseesresenserssesrresee 118 Fig re 71 Edit Filtering Sco E c 119 Figure 72 Filtering Group 3bS un e tette Pepe n Db Mete ATE peasoiu DESEN 120 Figut 73 FitmWware Rr D EC S MER 121 Figure 74 Current E 125 Figure 75 Real time MRTG Bandwidth Graph esee 126 Figure 76 Current Top Bandwidth Consumerg nennen 127 Figure 77 Real time Webhit Activity 22i tacita enia rite dein ae ena NEE 127 Figure 78 Real time URL Access ACUVILy aee qoe eret nene enu eta den ede deeg Page da daga uud 129 Fig r 79 URL LOE eem 130 Fig re 80 Site Callous E 131 Figure 81 Generated Te 132 Figure 2 Generate Report FD 134 Figure 83 Report Statistics eeseeeseeeeeseseeestserestsstreresstrstttresstestsrtestessesstettessttstestteseeseeereesee 135 Fig t BO Report Sch dul s iuie tnihi oiii aaiae ainoan Roei 138 Figure 86 Create a Report Eegeregie eege 141 Figure 87 Report Schedule Space USBge do iccccaces
117. eeseessesrressrserssresstseresressessrestessesererreeseese 49 Figure 26 Register Internal Gateways esesseseeseseseeseeserssesresstestsrrssresesreesressesetestenseseeesresseeee 52 Figure 27 Edit Advanced Network Settings eeseeeseseeseeseeerreeresersresrresseseresresseseresrensessresreeseese 54 Figure 28 iBoss Hardware Installation eeseseeseeeeeeseeseeseeeseseresresrrserssreseseresressesersrtensessreeseesee 55 Fig re 29 Home Page M 56 Figure 30 Configure Internet Controls eenegen eege geegent 59 Figure 31 Block Specific Website Categories eeseseeseeereesessessersrerresstesrereresteserrresreseesereseeses 6l Figure 32 Advanced RE 64 Figure 33 Identity Theft Detection East ema dp uud duuqu E E us Uu aus 66 Figure 34 Block Specific Web Programs oie tete orit re EES ERR tO VR pen IL MERI ege 67 Figure 35 Bandwidth Throttling QOS aeseceidisene qus iet etos ea eene P etd i Qin des utin be Ute td oue 70 Figure 30 Block Specific Websites uccisioni a tape ena EEN 73 Figure 37 Custom Blocklist Calesortes iere eee tete t Lh edi ENER 74 Eure S38 Blocklist ee E 75 Figure 39 Allow Specific Websites a coats pi rre oet bass asa epe x dd rn tuU Res 76 Figure 40 Custom Allowlist C ategOries iuie e diee tnis toit ende russe et bna ce tdt esae s DU Eeege 78 Fig re AE Ms di Miro Pe c 79 Figurg 42 Black Specilic e es oic cen aite roble ciui onis ee ei 80 gud ERE Ciclo S CT
118. emicolon between email addresses to add multiple recipients Email CC This allows for an email carbon copy to be sent to another recipient Email BCC This allows for an email blank carbon copy to be sent to another recipient Email Message Body This allows you to customize the body of the email message Auto delete after report is sent If this option is enabled the generated report will automatically be deleted once the report is emailed This can be used to save disk space and to reduce the number of used generated reports 5 4 4 5 3 4 Report Schedule Time This section allows you to configure what time you would like the report schedule to run and the email report sent There are several options for this section You can choose to have the report sent daily at a specified time weekly at a specified time or on a specific day of the month at a specified time Select the appropriate option and configure the time you would like to have this report generated and emailed 5 4 4 5 3 5 Users This section allows you to select which user groups will be included in the report All users inside the selected groups will be included in the generated report The Other group contains miscellaneous traffic that might not have been identified on the network 5 4 4 5 3 6 Create the Report Schedule When you are done configuring the options for the report click on the Create Schedule button on the bottom of the page Thi
119. ent from these users it ignores them and preserves the currently logged in user Values should be specified separated with a comma Default Filtering Policy If the iBoss cannot find a matching iBoss group name to eDirectory group name this specifies the default policy the iBoss should apply to the user Connect Timeout This is the timeout specified in seconds that the iBoss should use when connecting to an eDirectory server If an eDirectory server is down this will prevent the iBoss from waiting too long before trying to connect again Default 20 Monitor Events Specifies whether eDirectory event polling should be used for this server This is recommended as login and logout events will be sent in real time to the iBoss Poll User Logins Specifies whether the iBoss should use the polling method to poll the eDirectory server for login events The settings specified in the global settings apply to this mode This is typically set to No when Monitor Events is set to Yes as the iBoss will receive login logout events in real time Allow Full Sync Specifies whether this server will participate in the full user synchronization triggered when Force Full Sync above is clicked Typically set this to Yes only for the master eDirectory replica as not all servers need to be queried during a full sync User Polling Search Base This is the level in the eDirectory tree the iBoss should use to search for logged in users Whe
120. entry to all filtering groups option before clicking the Add Keyword button The letter G will appear next to the entry which indicates that it is a global entry and applies to all filtering groups When removing a global entry it will remove the entry from all filtering groups Select the Wild Card checkbox if you would like to use wild card matching on the keyword When wild card matching is used the entire URL is searched for the keyword pattern If wild card matching is not used the iBoss will analyze the URL for queries containing the keywords entered Select High Risk if the keyword represents a high risk word Selecting this option allows the keyword to be used in other aspects of the filter such as sending alerts when the keyword term is searched for When you are finished click the Done button Enter Keyword example adult This is the field to add the keyword you would like blocked Once finished click the Add Keyword button Wild Card This is the wild card for any part of the URL to block the keyword High Risk This option alerts the administrator when this keyword is searched for Apply this entry to all filtering groups This option applies this block to all filtering groups You can import a list of keywords to block by clicking Import You may remove keywords by checking the keyword and clicking the Remove button Once finished click the Done button Rev 5 0 27 215 May 26 2010 Page 81
121. ep drill down capability that can identify potential risks as well as help optimize the network The high level of report detail also includes a variety of information that can be summarized for all users in a report or information specific to a particular user This includes bandwidth usage and graphs showing accesses throughout the report period The report manager is separated into two major subsections The first deals with report management scheduling and generation while the other involves the report viewing 5 1 External Enterprise Reporter The External Report Manager or Enterprise Reporter is an appliance that offloads the reporting onto a different server appliance Some of the features discussed below are not in the external report manager 5 1 1 Installing the External iBoss Enterprise Reporter on the network Please setup the network settings for the external iBoss Enterprise Reporter before placing it on the network Please refer to the Network Settings section for the Enterprise Reporter for more information on how to set these settings Once the network settings have been configured the iBoss Enterprise Reporter is ready to be installed on the network The port you will be using is the WAN port located on the back of the iBoss Enterprise Reporter Place the iBoss Enterprise Reporter on the switch just as a computer would be For example add a network cable from your switch to the WAN port of the Enterprise Reporter Do no
122. er from within the iBoss Report Settings will only report Web and Bandwidth Statistics Include Web Stats ves O No Include IP Stats O ves No Include Port Stats O ves No Include Usage Category Stats O ves 9 No Include Application Stats ves No Figure 83 Report Statistics There are a variety of statistics that can be included The more options that are selected the longer it will take to generate the report In addition including more options will consume more of the available disk storage for the reports Below is a description of each of the options within the statistics section Include Web Stats When this option is enabled the report will include web related statistics such as top visited domains top blocked domain visited URLs blocked categories as well other web Rev 5 0 27 215 May 26 2010 Page 135 of 191 Phant m iBoss Technologies Enterprise browsing related statistics Include IP Stats More Logging When this option is enabled the report will include statistics related to IP Address accesses This includes top visited IP Addresses top Blocked IP Addresses as well as other statistics related to IP Address detail Include Port Stats More Logging When this option is enabled the report will include statistics related to port accesses This includes TCP and UDP accesses including top visited ports top blocked ports port usage by user as well as upstream a
123. er is logged in The company name in text can be 50 characters and the length for the URL can be 256 characters If you are using an image of your company logo you can enter in the URL of where the image is hosted The image must be in a web viewable format ex gif or jpg and the width of 300 pixels and height of 70 pixels If you are using the company name text please select Text and enter in the company name If you are using an image for the company logo please select I mage and enter in the full URL of the image Note If the image that you use is not at the size of 300 x 70 it will be stretched to this size User Login Page This allows you to create a custom User Login page or choose to use the default internal user login page If you select the redirect option you must enter a redirect URL that points to the externally hosted user login page This setting is applied based on the user s IP subnet default group Typically the default user login page group is group 1 If you ve defined a different default login page group to an IP subnet under Home gt Setup Network Connection gt Local Subnets select the defaut group for that subnet on the tabs above before modifying this setting You may choose either Internal or Redirect Note This page must submit the same login parameters to the same form action as the default iBoss login page In addition if the login page is located outside of the local network you must bypass the domain
124. erall bandwidth consumers Note You may click on the More button if available for more results Total Packet Bytes Count 800 am D i Maria Martini 750 78MB 782 18K 600 Se D 2 chris Park 588 8 MB 720 54K 400 am D3 user 77 54MB 91 48K 200 om D gt 4 Peters compute 55 32MB 889K E D ei H i gt s 44 78 MB 109 439K Report Manager Figure 113 Overview of Total Bandwidth Usage Username Bytes If you click on the More button in any of these sections you will get a full list of the users that can be sorted by a variety of criteria 5 5 5 2 1 Bandwidth Usage Detail By clicking on any of the more buttons on this page you will be taken to a full detail page for bandwidth usage Rev 5 0 27 215 May 26 2010 Page 178 of 191 Phant m iBoss anten Enterprise IiBoss Current Generated Report Video System Activity Reports Schedules Desktop Settings Information Generated Report Jump to Report Daily report 01 06 2009 v Report Name Daily report Ex Date 01 06 2009 01 07 2009 dee Etgen TA eport Show Report For Al Users in This Report el Web x Note You may mouse over the Blue text in the User column for more information about the entry You may click the title of the column to sort the results You may select the Protocol to change the view Items 1 18 Items Per Page 5 Ei Prev Next Upstream Downstream Total Upstream Downstream Block User Total Bytes V Bytes Bytes Pack
125. es Enterprise Expand under Security Settings gt Local Policies gt Audit Policy Double click the first option Audit account logon events and make sure the checkbox for Define these policy settings and Success is checked and click OK BER File Action View Help e mim iS G3 i9 Security Settings E E Account Policies fas Audit account logon events Success Egg Local Policies RE Audit account management Not Defined 3 Audit Policy S Audit directory service access Not Defined E e User Rights Assignment e RURSUS SES H a Security Options E Event Log E Restricted Groups System Services fas Audit object access Not Defined Ri Audit policy change Not Defined RS audit privilege use Not Defined i Audit process tracking Not Defined F Registry CB File System RE audit system events Audit logon events Properties 2 xi Security Policy Setting Y Wireless Network IEEE 802 11 P H E Public Key Policies i Software Restriction Policies 3 IP Security Policies on Active Direc Audit these attempts IV Success Failure Cancel Apply Figure 20 Audit Logon Events Next double click on Audit logon events LA option down and make sure the checkbox for Define these policy settings and Success is checked and click OK Rev 5 0 27 215 May 26 2010 Page 37 of 191 Phant m iBoss Technologies En 3 2 3 5 eDirectory Settings iBoss Web Filters Product Suppo
126. ets Packets Packets Count Maria Martini 750 78 MB 13 28 MB 737 5 MB 782178 265670 516508 Chris Park 588 8 MB 15 39 MB 573 41 MB 720538 306781 413757 user 77 54 MB 1 75 MB 75 79 MB 91478 38685 52793 0 Peters compute 55 32 MB 5 1 MB 50 22 MB 88899 25017 63882 0 Report Manager 44 78 MB 2 81 MB 41 97 MB 109432 33102 76330 0 00 19 d1 02 5d 27 85 MB 1 07 MB 26 79 MB 30752 10933 19819 0 00 11 5b 58 a1 27 55 MB 4 38 MB 23 17 MB 49113 22725 26388 D 00 0e 7b 2a 1b 22 58 MB 2 99 MB 19 59 MB 38658 12397 26261 Test Laptop 8 59 MB 515 26 KB 8 07 MB 14109 6204 7905 0 00 11 5b 57 5c 4 6 MB 1 8 MB 2 8 MB 38088 24731 13357 0 00 13 a9 fe 03 451 08 KB 82 38 KB 368 7 KB 1228 513 515 0 Premier File S 91 26 KB 91 26 KB 0B 916 916 00 22 b0 b2 f3 71 26 KB 53 53 KB 7 73 KB 271 207 54 0 00 13 20 c5 0e 29 29 KB 24 58 KB 4 71 KB 71 41 30 0 00 b0 d0 91 21 7 69 KB 7 12 KB 576 B 46 45 L 0 00 10 83 28 30 952 B 876 B 76B 7 6 1 0 00 0c 29 48 98 742 B 742 B 0B 7 7 0 0 00 30 48 d4 c2 540 B 540 B DB 9 9 D 0 Figure 114 Bandwidth Usage Detail Rev 5 0 27 215 May 26 2010 Page 179 of 191 Phant m iBoss Technologies Enterprise The bandwidth usage detail page contains information on all users and bandwidth information The page also allows you to sort by Total Bytes Upstream Bytes Downstream Bytes Total Packets Upstream Packets Downstream Packets and Block count Rev 5 0 27 215 May 26 2010 Page 180 of 191
127. ettings Enable No Gateway Sync Interval 900 Seconds Enter Internal Gateway Name Description Gateway Type Cisco M IP Address B Port Protocol Telnet v Username Password Connect Timeout 30 Seconds Internal Gateways No Entries 09 Phantom Techno ed All trademarks and re c de o e the y of their respective owners Figure 26 Register Internal Gateways Rev 5 0 27 215 May 26 2010 Page 52 of 191 Phant m iBoss Technologies Enterprise This page allows you to register gateways that are internal to your network on the LAN side of the iBoss Typically the iBoss is placed between a Layer 2 switch and the outter network Gateway Firewall If your network has any additional internal non NAT gateways that are used to route internal local subnets you can register those gateways here The iBoss will automatically integrate with the internal gateways so that you may identify and apply filtering rules to computers behind the gateway The global settings apply to all internal gateways added You must enable internal gateway integration in the global settings below for any of the settings on this page to take effect Enter the internal gateway below and click the Add button To remove a gateway from the list select the gateway to remove and click the Remove button located at the bottom of the page You can add up to 1000 internal gateways Click the Done button when you a
128. fault sn Username Search Attribute default cn Group Search Attribute default groupMembership Group Attribute Value Key cr O default cn Location Attribute default cn Ignore DN Patterns L_ ea Default Filtering Policy 1 Default v Connect Timeout 20 Seconds Monitor Events YES v Poll User Logins NO e Allow Full Sync YES User Polling Search Base Use SSL No B SSL CERTIFICATE PEM d EDirectory Servers Name etest Host 192 168 2 71 Port 389 Status Connecting to server Default Group 1 SSL Enabled No Connect Retries 3 Search Base poo io Monitor Events Yes Allow Full Sync No Total Events 0 Logins 0 Logouts 0 Remove pm Figure 21 eDirectory Settings Rev 5 0 27 215 May 26 2010 Page 38 of 191 Phant m iBoss Technologies Enterprise 3 2 3 6 iBoss eDirectory Transparent Integration Overview The iBoss Enterprise integrates natively with Novell eDirectory servers to provide seamless transparent authentication of users on the network Integration with eDirectory allows administrators to manage policies based on a user s eDirectory group membership In addition integration unifies web filtering administration with an existing Novell eDirectory infrastructure Key Features Live Real Time eDirectory event monitoring eDirectory user polling support Multiple simultaneous eDirectory monitoring support Compatible with Suse and Netware based eDirectory platform
129. ferences EDirectory Settings Gn Log Out Clustering Add Additional Routes Bypass Ip Ranges Add Local Subnets Register Internal Gateways Edit Advanced Settings 009 Phantom Technologies LLC All rights reserved All trademarks and re red trademarks on this website are the property of their respective owmers Figure 3 Setup Network Connection The Setup Network Connection menu lets you choose options for configuring the current iBoss connection settings There are elevent options to choose from Configure Internet Connection LDAP Settings Active Directory amp Proxy Settings Active Directory Plugin eDirectory Settings Clustering Add Additional Routes Bypass IP Ranges Add Local Subnets Register Internal Gateways and Edit Advanced Settings Rev 5 0 27 215 May 26 2010 Page 16 of 191 Phant m iBoss Technologies Enterprise Configure I nternet Connection This option allows you to configure the Internet WAN connection LDAP Settings This option allows you to setup your LDAP Active Directory server so the iBoss can authenticate users from it Active Directory amp Proxy Settings This option allows you to setup the iBoss in a Proxy mode This will allow automatic Active Directory authentication using NTLM Active Directory Plugin This option allows you to setup the iBoss to work with your Active Directory Server using the iBoss Active Directory Plugin This will allow automatic Active Dir
130. for No Filtering Bypass Filtering Otherwise please use a filtering group from 1 to 25 The maximum number of users per import is 1000 If you have more than 1000 users break the list into sections of 1000 and import them separately Each line should not exceed 300 characters 09 Phantom Technologies LLC All rights reserved All trademarks and regi i trademarks on this website are the property of their respective owners Figure 67 Importing Users Rev 5 0 27 215 May 26 2010 Page 114 of 191 Phant m iBoss Technologies Enterprise Please paste user information one user per line comma delimited The format of should look like the following Username Password First Name Last Name Enable Report Access Filtering Group Number Note Notice that each line should be comma delimited Each filtering group is associated with a number You can view them here Filtering Groups You may use N for No Filtering Bypass Filtering Otherwise please use a filtering group The maximum number of users per import is 1000 If you have more than 1000 users break the list into sections of 1000 and import them separately Each line should not exceed 300 characters Once you have finished click the Import Now button Rev 5 0 27 215 May 26 2010 Page 115 of 191 Phant m iBoss Technologies En 4 4 2 4 Advanced User Settings User Session Timeout Global Figure 68 Advanced User Settings This page
131. ful 10 Seconds is the default Max Retry Queue Size This is the max number of queue spots for Ldap authentication retries LDAP Server Info This section allows you to individually enter each LDAP server s information You may add multiple LDAP servers here Name This is the name of the server to assist in identification Description This option allows you to set a description for the server that is being added Server Authentication Method This option allows you to configure the server authentication method required by your LDAP server Simple is recommended Server Host I p This is the domain or IP address of the LDAP server Example iphantom com or 10 0 0 1 Port This allows you to change the port number that is used to communicate to your LDAP server Port 389 is most common and is recommended Admin User This is the Username of an administrative or root user which has administrative rights to your LDAP server The user must be able to perform searches on your LDAP server This user is used to look up user logins Example administrator iphantom com Admin Password This is the password to your LDAP administrator user above Some special characters are not accepted Search Base This is the base by which searches for users will be made If you have a large directory you may choose a base other than the top as long as all users that need to be authenticated are under this base It is recommended that you set this to
132. gies iBoss O M Current View Report Video s System Activity Reports Schedules Desktop Settings Info wv a Create Report Schedules Report d Schedule Create Date Next Processing Time Status Edit Remove Report Schedule Space Usage D of Report Schedules 0 D Max of Report Schedules 10 Schedules All rights r re the pro y of their respective owners All trade Figure 84 Report Schedules Rev 5 0 27 215 May 26 2010 Page 138 of 191 Phant m iBoss Technologies Enterprise 5 4 4 1 Deleting Report Schedules You can select and delete any report schedule on this page by clicking on the Remove button next to the report schedule or selecting the checkboxes of the report schedules you wish to delete and clicking on the Delete Selected button This will terminate the schedule immediately 5 4 4 2 Editing Report Schedules To edit a report schedule click on the edit button next to the report schedule you wish to edit This will take you to the report schedule editing screen This screen is similar to adding a report schedule which is detailed in the next sections 5 4 4 3 Report Schedule Processing Report schedules are processed when the Next Processing Time has been reached which is detailed next to the report schedule The scheduler will automatically adjust the next processing time automatically If there are multiple schedules due to be processed
133. gin This allows you to share a single computer with multiple users If the computer is set to a default filtering group user login does not apply You may identify up to 120 individual user logins To create a new user click the Add New User button below These users will not have access to the iBoss settings and cannot log onto the iBoss to change settings unless configured to allow access Rev 5 0 27 215 May 26 2010 Page 111 of 191 Phant m iBoss Technologies En 4 4 2 1 Adding a User iBoss Web Filters Add User Please enter the following information to create a new user Username Password First Name Last Name Note Apply Filtering Yes Use 1 Default Rules e Authenticate via LDAP Oves 9 No iBoss Filter Delegated Admin Settings Can Manage Filter Settings Disabled Enabled Filter Settings Group Access Default Group 2 Group 3 Group 4 Group 5 Group 6 Group 7 Group 8 Group 9 Group 10 X oS Filter Settings Permissions Full Administrator gt Block Web Categories Block Programs Protocols Block Websites d Custom Block Categories Allow Websites Custom Allow Categories E Block Keywords Block Ports Block File Extensions se Default Management Group Default iBoss Report Settings Can Access Reports Disabled Enabled Can Generate Reports Disabled Enabled Can Delete Reports D
134. gs and the time you would like to have the daily report schedule processed Daily report email schedules will contain information for the current day up to the time selected 5 4 4 5 2 1 Report Schedule Email Settings This section allows you to enter the details of where you would like to have the email sent to when it is ready You can include a custom message in the email message body to create specialized reports 5 4 4 5 2 1 1 Email Message Information Enter the email information including the recipient sender cc bcc subject and message body This will send the email to another person which looks like it comes from you with a personalized message 5 4 4 5 2 1 2 Report Contact Information This information shows up on the cover page of the Emailed PDF Report Enter the Name Company Name Address City State Zip Email Phone and Fax 5 4 4 5 2 1 3 Report Custom Introduction and Conclusion This information shows up on the second page for the introduction and the last page which is the conclusion Enter a custom introduction and a custom conclusion 5 4 4 5 2 1 4 Additional Information This information shows who the report was prepared by add a logo and who it was prepared for This allows you to customize the report to show that you were the one who prepared it and who it was prepared for The Logo URL allows you to add a link to an image gif or jpg to the cover page of the iBoss Report 5 4 4 5 2 1 5 Report Type T
135. he default user is admin which has no password by default It is recommended to click Edit and set a password for the Administrator To add a user click Add Report User Rev 5 0 27 215 May 26 2010 Page 152 of 191 Phant m iBoss Technologies Enterprise 5 4 7 2 1 Add Report User IBOSS wm d Current Generated Report Video System Activity Reports Schedules Desktop Settings Information General Register iBoss Devices lime Network Settings Subscription Settings Report Manager Users Username First Name Last Name Password Can Generate Reports O Disabled Enabled Can Delete Reports O Disabled 9 Enabled Can Access Report Settings Disabled Enabled Can Access Report System Info O Disabled Enabled Can Access Report Current Activity O Disabled 9 Enabled Can Access Report Schedules O Disabled 9 Enabled Can Access Live Desktop O Disabled 9 Enabled their respective owners Figure 94 Add Report Manager User To add a user enter the Username First Name Last Name and Password Then select which sections of the report the user can access The options to choose from are Can Generate Reports Can Delete Reports Can Access Report Settings Can Access Report System Info Can Access Report Current Activity Can Access Report Schedules and Can Access Live Desktop Rev 5 0 27 215 May 26 2010 Page 153 of 191 Phant m iBoss Technologies En After you are done setting
136. he reporter under settings will be used for alerts related to this group Use a semicolon between email addresses to specify more than one email address Send Alert When User Enters Group This setting will cause the iBoss to send an email alert whenever a user enters into this filtering group Alerts will only be sent when a user logs in manually with override and will not be sent when a user is authenticated transparently Send Alert When User Leaves Group This setting will cause the iBoss to send an email alert whenever a user exits from this filtering group Alerts will only be sent when a user logs in manually with override and will not be sent when a user is authenticated transparently Video Desktop Recording This setting enables a desktop recording to occur when the above threshold criteria is reached In addition you can specify the duration of the desktop recording The computer must be registered with the iBoss and have VNC enabled for this settings to have effect In addition the computer must have a compatible VNC application installed and running This is where you set the option on how long to record the video for Include The Following Categories This is the categories you choose to include in the trigger thresholds Rev 5 0 27 215 May 26 2010 Page 91 of 191 Phant m iBoss Technologies En 4 3 Edit My Preferences IBoss Jump To Please Select X ge Web Filters Product Support M
137. here is one daily report generated per day that includes statistics for usage on that day User generated reports are reports that are created by the user These reports can contain custom date ranges include particular groups and include only certain statistics among other things 5 4 3 2 Deleting Reports Reports are deleted as space becomes necessary but you can select and delete any report on this page by clicking on the Delete button next to the report or selecting the checkboxes of the reports you wish to delete and clicking on the Delete Selected button Please note that deleting reports may take a while to process as the iBoss will clean out all related data pertaining to the report 5 4 3 3 Exporting PDF Reports To export a report click on the export button next to the report This will generate a PDF Report which you can select which options to include in the report 5 4 3 4 Generating a Report To generate a report click on the Generate New Report button toward the bottom of the list of generated reports This will lead to a page that presents the options available when creating a report There are many options available that can be configured when generating a report such as the included group users the types of statistics you would like to include in the report as well as the date range for the report Rev 5 0 27 215 May 26 2010 Page 133 of 191 Phant m iBoss Technologies iBoss Current System
138. his allows you to choose which type of report to send There are four options to choose from Executive I T Full and Custom The Executive report has the least information in the report but is used for a quick overview The I T Report show more information such as P statistics Port statistics Application Statistics and Bandwidth statistics The Full Report shows all of the contained data The Custom Report allows you to choose which you may choose which options to include in the report Rev 5 0 27 215 May 26 2010 Page 142 of 191 Phant m iBoss Technologies Enterprise 5 4 4 5 3 Custom Generated Report Schedule Settings The custom report schedule settings involve configuring extra parameters in addition to those for the daily report schedule settings The custom report schedule will generate a new report on the schedule unlike the daily report email schedule 5 4 4 5 3 1 General Settings The general information section allows you enter the following information Schedule Name This is the name you would like to give this schedule Description This allows for a short description of this schedule Schedule Type This indicates the type of report schedule you would like to create Report schedule types are described above Daily report schedules allow you to email the auto generated reports to specified email addresses while custom report schedules allow for the generation of custom reports on a schedule 5
139. hresholds in disabled for all computers in the group Internet Controls Video desktop recording feature n an add on feature and m aaibie cn A models net be Real time User Activity Monitoring Preferon This setting enables tngger based real time montonng for the group If this setting is daabled for the group any additional options for thes group have no effect Daabled Enabled Trigger Level And Interval Trigger when 2 events occur within 2meues Real time Email Alerts This setting wil cause the Bose to send and email alert when the above threshold cntena is reached The alert wit occur when the trigger is reached to alow you to respond when certan actretty is occunng Group Email Contact Thus is the emad where real time alerts wil be went for activity related to the currently selected group H left blank the ema address speohied in the reporter under settings wil be used for alerts related to thi group Use a semcolon between email addresses to speaty more than one emal address Send Alert When User Enters Group This setting will cause the Boss to send an emal alert whenever a user enters into this fitering group Alerts will only be sent when a user logs in manually with overnde and will not be sent when a user is authenticated transparently Disada Enabled Send Alert When User Leaves Group This setting will cause the Boss
140. ies to iBoss devices using a local report manager For users with the External Report Manager you will need to setup these users in the Report Manager settings Please refer to the Report Manager section for more information Filtering Settings Group Access Use this option to select which groups the user will have rights to change settings for Filtering Settings Permissions Use these options to select which options can be changed for the users Default Management Group This is the default management group that the user is administering iBoss Report Settings Choose which options to allow the delegated admin to have access to in the iBoss reports Rev 5 0 27 215 May 26 2010 Page 113 of 191 Phant m iBoss Technologies Enterprise 4 4 2 3 Importing Users iBoss WebFilters User Import Please paste user information one user per line comma delimited The format of should look like the following Username Password First Name Last Name Enable Report Access Filtering Group Number Username Max 64 chars Password Max 128 chars First Name Max 32 chars x Name Max 32 chars Report Access O No 1 Yes ess Group Number chris 12345 Chris Park ir4 john password John Doe 0 N gem no Filtering mark abcde Mark Smith 0 3 Note Notice that each line should be comma delimited Each filtering group is associated with a number You can view them here Filtering Groups You may use N
141. iewer Request Enable Alpha Blending Monitor Blanking Capture Alpha Blending DisableTraylcon Require MS Logon User Pass Domain File Transfer Forbid the user to close down Wirt Log debug infos to the WinVNC log file v Enable v User impersonation for Service only DSM Plugin Default Server Screen Scale 1 1 2 Figure 87 UVNC Properties 5 4 5 2 Registering a Computer to DRMC To register a computer to the DRMC feature you will need to identify the computer through the iBoss Please refer to the Identifying Computers section for more information There will be 3 additional settings that are present when identifying computers Enable Disable VNC integration VNC password and VNC port Enter these settings for the computer that you are identifying Once you have identified this computer and enabled these settings the computer will show up under the Video Desktop section of the reports Rev 5 0 27 215 May 26 2010 Page 146 of 191 Phant m iBoss Technologies En 5 4 5 3 Video Desktop iBoss 1550 Technologies Current Generated Report Video H System Activity Reports Schedules Desktop Settings Information Video Desktop Monitoring Video Desktop View Control Dimensions Native E Computer Name Record Control View O Mimis Computer ax Record O Steves Computer E Oo View Only Video Desktop Rec
142. ified as soon as they access the iBoss through the proxy To attempt to auto identify unknown computers click on the Auto Identify button below Figure 15 Automatic Identify of Unknown Computers Rev 5 0 27 215 May 26 2010 Page 32 of 191 Phant m Technologies iBoss En 3 2 3 4 Active Directory Plugin iBoss Web Filters Internet Controls Preferences Active Directory Plugin Please Select ge My iBoss Jump To Product Support iBoss Enterprise This page allows you to configure the iBoss to work with the iBoss Active Directory plugin The iBoss Active Directory plugin is a service you install on your Active Directory server which communicates user login information with the iBoss The Active Directory plugin is one of two methods to integrate the iBoss with your Active Directory domain You can alternatively use the settings in the Active Directory amp Proxy Settings page to use logon and logoff scripts to perform Active Directory user authentication When using the alternative technique install of the Active Directory plugin is not required Using the Active Directory plugin has advantages to using logon and logoff scripts as it allows multiple distinct Active Directory domains to report user logon activity to the iBoss When using logon and logoff scripts the iBoss can only be joined to one domain In addition the plugin offloads authentication informati
143. ill always traverse all subnets from top to bottom Any subnet or IP Range toward the bottom of the list will override subnets toward the top of the list and the default policy for subnets lower in the list will override the default for subnets at the top of the list for matching IPs It is recommended that IP Subnets are used instead of IP ranges If there is a range of IPs that must have a separate default policy from the top level subnet add the subnet first that contains the IP range then add the IP range within that subnet lower in the list The Bandwidth Accounting option specifies whether the iBoss should track bandwidth statistics for the subnet or IP range If there are overlapping subnets or IP ranges in the list disable the Bandwidth Accounting option for the duplicate subnet so that bandwidth is not accounted for twice which will inflate bandwidth statistics Enter the local subnets and click the Add button To remove a subnet from the list select the subnet to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Filtering Method Option The iBoss has the ability to filter a subnet based on a variety of methods I p Address This option indicates that Ip Addresses should be used to apply a filtering policies to traffic originating on this subnet With this option you can apply policies to individual Ip Addresses but not directly to a computer based on its
144. ill show the logo of Google and the term that was used to search with 05 26 10 03 30 PM chrislaptop safebrowsing cache google co 10 128 30 5 Search Engin Allowed a m 3 news google com news 05 26 10 03 30 PM chrislaptop tbn Ds8 10 128 30 5 Sports Allowed 05 26 10 03 30 PM chrislaptop clients1 google com generate 10 128 30 5 Search Engin Allowed www g i 7v 05 26 10 03 30 PM chrislaptop m SES 10 128 30 5 Search Engin Allowed 05 26 10 03 30 PM chrislaptop suggestqueries google com co 10 128 30 5 Search Engin Allowed 05 26 10 03 30 PM Search E Allowed chrislaptop www google com search q web fi 10 128 30 5 Google Google search web filters 05 26 10 03 30 PM 05 26 10 03 30 PM 05 26 10 03 30 PM chrislaptop chrislaptop chrislaptop suggestqueries google com co 10 128 30 5 safebrowsing cache google co 10 128 30 5 safebrowsing cache google co 10 128 30 5 Search Engin Search Engin Search Engin 05 26 10 09 24 AM 05 26 10 09 23 AM It andomedia com It guid c3F 10 128 30 5 It andomedia com It guid c3F 10 128 30 5 chrislaptop chrislaptop Figure 80 Site Callouts 5 4 3 View Reports Section This section allows you to view the generated reports that exist within the report manager You can generate and delete reports within this section In addition this is where you access individual reports for viewing The generated reports page contains a breakdown of the auto generate
145. in order for users to access the page Custom Login Message This allows you to add a custom login message This will be displayed on the user login page before they have logged in You may type in 300 characters for the custom message Mask Login iBoss Logos Global This allows you to mask the iBoss logos on the login pages This hides which filtering device you are using on your network Custom Successful Login Message This allows you to add a custom successful login message after a user has logged in This will be displayed on the user login page after they have successfully logged in for the first time You may type in 300 characters for the custom message Custom User Homepage This allows you to add a homepage that the users are directed to after logging in User Session Timeout This allows you to change how long it will take before a user is automatically logged out if the iBoss does not hear from it being logged in This is in seconds and if you are having issues with it logging out you may set this to a higher number in seconds or set it to 0 to disable the timeout Rev 5 0 27 215 May 26 2010 Page 117 of 191 Phant m iBoss Technologies Enterprise 4 4 2 5 User Internet Access Window Internet Access Window T auae Server Powered By Figure 69 Internet Access Window Login Internet Access Window You must keep this window open to remain logged in Do not forget to logout once you are finished
146. information pertaining to a specific port The page also allows you to view specific details about the port such as total bandwidth through the port TCP traffic or UDP traffic To change to a particular protocol select the protocol TCP UDP or All from the drop down list labeled Protocol near the top All information on the page will adjust to reflect only the selected protocol This page also contains the bandwidth activity throughout the report period for this particular port You can use this to determine when and how the particular port is being utilized Toward the bottom a list of users for the port is listed sorted from highest use to lowest This allows you to determine which user is utilizing the port the most You can get a full list of these users by clicking on the More button 5 5 4 IP Statistics The IP Address statistic section provides information regarding IP Address destination usage from your network In this section you can determine how your Internet traffic is utilizing different IP Address destinations in order to identity potential problems and optimize the network Rev 5 0 27 215 May 26 2010 Page 172 of 191 Phant m Technologies iBoss Current Generated yetom Activity Reports chodu Information IP Address Statistics Report Nete You may ze the Protocol to change the view Protocol a a Bandwidth Activity Below is a report of the bandwidth activity tor report Daily
147. intenance is enabled while maintenance is taking place Email Reports if deleted for space This option allows you to have reports emailed if they need to be deleted for space Email To If the above option is yes this is the email address where you would like the report sent to Shrink Database By X When full This option allows you to configure the iBoss to shrink the database by a certain percentage once the maximum has been reached Rev 5 0 27 215 May 26 2010 Page 150 of 191 Phant m iBoss Technologies Enterprise 5 4 7 External Report Manager Enterprise Reporter Settings Report Users Register iBoss Devices Time Network Settings Subscription Figure 91 External Report Manager Settings These settings are only in the External iBoss Enterprise Reporter 5 4 7 1 Report Manager Database Settings only in external report manager Report Manager Database Settings Report Database Password Ir Pudsus Url https pudsus1 myiboss Browse Time Sensitivity 180 Remote Diagnostics G Enable ODisable Figure 92 Report Manager Database Settings These settings are only in the External iBoss Enterprise Reporter This section allows you to configure the Enterprise Reporter Database Settings for the iBoss to report to Report Database Password The default Password is ibossdb This can be left by default as the Enterprise Reporter will only allow connections from registered iBoss units h
148. ion for the remaining fields like username and password for your active directory etc Please see the examples and help link for further details Enable Active Directory amp Proxy Support This option allows you to enable or disable Active Directory amp Proxy Support To use the iBoss as a proxy filter or NTLM transparent authentication with Active Directory you will need to enable this option NTLM Authentication Port This option allows you to configure the NTLM Port that the iBoss uses to authenticate users Proxy Port This option allows you to configure the port number to use as a proxy port for the users browser settings Filtering Method The iBoss can be configured in Proxy Mode or Transparent Auto Login Filtering Mode In Proxy Mode the clients browsers must be configured to use the iBoss as a Proxy This mode is useful if you do not intend to use the iBoss inline on your network In Transparent Auto Login Filtering Mode the iBoss performs filtering transparently This is the default operation of the iBoss However when this mode is enabled and coupled with NTLM the iBoss will automatically authenticate users via Active Directory See Help for the differences between Ip Mode and Dns Mode his option allows you to change the filtering method The options are Proxy Mode Transparent Auto Login Dns Mode Transparent Auto Login I p Mode Proxy Only No Filtering Rev 5 0 27 215 May 26 2010 Page 24 of 191 Phan
149. is subsection contain the top ports used The port usage is broken into three sections Top Ports Used which includes both upstream and downstream usage Top Incoming Ports Used which includes downstream port usage and Top Outgoing Ports Used which includes upstream port usage You can mouse over a variety of items on this page like the ports themselves to get more detail on the port Top Ports Used Below is a report of the Top Ports Used for report Daily Report Note You may click the Port if available for Port Detail statistics You may click on the More button if available for more results Port Total Packet Block Bytes Count Count 5 000 000 4 500 000 Pi 119 478GB 5331798 0 4 000 000 3 500 000 3 000 000 D 2 80 74 53 MB 95905 4 Lb 2 500 000 2 000 000 D 3 un 33 17MB 44041 gA 1 500 000 1 000 000 g D 4 995 14 22MB 17842 500 000 E D s 443 9 64 MB 21935 0 119 8 110 995 443 KR Figure 107 Top Used Ports If you click on the More button in any of these sections you will get a full list of ports which can be sorted by a variety of criteria 5 5 3 2 1 Port Detail By clicking on any of the listed ports on this page you will be taken to a full detail page for that port Rev 5 0 27 215 May 26 2010 Page 170 of 191 Phant m iBoss Technologies iBoss Current Report System Activity Schedules Settings Information Logout Jump to Report Generated Report D
150. isabled Enabled Can Access Report Settings Disabled Enabled Can Access Report System Info Disabled Enabled Can Access Report Current Activity 9 Disabled Enabled Can Access Report Schedules Disabled Enabled Can Access Live Desktop Disabled Enabled Daily Time Limits Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited Rev 5 0 27 215 May 26 2010 Page 112 of 191 Phant m iBoss Technologies Enterprise Figure 66 Adding a User To identify a user you may enter a Username Password First Name and Last Name You may either set the Apply Filtering to Yes Use Group 1 Rules using one of the filtering groups or No Bypass Filtering Rules for the user you are identifying You can authenticate the user via LDAP to use the users password within LDAP Daily Time Limits This will allow you to set daily time limits for each day of the week for a user You can set a time between 15 minutes to 23 hours that a user can be logged in from throughout the day This means that when a user has the allocated time throughout the day to use the time limit When finished click the Save button If you want to cancel your changes click the Cancel button 4 4 2 2 Delegated Admins When adding a user to the iBoss you will also have options to give them access to filtering settings and report settings The default name for the iBoss reports is Admin This only appl
151. iscsessssssssesscenssscsassccssessoussoussaessusesueasoascoes soasseseuessessdenseeusebcoasosessous a OSR ios ssi ssie ossis 11 2 1 Boss ENTERPRISE MODEL SPCIEIC ATIONS 11 2 2 FRONT PANEL amp BACK PANELS ebe eteg eren SEENEN EE 11 2 2 1 BihernebPOFiss Eeer lI 2 2 2 EE E 12 2 2 2 1 Console Port E 12 3 GETTING STARTED iscsssessscssesssevssessensscecassnsescceasscassententsousssuesesssensesessvasssassenscnsesesiecssocsesessoussebssbssesasessensasese 13 3 1 OPERATION MODE OVERVIEW cosciensa en teet tense aie e aeaeaie tiks aeiia 13 3 2 Boss NETWORK SETTINGS CONPIOGURATION 13 3 2 1 Configuring Network Settings via Serial Console eese entren 14 3 2 2 Configuring Network Settings via the Network 14 3 2 2 1 Configuring Network Settings via Boss User Interface 14 3 2 3 Setup Network Conn ctioft cis Wiis stench rie eese ege Dye pu Deua un dee 3 2 3 1 Configure Internet COnnectiori dnte etia iais pui eti eae iari aiin inaia 3 2 3 2 PEU DC saves 3 2 3 3 Active Directory amp Proxy Settings 3 2 3 4 Active Directory Plugin iuniore reed nir rei Dire b i er eei bess 3 2 3 5 NNERENEEN EES EEN 3 2 3 6 iBoss eDirectory Transparent Integration GETTING STAR TED ioeie iia 39 OVERVIEW 39 BOSS EDIRECTORY CONFIGURATION siti e reet rr te e ti ber pe
152. jog format Report Type Y H i D T a sch 4 D Lk D 9 Executive Report LT Report Full Report Custom Report Current PDF Email Report Recipients Note These are the current POF Emad Report Reapients These are the only reapients that will rec eve the POF reports H you have entered infcemabon above and do not see d the table below you must frst enter the eiformatien and cick the Add Email Reopeent button to tave the recpient settings Figure 82 Generate Report Rev 5 0 27 215 May 26 2010 Page 134 of 191 Phant m iBoss Technologies Enterprise 5 4 3 4 1 General Report Settings This section contains the general settings for the report to be generated Below is a description of the options Report Name This is the friendly name for the report Description This allows you to enter a description for the report Start Date This is the date from which to start including data for this report All report statistics within this report will be based on this start date End Date This is the end date which you wish to stop including data for the report The end date is not included in the statistics for this report All data up to this end date is included The end date must be after the start date 5 4 3 4 2 Statistics This section allows you to control what type of statistics you would like to include in the report Note Selecting More Performance or External Report Manag
153. last visited sites for report Daily Report Note You may click the IP address if available for IP statistics You may click the More button for more entries You may mouse over the Blue text in the Description and User column for more information about the entry Date amp Time User URL IP Address Description Action 05 15 08 06 03 PM 00 03 25 21 a1 pop gmail com Webmail Allowed 05 15 08 06 02 PM PT PCTEST 0001liveupdate symantecliveupdate Allowed 05 15 08 06 02 PM PT PCTEST 0001liveupdate symantecliveupdate 96 6 122 145 Allowed 05 15 08 06 02 PM PT PCTEST 0001liveupdate symantecliveupdate 96 6 122 145 Allowed 05 15 08 06 02 PM PT PCTEST 0001liveupdate symantecliveupdate 96 6 122 145 Allowed 05 15 08 06 02 PM PT PCTEST 0001liveupdate symantecliveupdate 96 6 122 145 Allowed 05 15 08 06 02 PM PT PCTEST 0001liveupdate symantecliveupdate 96 6 122 145 Allowed 05 15 08 06 02 PM PT PCTEST 0001www symantec com Allowed 05 15 08 05 52 PM 00 03 25 21 a1 pop gmail com Webmail Allowed 05 15 08 05 51 PM Chris Park speed pointroll com PointRoll 8 7 28 66 Ads Allowed 05 15 08 05 51 PM PT PCTEST 0001www update microsoft com Allowed 05 15 08 05 51 PM PT PCTEST 0001www update microsoft com v6 Up 207 46 211 124 Allowed 05 15 08 05 51 PM PT PCTEST 0001wpad Allowed 05 15 08 05 47 PM Chris Park nintendowiis com Allowed 05 15 08 05 47 PM Chris Park www hot wii sites com Allowed 05 15 08 05 47 PM Chris Park www topgamesites net Games
154. le file descriptors 984 AA A A A 0 Phantom Technologies Inc All rights r All trademarks and re trademarks on this v ite are the p Figure 7 Proxy Cache System Information Rev 5 0 27 215 May 26 2010 Page 27 of 191 Phant m iBoss Technologies Enterprise 3 2 3 3 1 Automatic GPO Setup for NTLM with Login Logoff Scripts Add the Logon and Logoff scripts to the Active Directory as a group policy when users log in and log off for NTLM Authentication To do this follow these steps il NOoR WP From within your Active Directory server go to Start gt Programs gt Administrative Tools and click on Active Directory Users and Computers Right click on the domain and select Properties then select the Group Policy tab Select the Default Domain Policy and click Edit Navigate to User Configuration gt Windows Settings gt Scripts Logon Logoff Double click Logon and click Show Files move the login files here Next click add and select the primary logon script Do the same for the Logoff script 3 2 3 3 1 2 Automatic GPO Setup for NTLM with Internet Explorer The automatic GPO Setup for NTLM will allow your Active Directory server to setup and distribute the Proxy Settings within the domain clients Internet Explorer browser for you To do this follow these steps 1 From within your Active Directory server go to Start gt Programs gt Administrative
155. lication such as total bandwidth used for this application only TCP traffic for this application or only UDP traffic for this application To change to a particular protocol select the protocol TCP UDP or All from the drop down list labeled Protocol near the top All information on the page will adjust to reflect only the selected protocol This page also contains a graph with the bandwidth activity throughout the report period for this particular application You can use this to determine when and how the particular application is being utilized Toward the bottom a list of top users utilizing the application is listed The list is sorted from highest use to lowest This allows you to determine which user is utilizing the application the most You can get a full list of these users by clicking on the More button Rev 5 0 27 215 May 26 2010 Page 184 of 191 iBoss PhantQm Enterprise 6 REMOTE MANAGEMENT rs pam e ae UT a ons er LL ULT A _ o0 Figure 118 Remote Management Rev 5 0 27 215 May 26 2010 Page 185 of 191 Phant m iBoss Technologies Enterprise The Remote Management portal will allow you to remotely manage all of your iBoss units from anywhere in the world You may send the daily email report remotely configure settings upgrade firmware upload or download settings and set gro
156. ly report schedules allow you to email the auto generated reports to specified email addresses while custom report schedules allow for the generation of custom reports Rev 5 0 27 215 May 26 2010 Page 139 of 191 Phant m iBoss Technologies Enterprise on a schedule You may also choose Url List Email Report Schedule Format if Url List Email Report chosen This is the format in which the URL list will be emailed Options are Html and Comma Separated Values CSV Rev 5 0 27 215 May 26 2010 Page 140 of 191 Phant m Technologies iBoss En Create Report Schedule General Schedule Name Descnpbon fun Type Recumng Schedde o Actwe Ye Schedule Type Custom Generated Repot Scheda Schedule Time mhen the report whe the report i Deng generated I recommended that report schedules be 4 Note Report generation may take a long time to complete You wil be able to access the data at to generate reports dunng non peak network hours or dunng non buuness hours send remeet daly at tem Send repeet wonktyen Monday at 12003m on Sendreportonday T sever monthar 1200am Create New Report On Schedule rekt ActwRy in Generated report from the Previous Mew o Include the Following Users amp Groups Indude Groups ren Inchude Users eg User Location me TEEN Auo Oelete Processed Data after reports are sert Ye No Note This opton apples to
157. me for the server This setting does not affect connection to the eDirectory server and is only used for your reference I p Address Host The IP Address or host name of the eDirectory server Port The port to which the iBoss will connect to the eDirectory server Typically this is port 389 when ssl is not being used and 636 when SSL is being used Admin Username DN The username that the iBoss will use to search the eDirectory server tree This user must have search privileges In addition if event monitoring is being used the user must have monitor event privileges set in eDirectory Typically a user with administrative privileges is used Admin Password The password for the admin user specified above Common Name Search Attribute The eDirectory LDAP attribute used to extract the full name of the user First and Last Name Default sn Username Search Attribute The eDirectory LDAP attribute used to extract the username for the logged in user Default cn Group Search Attribute The LDAP attribute that the iBoss will use to match group membership When the user is found in eDirectory the iBoss will compare all groups specified in this attribute to the iBoss group names When the iBoss finds a match the iBoss will associate the user with that iBoss filtering group policy If a user is part of more than 1 group that matches an iBoss group name the iBoss will use the group with a lower group number Group 1 match will
158. n Figure 119 Manage Subscription This page will allow you to view your current subscription status The following are values that may appear in the Status field Active The iBoss has an active subscription Must Activate An active subscription key has not been registered with the iBoss Not Available The iBoss is not connected to the Internet Expired The iBoss subscription has expired and is no longer active Cancelled The iBoss subscription has been cancelled and is no longer active 7 1 Adding a Subscription Key The iBoss needs an active Subscription Key entered into the device before it can start functioning 1 Confirm that your Subscription Key has been activated 2 Enter the active Subscription Key for the iBoss Log into your iBoss and click on Manage Subscription button on the main page Please refer to the User Interface section on how to log into the iBoss Enter in the active Subscription Key in the boxes provided Figure 120 Enter Subscription Key Click on Apply and Confirm on the next page 3 If you do not have a Subscription Key you may press the Purchase Subscription Key Now button to purchase one This will guide you through the process of activating and registering your Subscription Key with your iBoss Rev 5 0 27 215 May 26 2010 Page 187 of 191 Phant m iBoss Technologies Enterprise 8 TROUBLESHOOTING 8 1 Password Recovery In the e
159. n Qm Microsoft MET Framework 1 1 Wizards A Network Load Balancing Manager Si Performance LO Remote Desktops m Routing and Remote Access Figure 18 Domain Security Policy To ensure the Active Directory Plugin is working correctly you will need to audit logon events To do this click on Domain Security Policy within your Administrative Tools as shown in the figure above in Default Domain Security Settings ini xj File Action View Help E gt am ERA Security Settings 3 Account Policies RS Audit account logon events Not Defined 7 gj Local Policies Rg Audit account management Not Defined st Audit Policy Re Audit directory service access Not Defined Egg User Rights Ee ag Audit logon events Not Defined gg Security Options E Event Log RS Audit object access Not Defined C Restricted Groups RE Audit policy change Not Defined C8 system Services RE Audit privilege use Not Defined 09 Registry RE Audit process tracking Not Defined 2 File System RS Audit system events Audit account logon events Properties E 2 x Y Wireless Network IEEE 802 11 P S z E Public Key Policies Security Policy Setting Ka SH RES Software Restriction Policies CH Audit account logon events a IP Security Policies on Active Direc CES DP Audit these attempts IV Success Failure Figure 19 Audit Account Logon Events Rev 5 0 27 215 May 26 2010 Page 36 of 191 Phant m iBoss Technologi
160. n in error by typing in the password and pressing Login Rev 5 0 27 215 May 26 2010 Page 66 of 191 Phant m iBoss Technologies 4 2 2 Programs Protocols amp DLSP Data Leakage Protection Internet Program Blocking Gang The group Dataa n ved by dal m ries of Mure tor i Reports n Then page shows vu ts bioch and curtral Internet program newing fie Shang Internet Legge vf giereg internet mog me ver mor be reg Control Ga ur Logg Preferences 1200 pm To Xm vr O Mucsd Schedus Additional Chat Instant Messenger Programs Docking Select 44 Aden buten Messenger Prog ama 1 IRC yere Faite Over istoer Online Gaming Schedulable Programs 9 Siem Sech Weg of Warcraft or Select aa tation sony coor Oty Abee From 1200 pm Te 23pm or Additional fe Sharing Program Blocking elect Ab Aderat Fie Sharing Progam MaTonent aveo minno m Drect Comect FTP File Transfer Protocol Select AE FTP Traffe Wieck Incoming FTP Tratte tock Outgang FTP Trape Block Ping ICMP Figure 34 Block Specific Web Programs Rev 5 0 27 215 May 26 2010 Page 67 of 191 Phant m iBoss Technologies Enterprise The Internet Program Blocking section allows you to configure the current iBoss program blocking settings Chat This category contains applications used for online messaging and chat The iBoss can block the selected program
161. n using Force Full Sync or enabling the option for Poll User Logins this value is required Typically this is set to the top of the tree for example o iboss Rev 5 0 27 215 May 26 2010 Page 42 of 191 Phant m iBoss Technologies Enterprise User SSL SSL Certificate This option specifies whether the iBoss should use SSL to connect to the eDirectory server Typically SSL for eDirectory communicates via port 636 and this should be configured in Port Settings When using SSL paste your SSL certificate by extracting the contents of the certificate in PEM format SSL is not required and involves more maintenance as you must monitor your certificates expiration dates to confirm that your certificates do not expire If your certificate expires the iBoss will no longer be able to communicate with the eDirectory server and the certificate will have to be updated The default setting for use SSL is usually set to No Add The Server Once you have configured all of your settings click the Add button to add the server to the registered eDirectory list You should refresh the page using the Refresh button after adding the server This will update the Status field for the server that was just added to the list You will want to confirm that the status is Running for eDirectory servers registered to receive eDirectory events and no error is specified Conclusion Once all of your eDirectory servers are regis
162. nd downstream bandwidth by port Include Bandwidth Stats When this option is enabled the report will include high level bandwidth statistics related to general bandwidth usage such as overall upstream and downstream usage Include Application Stats More When this option is enabled the report will Logging include usage relating to specific applications and specific usage categories 5 4 3 4 3 Email PDF Report Recipient This section allows the report to be emailed once generation is complete Since report generation may take a while to complete you may choose to configure these settings so that an email can be sent once the email generation process is complete to avoid having to wait for the report to complete 5 4 3 4 3 1 Email Message Information Enter the email information including the recipient sender cc bcc subject and message body This will send the email to another person which looks like it comes from you with a personalized message 5 4 3 4 3 2 Report Contact Information This information shows up on the cover page of the Emailed PDF Report Enter the Name Company Name Address City State Zip Email Phone and Fax 5 4 3 4 3 3 Report Custom Introduction and Conclusion This information shows up on the second page for the introduction and the last page which is the conclusion Enter a custom introduction and a custom conclusion 5 4 3 4 3 4 Additional Information Rev 5 0 27 215 May 26 2010
163. ng the most downstream bandwidth gt Note You may dick on the More button if available for more results Total Packet rm Bytes Count EI ae P Mana Martian 735m 5151K wo gom De tcn Park S7242MB 419 76 o d en Do wer 7579M8 5279K EI E bm Ds Peters compute SO27MB 63 08 4197Mb 7639K Overview of Upstream Bandwidth Usag Below Is a report of the top users consuming the most upstream bandwidth Note You may click on the More button ff avaiable for more results Total Packet giereg Bytes Count Cheis Park 1 39M 30670K Mara Martini 1320MB 26557K Peters compute SMB 2502K Bytes 60 t ke ret 430MB 2272K 299 me aan Figure 112 Bandwidth Statistics Rev 5 0 27 215 May 26 2010 Page 177 of 191 Phant m iBoss anten Enterprise 5 5 5 1 Bandwidth Activity This graph shows the total bandwidth activity throughout the report period This graph is contained in all of the top level report subsections for reference 5 5 5 2 Overview of Total Bandwidth Usage The following sections in this subsection contain the overview of total bandwidth usage The bandwidth usage is broken into three sections Overview of Overall usage Overview of downstream usage and overview of upstream usage You can mouse over a variety of items on this page like users themselves to get more details Overview of Total Bandwidth Usage Below is a report of the top ov
164. nterprise Reporter and click Save please refer to the iBoss Report Settings section for more information Note Please be sure to identify the report manager within the iBoss interface to bypass any filtering rules 5 2 Accessing the Report Manager The report manager can be accessed by logging into the iBoss via myiboss com and then clicking on the Report icon or by using the following URL http www myiboss com reports You can access the report manager only while on the same network as the iBoss You can access the iBoss reports from any computer on the network that has access to the iBoss interface Note The default IP address of the iBoss Enterprise Reporter is 192 168 1 20 5 3 Logging into the Report Manager The default username for the report manager is admin The administrative password for the iBoss Report Manager is the same as the password that is used to configure the iBoss filtering rules Note The default username for the External iBoss Enterprise Reports is admin There is no password by default You will need to change this setting and also be able to add users within the Enterprise Reporter settings You can create additional users that can access the report manager by creating them within the iBoss configuration interface and giving that user privileges to access the Report Manager in the user Add Edit screens You can also configure specific privileges for the user to restrict the types of operations the user
165. o the slaves Local Settings These are local settings for the iBoss you are configuring Enable Clustering This option turns on clustering globally Node Type This field specifies the device node type whether it is a slave or master iBoss device Retry Sync Interval in Seconds This field is the interval which the settings are synced Clustering Port This field specifies the port used for syncing settings Note The security key must be 32 hex characters Valid characters are 0 9 and A F Security Key This field specifies the security key used when communicating with other clustered iBoss devices Master I p Address This field specifies the master Boss IP address of the cluster Status This is the status of the clustering with this device Sync Count This is the number of the sync count Once you have entered all required information click the Apply button The sync count should increase as the intervals are reached and settings are synced To check current status refresh the page to check the sync count by clicking the Refresh button You can manually sync settings by clicking the Full Sync button Cluster Member I nfo These are settings which you may add for each iBoss device you are adding to the cluster Name This field is to put the name of the iBoss you are adding for reference Description This is the description for the iBoss device you are adding Node Type This field indicates whether thi
166. ocklist Categories Please select the custom block list categories below to apply to this group These categories allow you to create custom lists of URLs that can be applied to multiple groups Use the custom category feature to avoid adding the same URL to multiple groups F Custom 1 El Custom 6 Fl Custom 2 Custom 7 Custom 3 Custom 8 Custom 4 El Custom 9 F Custom 5 El Custom 10 Specific URLs to This Group Enter Website URL example domain com 7 Global No entries in list 009 Phantom Technologies LLC All rights re red trademarks on this website are the property of their respective owners All trademarks and regi Figure 36 Block Specific Websites Rev 5 0 27 215 May 26 2010 Page 73 of 191 Phant m iBoss Technologies En This page allows you to block specific website URLs from being accessed on your network Enter the URL of the website you would like to block in the text box below and click the Add URL button You may enter a maximum of 1000 website URLs across all profiles Each URL may be a maximum of 255 characters in length To remove a website URL from the Blocklist select the URL to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished 4 2 4 1 Custom Blocklist Categories iBoss Jump To Please Select X oe Web Filters Product Support My iBoss i i iBoss Custom Blo
167. of 191 Phant m iBoss Technologies Enterprise 4 2 2 1 Keyword Import iBoss Web Filters Keyword Import Please paste keywords one per line The format of should look like the following Keyword Max 19 chars jobs shopping cars If you would like to apply these keywords to all profiles check the box below 7 Apply this entry to all filtering groups 2009 Phantom Technologies LLC All rights reserved All trademarks and registered trademarks on this website are the property of their respective owmers Figure 43 Keyword Import You may import a list of keywords to import Please paste keywords one per line with a maximum of 19 characters per keyword You may select Apply to all filtering groups Once you are done click the Import Now button Rev 5 0 27 215 May 26 2010 Page 82 of 191 Phant m iBoss Technologies En 4 2 3 Block Specific Ports IBoss Jump To PleaseSelect Jn Web Filters About Product Support My iBoss 1 Debaut P e ees Pe Tones Group 2 Grou Group Group en RS 3 IL iB Port Blocking Home i L OSS Port Blocking nterprise p B Port Start Port End Protocol Direction Enable Boh v Boh E Internet Both Both e el Controls I S Both Both e fal Preferences E Both Both v EI Both Bothy E Port Blocking Schedule Always Block Block using an Advanced Schedule 009 Phantom Technologies LLC All rights
168. ome steps you will need to do We recommend adding P addresses to the bypass range for any servers or IP addresses that you do not want filtered For example any DNS servers or VoIP phones Rev 5 0 27 215 May 26 2010 Page 55 of 191 Phant m iBoss Technologies 4 INTERFACE 4 1 Home Page iBoss Web Filters Internet Controls P La Preferences Gs Log Out Home All trademarks and registered trademarks on this website are the pr Jump To Please Select v oe Product Support My iBoss iBoss Help Topics Enterprise e Home Filtering Status Enabled S Current Date amp Time 05 05 2010 12 20 56 PM Disable For 15 Min F What do you want to do S View Log Reports e Ke Configure Internet Controls 2 Edit Preferences i Identify Computers amp Users N Tools amp Utilities Setup Network Connection 2 Update Firmware O Manage Subscription 2009 Phantom Technologies LLC All rights Figure 29 Home Page Rev 5 0 27 215 May 26 2010 Page 56 of 191 Phant m iBoss Technologies Enterprise 4 1 1 Filtering Status This indicates the filtering status of your iBoss The following values may be displayed Enabled Indicates that your iBoss is Enabled and Active Disabled Indicates that your iBoss is not enabled Connecting When the iBoss is enabled it must first establish a connection to the gateway This indicates that the iBoss is attempting to esta
169. on from the iBoss and is more efficient in larger environments Register any Active Directory domain which will be communicating to the iBoss via the plugin below To remove a cluster member from the list select the Domain to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Note In order for your Active Directory domain to communicate with the iBoss they must first be registered below with the correct Ip Address In addition the security key used in the main settings must match the security key configured in the Active Directory plugin installed on each domain controller Global Settings Enable AD Plugin Security Key No Note Changing the port request wait time request fail time or request backlog size will not take affect until the Boss is restarted Port 8015 Reboot Required Request Wait Time 750000 uS Request Fail Time 1500 ms Request Backlog Size 100 Request Count 0 Successful Request Count 0 Unsuccessful Request Count 0 Active Directory Info Name Description IP Address Default Filtering Group 1 Default Y Active Directory Members No Entries Figure 16 Active Directory Plugin Rev 5 0 27 215 May 26 2010 Page 33 of 191 Phant m iBoss Technologies Enterprise This feature allows you to configure the iBoss to work with the iBoss Active Directory plugin The iBoss Activ
170. op downstream usage and top upstream usage You can mouse over a variety of items on this page like the applications themselves to get more details Top Application Usage Below is a report of the Top Applications Used for report Daily Report Note You may click the Application if available for Application Detail statistics You may click on the More button if available for more results splleatti Total Packet Block PP Bytes Count Count 80 000 aceon ES i webBro 72 64MB 93820 0 4 60 000 e 50 000 D 2 Pop3 37 52 MB 55196 o 4 40 000 e D 3 smtp 608 01 KB 1724 o d 30 000 20 000 D 4 Dns 75 73KB 922 o 10 000 Dns Web Browsing Figure 116 Top Applications Usage If you click on the More button in any of these sections you will get a full list of the applications that can be sorted by a variety of criteria 5 5 6 2 1 Application Detail By clicking on any of the listed applications on this page you will be taken to a full detail page for that application Rev 5 0 27 215 May 26 2010 Page 182 of 191 Phant m iBoss Technologies IBOSS Current Generated Report System Activity Reports Schedules Settings Information Logout Jump to Report Generated Report Daily Report 05 15 2008 amp Report Name Daily Report Date 05 15 2008 05 16 2008 Show Report For All Users in This Report El Statistics IP Statistics je Statistics Application Detail gt Note
171. or the real time user activity monitoring feature The iBoss can monitor user activity in real time and send email alerts or perform desktop video recordings when a predefined level of activity is reached This allows you to have 24 7 awareness of network activity User activity monitoring must be enabled for the group in order for the settings to take effect If real time user activity monitoring is disabled monitoring by trigger thresholds is disabled for all computers in the group Video desktop recording feature is an add on feature and may not be available on all models Real time User Activity Monitoring This setting enables trigger based real time monitoring for the group If this setting is disabled for the group any additional options for this group have no effect Trigger Level And Interval Trigger when specified number of events occur within a chosen time period Real time Email Alerts This setting will cause the iBoss to send and email alert when the above threshold criteria is reached The alert will occur when the trigger is reached to allow you to respond when certain activity is occurring Note The email address that these alerts are going to be sent to can be configured below for this group or in the Settings section of the Reports interface Group Email Contact This is the email where real time alerts will be sent for activity related to the currently selected group If left blank the email address specified in t
172. ordings lt lt October 2008 gt S Year Month Month Year Date amp Time Description Delete Download Play Phant All trademarks and reg d trademarks th e f their respective owners Figure 88 Video Desktop Monitoring This section will show you all the computers that are identified with the DRMC feature enabled You will be able to manually Record Control and View the desktops straight from this screen Rev 5 0 27 215 May 26 2010 Page 147 of 191 Phant m iBoss Technologies Enterprise 5 4 5 3 1 Live Desktop MultiView iBoss Live Desktop MultiView teves Computer RS a EE e A a Figure 89 Live Desktop MultiView This option allows you to select multiple computers and view up to 10 different screens simultaneously Select the computers you want to view and click the Live Desktop MultiView When viewing the desktops you may click the Fullscreen button under any of the windows to just view one desktop 5 4 5 4 Video Desktop Recordings This section will store all of the desktop recordings All of the recordings are saved as swf Adobe Flash files In this section you may delete download or play the recording Since they are swf files you may view them in any standard web browser with the flash plug in 5 4 5 5 Recording Thresholds Recording thresholds can be set to start recording a user s desktop automatically once a certain violation threshold is reached For example if a user goes
173. ottom of the page When you are f 7 finished click the Done button Enter Website Domain example domain com Preferences o Add 009 Phantom Technologies ade a red trademarks on this v LLC All rights rese ite are the property of Figure 55 URL Logging Ignore List This page allows you to add domains which you do not wish to log to the iBoss Reports database Domains in the list will be ignored from logging however all filtering policies will still apply This is useful for preventing the logging of sites like antivirus updates operating system updates etc Enter the domain or sub domain of the website you would like to exclude from being logged to the iBoss Reports database Enter the domain in the text box below and click the Add button To remove a website domain from the Ignore List select the domain and click the Remove button located at the bottom of the page When you are finished click the Done button Rev 5 0 27 215 May 26 2010 Page 97 of 191 Phant m Technologies iBoss En 4 3 3 Customize Block Pages iBoss Jump Ta PlesseSeed SS Web Filters Product Support My iBoss Debat P Customize Block Pages iBoss Messages The group Default is used by default as rules of filtering for all unidentified computers You may customize the pages that are displayed when a website is blocked due to its content or when the
174. ou will need to know the port number and password that are in the settings for the VNC program on the computer If you are first setting it up you may start the VNC server program and go to the Admin Properties This will allow you to configure the port password and other settings of the VNC program Please keep the settings you set for this program handy as you will need it to register the computer to the iBoss DRMC feature Uncheck the options for Removing the wallpaper For Multi viewer connections select Keep existing connections and check the Allow Loopback Connections Here is an example of recommended settings Ultre VNC Server Property Rage Incoming Connections When Last Client Disconnects Query on incoming connection v Accept Socket Connections Do Nothing Display Query Window Display Number or Ports to use O Lock Workstation ZE Timeout seconds ODisplay N O Logoff Workstation Default action O Ports Main Auto nitip a Disconnect all existing connections Enable JavaViewer Http Connect C Disable Viewers inputs Keep existing connections v Allow Loopback Connections Disable Local inputs O Refuse the new connection LoopbackOnly O Refuse all new connection Keyboard amp Mouse Multi viewer connections Japanese Authentication Misc Remove Aero Vista VNC Password ITTTTTTTS Remove Wallpaper for Viewers Enable Blank Monitor on V
175. oups p Addresses and ports Creating rules based on users and groups allows the iBoss to track the user dynamically and apply the QoS rules regardless of the user s Ip Address Create your rules and click the Add button to apply the rule You can disable individual rules which will cause the rule to have no effect Rules are prioritized from top to bottom starting with rule one below which has the highest priority The iBoss will apply the first rule that matches each traffic stream If no rule applies the iBoss will use default QoS packet TOS bits to determine priority For each rule you can specify the minimum amount of bandwidth to reserve for traffic that matches your criteria This will guarantee that at least this much bandwidth is available for critical applications when your Internet connection is completely saturated If you would like to simply throttle traffic set the minimum bandwidth to 12 kbps and set the maximum to that which you would like to throttle the traffic to The maximum bandwidth specified how much bandwidth matching traffic can use at any time If the maximum is set to your maximum Internet speed then the matching application can use any spare bandwidth when it is available For proper operation set the Total Downstream Bandwidth and Total Upstream Bandwidth in the Global Settings to match your bandwidth connection speed to the Internet for your network You must enable the global settings for any of the rules on
176. oups correspond to the iBoss Filtering Groups configured in the iBoss interface All users within the group will be included in the report 5 4 3 4 5 Creating the Report Once you have configured these options click on the Create Report button on the bottom of the page This will trigger the generation of the report and take you back to the Generated Report screen Please note that only one report generation can occur simultaneously If there is another report generation in progress this report will be queued and scheduled for generation You can view the status of the report generation by refreshing the generated reports page To do this click on the Generated Reports button on the top of that page You can access the report while it is being generated however the data will continue to change as more data is added to the report until the report generation process is complete If the report includes the current day statistics will continue to accumulate until the report complete at which point no more data for the current day will be added to the report 5 4 4 Report Schedules This section allows for the configuration of report generation schedules Schedules allow you to generate reports for a specified interval of time and have them stored or emailed on a recurring basis Report schedules also allow for the daily report to be emailed daily to specified recipients Rev 5 0 27 215 May 26 2010 Page 137 of 191 Phant m iBoss Technolo
177. override Group 3 match Filtering group names can be found in Home Identify Computers amp Users gt Groups Tab Make sure to name the iBoss group exactly like the eDirectory group name that you would like to match Default groupMembership Group Attribute Value Key When the group search attribute above is found for example groupMembership this value specifies the tokens that separate the group names For example using the default value of cn the groupMembership LDAP attribute looks like cn Staff cn Wireless User With cn in this option the groups that the iBoss would extract are Staff and Wireless User It would then compare those to the iBoss groups Rev 5 0 27 215 May 26 2010 Page 41 of 191 Phant m iBoss Technologies Enterprise Default cn Location Attribute An optional LDAP attribute that can be used to specify the users location for generating reports Typically this is left blank Ignore DN Pattern The iBoss will ignore any user logins logoffs that contain the patterns specified in this option Any automated service accounts should be specified here If they are not whenever the service account such as an antivirus account logs into a computer that contains a logged in user that username will override the logged in user Eventually it will appear as if the service account is the only user logged into the network Enter these automated user accounts here so that whenever the iBoss receives a logon or logoff ev
178. owever it is recommended to change this password Keep this password handy as you will need it to register iBoss units to it Pudsus Url This is the URL where the iBoss Enterprise Reporter gets its updates from Do not change this URL unless told to do so by a Phantom Technologies Technician This may cause the Enterprise Reporter to function improperly if changed Browse Time Sensitivity This option is for the time usage statistics of how long a URL is counted as being viewed after first accessed This is only if there is no more traffic after hitting a website as it limits to this amount in seconds Remote Diagnostics This option allows you to enable Remote Diagnostics for a Phantom Technologies technician to assist you remotely Rev 5 0 27 215 May 26 2010 Page 151 of 191 Phant m iBoss Technologies 5 4 7 2 Report Users only in external report manager IBoss Current Generated Report Video System Activity Reports Schedules Desktop Settings Information General Register iBoss Devices lime Network Settings Subscription Settings Report Manager Users Username Name Edit User Settings Remove Administrator admin Administrator chris Christopher Park J09 Phantom Technologies LLC All rights r All trademarks and registered trademarks on this website are the prope of their respective owners Figure 93 Report Users This section allows you to add edit users that can log into the Enterprise Reporter T
179. ows you to enable or disable bandwidth category statistics Log Application Statistics only when More logging is selected This allows you to enable or disable application statistics Current Activity Monitory only when More logging is selected This allows you to enable or disable the current activity monitor IP Address Name Resolution only when More logging is selected This allows you to enable or disable the IP Address Name Resolution Bandwidth Logging This allows you to enable or disable bandwidth logging Rev 5 0 27 215 May 26 2010 Page 96 of 191 Phant m iBoss Technologies En 4 3 2 2 URL Logging Ignore List IBoss Jump To Please Select X ge Web Filters Product Support My iBoss Domain Logging Ignore iBoss List Enterprise This page allows you to add domains which you do not wish to log to the iBoss Reports database Domains in the list will be ignored from logging however all filtering polcies will still apply This is useful for preventing the logging of sites like antivirus updates operating system updates etc Domain Logging Ignore List Enter the domain or sub domain of the website you would like to Internet exclude from being logged to the iBoss Reports database Enter the Controls domain in the text box below and click the Add button To remove a website domain from the Ignore List select the domain and click the Ke Remove button located at the b
180. p Users then click the Groups tab You can import groups by clicking the Import From LDAP AD button This will ask you to save or open the list of groups from Active Directory Open it in a text editor and copy the group names Then click on the Import button and paste the groups The first line corresponds to filtering group 1 If a user belongs to multiple groups the user will fall under the highest priority filtering group number Please refer to Filtering Groups section for more details Rev 5 0 27 215 May 26 2010 Page 22 of 191 Phant m Technologies 3 2 3 3 Active Directory amp Proxy Settings Jess E ER un Prony stings Ip FEIT EI m E ed IL I o omea ote wins lt A sam om i Caleta DM Pen Ch v rm Figure 6 Active Directory amp Proxy Settings Rev 5 0 27 215 May 26 2010 iBoss E Page 23 of 191 Phant m iBoss Technologies Enterprise By default the iBoss works as an inline filter that actively scans Internet streams to and from the Internet This allows the iBoss to scan web requests and Web 2 0 application streams In this mode each computer is typically named after the primary user of the computer In the reports the username will represent the computer Alternatively the iBoss can be configured to work as a proxy This mode is typical of most other filters In this mode computers make requests to the iBoss at which point the request is made
181. p you install the iBoss onto your network 3 1 Operation Mode Overview The iBoss provides its filtering functionality in a completely transparent fashion on the network It does not segment a network nor does it provide firewall or NAT capability The iBoss filters traffic passing between the LAN and WAN port The iBoss will actively scan traffic applying filtering rules and intercepting traffic when necessary This allows the iBoss to achieve very high filtering performance without affecting network topology In order for the iBoss to perform filtering it must be configured to have its own IP Address on the local network The IP Address must be a static IP Address that is available on the network Before connecting the iBoss to the network the IP Address settings must be configured to match the network it is being installed on Once the address is configured you will be able to access the iBoss while on the local network by either entering www myiboss com in your Web Browser or entering the IP Address that was configured into the iBoss into your Web Browser 3 2 iBoss Network Settings Configuration Before the iBoss can be connected to the network the IP Address settings that the iBoss will use must be configured The iBoss must be configured with a static IP Address and will not obtain an IP Address through DHCP The iBoss ships with the following default IP Address settings If these settings are sufficient for the network where it i
182. rce port is 8001 Always On Connection This option allows you to still have Internet access even if it loses connection with our servers This function will work after the first time that it has established a connection Rev 5 0 27 215 May 26 2010 Page 54 of 191 Phant m iBoss Technologies Enterprise 3 3 Installing the iBoss on the Network Once the network settings have been configured the iBoss is ready to be installed on the network The two ports you will be using are the LAN port and the WAN port located on the iBoss Place the iBoss between an existing switch on the network and an existing firewall For example if the network has a switch to which computers are connected to and that switch is connected to the network firewall the iBoss will be placed between the switch and the firewall Disconnect the switch from the firewall and connect the switch to the LAN port on the iBoss Connect the firewall to the WAN port on the iBoss PC vc Existing Existing Switch iBoss Enterprise Firewall Router LAN WAN Figure 28 iBoss Hardware Installation Internet This completes the physical installation of the iBoss on your network You can access the iBoss interface from any computer on the local network by opening a Web Browser and typing the IP address of the iBoss into your Web Browser s address bar 3 3 1 Additional Setup Steps and Notes After setting up the iBoss there are s
183. re finished Note Do not add any gateways if your network is configured with a single outter gateway Place the iBoss between the outter gateway router and the internal switch to which all of the computers are connected If you register internal gateways on this page you must add the subnet which is routed by this gateway on the Additional Local Subnets page When adding the additional local subnet make sure the option Routed Through Gateway is set to yes Global Settings These are the global settings for adding an Internal Gateway Enable This is the option to globally turn on this feature Gateway Sync Interval This is the sync interval with the gateways that are adding in seconds Once you have changed any of these options click the Apply button Enter I nternal Gateway These are the individual gateway settings Name This is the name for reference for the gateway you are adding Description This is the field to add a description for the gateway you are adding Gateway Type This is the gateway type Options are Cisco HP Switch Linux Cisco FWSM Dlink Switch I P Address This is the IP address for the internal gateway you are adding Port This is the port used for communication typically it is port 23 for telnet communication or port 22 for SSH communication Protocol This is the option to choose whether communication is through telnet or SSH Username This is the username to log into the internal gatew
184. received the blocked page in error by typing in the password and pressing Login If a custom message is set this will show up above the exclamation point Rev 5 0 27 215 May 26 2010 Page 100 of 191 Technologies Phant m iBoss 4 3 4 Change Time Zone I B OSS Jump To Please Select X Go WebFilters Product Support iBoss Set Time Zone Enterprise o You can set your local time zone by selecting it from the drop down list below You may also select a daylight savings mode to have the time automatically adjusted when daylight savings occurs Daylight Savings Time Zone GMT 08 00 Pacific Time US amp Canada Tijuana Internet Controls Daylight Savings p United States Preferences 2009 Phantom Technologies LLC All rights reserved All trademarks and registered trademarks on this website are the property of their respective owners Figure 58 Set Time Zone The Time Zone page allows you to edit your current time zone settings and enable daylight savings Time Zone This option allows you to set your local time zone This is important for the logging and scheduling to work accurately Daylight Savings This option allows you to setup daylight savings time for your local time zone setting Rev 5 0 27 215 May 26 2010 Page 101 of 191 Phant m iBoss Technologies En 4 3 5 Edit System Settings iBoss Jump To PlesseSelct RS Web Filters
185. rn your computer s network settings back to their original settings Also if the iBoss has already been configured to have a different IP Address you must log into the iBoss using these settings If you do not know what the settings were you will have to log into the iBoss via the serial console port using the instructions described above Important Note You will also need to bypass your DNS or Domain Controller MAC or IP address within the iBoss Please refer to Identifying Computers and Bypass IP Ranges section for further information Rev 5 0 27 215 May 26 2010 Page 19 of 191 Phant m Technologies 3 2 3 2 LDAP Settings i B OSS j Jump To Please Select X oe Web Filters Internet Controls Preferences Product Support My iBoss LDAP Settings Bosse This page allows you to configure communcation with LDAP servers in order to allow users to use their directory server username and password when logging into the iBoss User Login page Directory servers such as Active Directory and eDirectory offer LDAP access which the iBoss uses to authenticate user credentials In addition these settings are used to pull user groups from Active Directory when using the iBoss Active Directory logon and logoff scripts Register any independent directory servers below To remove a server from the list select the server to remove and click the Remove button located at the bottom of the page Click the
186. rs with filtering rules applied will be filtered by the iBoss Computers with filtering rules bypassed will bypass the iBoss There are more options if you have the DMCR feature added This will allow you to put the Port Password and IP address of the client VNC computer Please refer to the DMCR section for more information Rev 5 0 27 215 May 26 2010 Page 110 of 191 Phant m iBoss Technologies En 4 4 2 Identify Users iBoss Jump To Please Select Web Filters Product Support Identified Users List ro 0 Below is a list of users that can log onto computers who have their filtering policy set to Requires User Login This allows you to share a single computer with multiple users If the computer is set to a default filtering group user login does not apply You may identify up to 120 individual user logins To create a new user click the Add New User button below Y Note These users will not have access to the iBoss settings and cannot log onto the iBoss to change settings Internet Controls CN Le i Add New User Preferences Items 0 0 of 0 Items Per Page 25 Prev Next There are no identified users Phantom Technologies LLC d trademarks on this All rights reserved website are the property of their respective ovmers Figure 65 Identify Users This is a list of users that can log onto computers who have their filtering policy set to Requires User Lo
187. rt My iBoss EDirectory Setup This page allows you to configure transparent authentication to Novell EDirectory servers You can register multiple EDirectory servers to automatically authenticate users when they log in and log out of their machines Enter the EDirectory information below and click the Add button To remove an EDirectory server from the list select the server to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Note When registering EDirectory servers you must enable the Monitor Events or Polling option You can also enable both of these options The Monitor Events option allows the iBoss to E the EDirectory server and receive login and logout events Internet in realtime In order to use the real time Monitor Events option the EDirectory server must Controls be version 8 7 or above with the latest service packs The Poll Users option allows the iBoss to poll the Edirectory server for user login and logout activity Global Settings Enable User Polling Not Required Preferences Initial User Full Sync User Login Polling Interval Seconds Polling Count User Polling In Progress Last Users Found Count EDirectory Info Name IP Address Host f Port 389 y Admin Username DN le E i e cn admin o phantom Admin Password Common Name Search Attribute Ee de
188. s Web policy enforcement based on eDirectory group membership Getting Started This section describes how to configure the iBoss to work within an eDirectory network infrastructure Overview The iBoss can integrate with eDirectory with two different modes Only one of the two modes are required and the end result is the same The eDirectory version must be noted as not all modes are supported on older eDirectory firmware releases Listed below are the two modes and their description Mode 1 eDirectory login logout event monitoring In this mode the iBoss monitors login and logout events sent by the eDirectory server in real time As users login and logout of their workstations eDirectory sends these events and iBoss uses them to associate the user with the workstation and apply dynamic filtering policy depending on which user is logged into the station To use this mode eDirectory 8 7 and above is required Mode 2 eDirectory user polling In this mode the iBoss polls the eDirectory server at the configured interval usually every 2 minutes for any users that have logged in within the last interval time For example if the polling interval is set to 2 minutes the iBoss will query eDirectory for any users that have logged in within the last 2 minutes repeating this every 2 minutes Because this mode is not receiving events in real time user association to iBoss filtering group can take as long as the configured interval This mod
189. s all of the settings click Save 5 4 7 3 Register iBoss Devices only in external report manager iBoss W Current Generated Report Video System Activity Reports Schedules Desktop Settings Information General Report Users Time Network Settings Subscription Settings Report Manager Registered Devices Name IP Address Edit Remove Boss 10 ee Edit Remove All trademarks and reg Figure 95 Register iBoss Devices This section allows you to add edit remove iBoss Devices to log to the external Report Manager You will need to register any iBoss devices that you wish to have reporting to the external report manager To add an iBoss Device click Add Device Rev 5 0 27 215 May 26 2010 Page 154 of 191 Phant m iBoss Technologies Enterprise 5 4 7 3 1 Register an iBoss Device Current Generated Report Video System Activity Reports Schedules Desktop Settings Information General Report Users Time Network Settings SUDSCcription Settings Report Manager Registered Devices iBoss Device Name Device IP Address Description Note The security key must be 32 hex digits Valid values are 0 9 and A F Security Key BEBE7093BEBE 7093BE 09 Phantom Technol All trademarks and regi d trademarks on thi te are the their respective owners Figure 96 Register an Boss Device To add an iBoss Device enter the iBoss Device Name Device IP Address Description and
190. s being installed you may not need to adjust the IP Address settings and skip this process Table 2 Default iBoss IP Address Settings I P Address 192 168 1 10 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 DNS 1 192 168 1 1 DNS 2 0 0 0 0 There are two methods for configuring the IP Address settings of the iBoss The first method involves using the serial console port The second method involves connecting a single computer to the iBoss LAN port and configuring via the network using your Web Browser If you have the external Report Manager the default IP address is 192 168 1 20 for the external Enterprise Reporter Rev 5 0 27 215 May 26 2010 Page 13 of 191 Phant m iBoss Technologies Enterprise 3 2 1 Configuring Network Settings via Serial Console To configure the network settings via the console terminal connect the provided serial cable to the console port on the iBoss After the iBoss has been powered on typically full boot up takes between 3 4 minutes open a serial console program On windows you can use the built in HyperTerminal program to access the console port The settings for the serial console COM connection are shown in the hardware specifications and are re listed below Bits Per Second 19200 Data Bits 8 Parity None Stop Bits 1 Flow Control None Once you have connected the serial cable from your computer to the console port and configured the console program press the Enter key repeatedly until the
191. s device is the master or slave I P Address Host This is the field for the IP of the iBoss you are adding Port This is the port number that is used to communicate Connect Timeout This is the timeout if the response is taking too long Sync Filter Settings This is option to sync the filtering settings Sync Group Settings This is option to sync the groups Sync Preferences This is option to sync the preference settings Sync Security Settings This is option to sync the security settings Sync Nodes This is option to sync the computer nodes Once finished click the Add button to add the iBoss cluster device Rev 5 0 27 215 May 26 2010 Page 45 of 191 Phant m iBoss Technologies En 3 2 3 8 Add Additional Routes IBoss Jump To Please Select X ee Web Filters Product Support My iBoss iti iBoss Additional Routes Enterprise This page allows you to add additional network routes for the iBoss Adding additional network routes is typically used when the iBoss is configured on a network using VLANs and the iBoss interface cannot be reached from within the VLAN Enter the additional routes below and click the Add button To remove a route from the list select the route to remove and click the Remove button located at the bottom of the page You can add up to additional network routes Click the Done button when you are inished Internet Controls Y Note Adding addtional network routes that
192. s option allows you to view your iBoss report logs Configure Internet Controls This option allows you to configure different iBoss filtering controls Edit My Preferences This option allows you to edit preferences including E mail options password time zone and custom block messages Identify Computers amp Users This option allows you to identify computers and individual user login on your network for computer specific management control Tools amp Utilities This option allows you to configure use utilities for quick lookups or backup amp restore options Setup Network Connection This option allows you to configure your iBoss network settings Update Firmware This option allows you to update the firmware for your iBoss whenever updates are available Rev 5 0 27 215 May 26 2010 Page 57 of 191 Phant m iBoss Technologies Enterprise Manage Subscription This option allows you to update the subscription for your iBoss 4 1 3 Shortcut Bar Use this shortcut bar to quickly navigate through the iBoss interface The shortcut bar has 4 options to choose Home Reports Internet Controls and My Preferences Once you set a password for the iBoss a Logout button will also appear Rev 5 0 27 215 May 26 2010 Page 58 of 191 Phant m iBoss Technologies 4 2 Configure Internet Controls i B OSS Jump To Please Select v ee Web Filters Product Support My iBoss Configure Internet Controls Bess
193. s will return you to the report schedules overview page This page will show the next processing time for the report schedule 5 4 4 6 Report Schedule Space Usage Section The iBoss has a limited number of active report schedules that can be added This section shows how many available report schedules are available for creation and how many report schedules have been created Rev 5 0 27 215 May 26 2010 Page 144 of 191 Phant m iBoss Technologies Enterprise Report Schedule Space Usage gt of Report Schedules 5 gt Max of Report Schedules 10 Used Schedules Available Schedules KR Figure 86 Report Schedule Space Usage Rev 5 0 27 215 May 26 2010 Page 145 of 191 Phant m iBoss Technologies Enterprise 5 4 5 Automatic Desktop Recording Monitor Control DRMC This is an add on feature to the iBoss This section contains the setup the DRMC feature on the iBoss with the computers on your network The recording viewing and controlling of desktops is done by integrating with VNC VNC Virtual Network Computing is a desktop sharing application that allows remote access to another computer There are many programs that are available that offer VNC and is compatible with Mac Windows and Linux We recommend using UltraVNC uvnc com 5 4 5 1 Installing VNC Once you have downloaded and installed the VNC program on the computer you will need to configure it If you already have it installed and setup y
194. same affect as the MAC Address option above except it should be chosen if traffic originating from this subnet traverses an internal gateway or router before r the iBoss You must register the internal gateway or router the iBoss through the Register Internal Gateways menu option under Main Menu gt Setup Network Connection Enter Local Subnet Type Subnet v IP Address Subnet Mask Authentication Ei Method ree Filtering Method Ip Address Default Policy Yes Use 1 Default Rules e Login Page Group 1 Default X Bandwidth Accounting Yes No entries in list Figure 25 Add Additional Local Subnets Rev 5 0 27 215 May 26 2010 Page 49 of 191 Phant m iBoss Technologies Enterprise This feature allows you to add and define local subnets Traffic between local subnets are not filtered by the iBoss In addition the iBoss will only filter Internet traffic from subnets that are defined below Be sure to include all the subnets on the local network You can add a top level subnet such as 10 0 0 0 255 0 0 0 if your network includes many smaller subnets and you would like to have the entire subnet on the same default policy In addition you can select to add IP Ranges if you would like to assign a default policy to a specific IP Range When the default policy for a subnet is determined the iBoss will start from the subnet at the top of the list and work its way down The iBoss w
195. scripts into the logon scripts folder on your Active Directory GPO Place the logoff script on the logoff scripts folder on your Active Directory GPO When registering the logon scripts only register the primary logon script below The secondary logon script only needs to be placed in the logon scripts folder on the GPO and should not be registered as a logon script as it only needs to be accessible by users on the network You can then download the Primary Logon Script Secondary Logon Script and Logoff Script These scripts can be added to your Active Directory Group Policy to transparently authenticate when users log in After entering the information click Save and then Test Proxy Cache Size This option allows you to set the Proxy Cache Size The default is 1000 MB Max Cache Object Size This option allows you to set the Max Cache Object Size The default is 4096 KB Max Cache Object Size Held In Memory This option allows you to configure the Max Cache object size held in memory The default is 8 KB Reserved Cache Memory This option allows you to set the Reserved Cache Memory The default is 256 MB Cache Memory Pooling Size This option allows you to set the Pooling Size The default is 16 MB Cache Max File Descriptors This option allows you to set the Cache Max File Descriptors 1024 is the default Cache Info This shows the size of the Cache You can choose to Purge Cache or More information about th
196. seeee 27 Figure 8 GPO Default Domain Policy seeesesseeseeseeesesressreeresressersrerressresrertenstrstesreesresreseresresee 28 Fig re 9 RE 20 Figure 10 GPO Import the Connection SettlTigs a eee teen aetti nter reno pa rtp SRI a pete Rodi 29 Fig re 11 GPO Use ee 30 Figure 12 GPO Local Area Network Settings esseseesseeeseseeseesressrseresressrseresresseeerertenseseresreeseese 30 Figure 13 Manual Proxy with Internet Explorer esessseseseeeseeressiseresresseseresressrsererrensersrerresseese 31 Figure 14 Manual Proxy with Mozilla FirefoX essssesseseessesressrseresresseseresressrsererrensereresreeseese 32 Figure 15 Automatic Identify of Unknown Computers eese 32 Rev 5 0 27 215 May 26 2010 Page 6 of 191 Phant m iBoss Technologies Enterprise Figure 16 Active Directory Plugin aseo sco soseatetarceicutestsbecastace en denectauenneucvecteiewsncetareigaaateis 33 Figure 17 iBoss Active Directory Plugin Configuration eene 35 Figure 18 Domain Security E 36 Figure 19 Audit Account Logon Evers ee cis csce ose etra tee toai m deefe Eus tu eEeec onus 36 Figure 20 Audit Logon E E 37 Figure 21 eDirectory SelllBBs ui e eb e e te etit ib ii aisee Qe aM edt ebd aite 38 Fig re 22 e TE 44 Figure 23 Adg Additional ROUlBS iicet th ue rr Docente te ERO aU Rte Rude ias Gp iai hes 46 Fig re 24 Bypass IP Range E 48 Figure 25 Add Additional Local Subnets eseesseseeesses
197. ssage This option allows you to insert a custom message into the Sleep Mode Page The custom message may be up to 299 characters in length You may also enable or disable the Password Override feature that appears at the bottom of the page Sleep Mode Redirect Page This option allows you specify your own URL to use as the Sleep Mode Page Users will be redirected to this URL instead of the default Sleep Mode Page The URL may be up to 255 characters in length Sleep Mode Silent Drop Selecting this option will cause the iBoss to silently drop the connection when the computer is in sleep mode The user will not receive the Sleep Mode Page if this option is selected and the Internet will appear to be unavailable Rev 5 0 27 215 May 26 2010 Page 99 of 191 Phant gm iBoss Technologies Enterprise 4 3 3 1 Blocked Page iBoss WebFilters Page Blocked Access to the requested site has been restricted due to its contents URL Content adult com Description Website contains prohibited Pornography Nudity content Group Number 1 Ip Address 2010 Phantom Technologies Inc All rights reserved All trademarks and registered trademarks on this website are the property of their respective owmers Figure 57 iBoss Blocked Page When a page is blocked from violation of the iBoss settings this page will show up in the web browser to the user You may manually login and add sites to the allowlist if you feel that you have
198. st select the checkbox next to the category You may view and edit the list by clicking on the category link When you are finished click the Apply button Select All Adult High Risk Custom List Enter the custom keyword that you would like to block in the text box below and click the Add Keyword button You may enter a maximum of 2000 website URL keywords across all profiles Each keyword may be a maximum of 19 characters in length letters and digits only To remove a keyword from the list select the keyword and click the Remove button located at the bottom of the page When you are finished click the Done button Note If you want a kayworato T filtering groups select Apply groups option before clicking the Add filtering groups When removing a global entry it will remove the entry from all filtering groups Select the Wild Card checkbox if you would likeuse wild card matching on the keyword When wild card matching is used the entire url is searched for the keyword pattern If wild card matching is not used the iBoss will analyze the URL for queries containing the keywords entered Select High Risk if the keyword represents a high risk word Selecting this option allows the keyword to be used in other aspects of the filter such as sending alerts when the keyword term is searched for When you are finished click the Done button Enter Keyword example
199. t put the device in line like you would when setting up the iBoss filter After setting up the iBoss Enterprise Reporter on the network do not forget to identify the Enterprise Reporter and Select No Bypass Filtering Rules 5 1 2 Setup Steps to Register iBoss to External Enterprise Reporter This section is a quick guide for registering iBoss devices to an Enterprise Reporter 1 Setup an IP address for the iBoss Device please refer to the iBoss IP address section to set this 2 Setup an IP address for the iBoss Enterprise Reporter please refer to the iBoss Enterprise Reporter Network Settings section to set this Rev 5 0 27 215 May 26 2010 Page 122 of 191 Phant m iBoss Technologies Enterprise 3 Log into the report manager and click on Settings gt General gt then change the Report Database Password please refer to the iBoss Enterprise Reporter Settings section for more information 4 Click on Register iBoss Devices gt Add Device gt Then set the iBoss name iBoss I P address and copy the Security key please refer to the iBoss Enterprise Reporter Settings section for more information 5 Log into the iBoss device and click on Preferences Configure Report Settings 2 Edit General Report Settings change the Configure iBoss for option to External Report Manager please refer to the iBoss Report Settings section for more information 6 Enter the I P address database password and security key of the iBoss E
200. t m iBoss Technologies Enterprise User Authentication Method This option allows you to configure whether to authenticate using Active Directory or iBoss user logins Note When NTLM is selected the DNS IP Address settings of the iBoss must be set to your Active Directory IP Address Unidentified User Group Action This option allows you to change the action used when an unidentified user is found You can either choose to block access or use a filtering group Default Filtering Group This option allows you to choose the filtering group that is used when an unidentified user is found Default Landing URL This option allows you to specify where the page is redirected after a successful authentication This is only the case where NTLM was done without an original destination page was first requested Admin Username Only in Active Directory NTLM Authentication Method This is the username of the LDAP administrator Ex Administrator Admin Password Only in Active Directory NTLM Authentication Method This is the password of the administrator user above for your LDAP Active Directory server Domain Name Only in Active Directory NTLM Authentication Method This is your Active Directory domain Ex phantomtech local Domain IP Only in Active Directory NTLM Authentication Method This is the Domain IP address of your Domain Controller Active Directory server Domain Netbios Name Only in Active Directory NTLM
201. t of the Top Ports Used for report Dally Report gt Net You mar cick the Port pre tor Port Detten Yeu may cick on the More burton aah more reus zz Total Pacat Block Mw Count Cont ny amaa oam o Di mam mme o na mum aam S m azm mm a aan pw 21999 8 Top Ports Used oming Below is a report of the Top Incoming Ports Used for report Dally Report Mp o Note You may cick the Port f valable for Port Owtad statator You may dick on the More button H in ilible for more rests feier Cost Coon Di wm am wem 0 De mmm v o t b ue xat ce o Da os nom imo o Sr Ds vm mm aam n we TOO annii Top Ports Used Outgoing Below is a report of the Top Outgoing Ports Used tor report Dally Report Nate You may click thw Port f opt tor Port Owtad statites You may cid on the More button Mf aeailable for more rests lt a pea Ovtawleg Packet lock Bytes Count Coumt oe Di ms mam 2122 0 LAS Pa e sw wn o D ox S ouo Da gt um mm a D am eon Ds sm i auo o S 3 Ds uo pm ma o Kam a e LEE Figure 106 Port Statistics Rev 5 0 27 215 May 26 2010 Page 169 of 191 Phant m iBoss Technologies Enterprise 5 5 3 1 Bandwidth Activity This graph shows the total bandwidth activity throughout the report period This graph is contained in all of the top level report subsections for reference 5 5 3 2 Top Ports Used The following sections in th
202. t string Software Settings E Remote Installation Set amp Scripts Logon LogofP S Security Settings Folder Redirection Administrative Templates Figure 9 GPO Connection Settings 6 Select the option Import the Connection Settings and click Modify Settings Connection Settings Figure 10 GPO Import the Connection Settings Rev 5 0 27 215 May 26 2010 Page 29 of 191 Phant m Technologies 7 Click LAN Settings and check Use a proxy server Internet Properties Connections To set up an Internet connection click Setup Dial up and Virtual Private Network settings Choose Settings if you need to configure a proxy server For a connection Weyer diala connection Dial whenever a network connection is not present Always dial my default connection Gurrent Mane Local Area Network LAN settings LAN Settings do not apply to dial up connections LAN settings Choose Settings above for dial up settings OK Cancel Apply Figure 11 GPO Use Proxy Server iBoss Enterprise 8 Enter the IP address of the iBoss and the Proxy port that is setup on the iBoss default 8008 and click OK m Automatic configuration Automatic configuration may override manual settings To ensure the use of manual settings disable automatic configuration Automatically detect settings Use automatic configuration script
203. tandard Import method is based on MAC address Computer Name and Filtering Group and is comma delimited The DNS import method allows you to import from a tab delimted list exported from a DNS server Active Directory etc The two methods are described below Please select the import method option paste the list in the box below and then click the Import Now button below Standard Import Please paste information regarding computers on the network one computer per line The format of each line should look like the following Computer MAC Address Computer Name Filtering Group Number Computer MAC Address Computer Name Max 64 chars Filtering Group Number 00 01 02 03 04 05 Chris Computer 1 00 01 02 03 04 06 John Computer U gem User Login 00 01 02 03 04 07 Mark Computer N 4 No Filtering DNS Import Please paste the list exported from your DNS server in the text box below Computers not found in the Unidentified Computer List will not be added You may also add an optional filtering group number which should be tab delimited If the filtering group number is not present on a line the computer will be added to the default filtering group Group 1 The format of each line should look like the following and is tab delimited Computer Name Record Type Ip Address Optional Filtering Group Number Computer Name Max 64 chars IP Address Filtering Group Number Chris Host A 10 128 29 15 Tom Host A 10 128
204. tats include statistics relating to web browsing activity This includes top visited domains top blocked domains websites visited and website category statistics Port Stats Port Stats include statistics relating to TCP and UDP port usage on the network This includes top used ports top blocked ports etc IP Stats P Stats include statistics relating to IP traffic on the network This includes top accessed P Addresses top blocked IP Addresses etc Bandwidth Stats Bandwidth Stats include statistics relating to general bandwidth usage such as overall downstream and upstream usage Application Stats Application Stats include statistics specific to applications used on the network Most of the items within the report manager are clickable The report manager allows deep drilldown functionality to provide very detailed information very easily 5 5 1 Report Information Section When viewing any of the report pages the report information section will be visible at the top of the page This section gives you information regarding the current report and allows you to switch between reports easily Rev 5 0 27 215 May 26 2010 Page 159 of 191 Phant m iBoss anten Enterprise Current Generated r Activity Reports Schedules Information Settings Logout Jump to Report Generated Report SHEE RSE Daily Report 05 15 2008 Iv Report Name Daily Report Date 05 15 2008 05 16 2008 SUNSET All Users
205. tch configuration for different groups select the group tab at the top of the page or from the drop down menu to quickly jump to a filtering group You may use the arrows to go to the next or previous set of filtering groups Rev 5 0 27 215 May 26 2010 Page 120 of 191 Phant m iBoss anten Enterprise 4 5 Firmware Updates iBoss Jump To Please Select X 9o Web Filters Product Support Firmware Updates Bosse e Firmware Model iBoss Enterprise Updates Device Name iBoss Current Firmware Version 5 0 27 210 Available Firmware Version Current Signature Version 4 0 6 5 Internet Controls A a Please click the Check For Updates button below to check for firmware updates Preferences 2009 Phantom Technologies LLC All rights reserved All trademarks and registered trademarks on this website are the property of their respective ovmers Figure 73 Firmware Updates Firmware updates may be available from time to time These updates include feature enhancements The updates are downloaded over the Internet directly into the device Firmware updates include feature enhancements only and are not related to the iBoss Internet filtering functionality The iBoss will always be up to date with the latest web category URLs and online application definitions used with filtering rules You must have an active subscription and a live Internet connection in order to download firmware updates
206. tention must be paid to the dangers of electric shock and static electricity when working with electrical equipment Rev 5 0 27 215 May 26 2010 Page 191 of 191
207. tered you can seamless manage policies within the iBoss and manage group membership in your eDirectory server The iBoss will dynamically apply the appropriate policy whenever the user logs in using their eDirectory login credentials Rev 5 0 27 215 May 26 2010 Page 43 of 191 Phant m iBoss Technologies En 3 2 3 7 Clustering iBoss Jump To Please Select X ee Web Filters Product Support My iBoss Clustering Boss ie This page allows you to configure clustering between a group of iBoss filters By clustering iBoss filters you can have settings from an iBoss master automatically replicate across all members of the cluster This allows a central management point for a group of iBoss web filters Enter information about cluster members below and click the Add button To remove a Reports cluster member from the list select the iBoss to remove and click the Remove button e located at the bottom of the page Click the Done button when you are finished Note When creating the cluster designate a single iBoss in the cluster as the master This will be the iBoss which you want to use as the central point for Internet configuring settings Only the master needs to have cluster members added below You can also select which settings you will want to replicate from the master to the Controls dies fe Local Settings Enable Clustering No e Preferences Node Type Slave Retry Sync Interval 30 Seconds
208. tes to be able to give to your users Once you have changed any of these settings click the Apply button Enter the URL of the website you would like to allow in the text box below and click the Add URL button You may enter a maximum of 1000 website URLs across all profiles Each URL may be a maximum of 255 characters in length To remove a website URL from the Allowlist select the URL and click the Remove button located at the bottom of the page When you are finished click the Done button Select Apply Keyword Safe Search if you would still like to have keyword and safe search enforcement applied to the domain being bypassed Enter URL ex domain com field to enter the domain or URL to allow Global Option to allow across all filtering groups Apply Keyword Safe Search Allows the domain or URL if it contains this keyword added This is not recommended as it may allow false positives Once you have entered in a URL or domain click the Add URL button Rev 5 0 27 215 May 26 2010 Page 77 of 191 Phanta m Technologies 4 2 1 1 Custom Allowlist Categories iBoss Jump To PleaseSelect v oe Product Support My iBoss Custom Allowlist Categories iBoss Enterprise This page allows you to create custom Allowlist list categories Enter the URL of the website you would like to add the currently selected category in the text box below and click the Add URL button Any group that has
209. the Rev 5 0 27 215 May 26 2010 Page 85 of 191 Phant m iBoss Technologies Enterprise list If you choose to only allow the domain extensions in the list then any domain access who s base is not in the list will not be allowed Alternatively if you choose the block the extensions in the list then accesses to domains with the listed domain bases will be blocked For example you may choose to allow only domains that end in com and net Any domain that does not end with those extensions will be blocked Enter the domain extensions in the text box below and click the Add button You may enter a maximum of 2000 domain extensions across all profiles Each extension may be a maximum of 15 characters in length To remove an extension from the list select the extension to remove and click the Remove button located at the bottom of the page Click the Done button when you are finished Note Changing the option to Only allow below will only allow the domains in the list These settings do not apply to web access to direct IP addresses You can block direct IP address access by going to Internet Controls Block Specific Web Categories IP Address blocking Rev 5 0 27 215 May 26 2010 Page 86 of 191 Phant m iBoss Technologies En 4 2 6 Configure Sleep Schedule I B OSS Jump To Please Select oe Web Filters Product Support My iBoss 1 Default gt Sleep Schedule MO The group Default is used by default
210. the processed data chosen above If you choose to Auto Delete Processed Data after reports are sent these data stabstics wil be deleted and you wil no longer reports with thes data You wil need to process the data agan d you wash to have thes data to send POF reports sent agan z f H H Email Message Information Emai To Emai From cc ace prue Message Body Name ome any tame Assess Address 2 Oty SateProwece zo mat e fas Report Custom Introduction and Conclusion Introduction Concern Additional Information Recipent Settings You must click Add Email Recipient Report Prepared Bv Lege URL Company Prepared For Report Type Ka gt 5 Executive LT 4 ral 5 Report Report Report Executive Report LT Report 5 Full Report Current Email Recipients Mp Note These are the current POF Emad Report Recpients These are the only recoients that wil en above recerve the POF reports if you have entered and do not see in the table below you must first enter the eformabon and cick the Add Emai Recent button to save the egent settings Figure 85 Create a Report Schedule Rev 5 0 27 215 May 26 2010 Page 141 of 191 Phant m iBoss Technologies Enterprise 5 4 4 5 2 Daily Report Email Schedule Settings The options available for the daily report email schedule differ from the custom daily report The daily report email schedule occurs once daily You must specify email settin
211. this category checked will also have the urls in this category applied Category Settings Internet Current custom Allowlist category Custom 1 Controls IA Category Name Custom 1 Youtube Video Category Preferences Category Schedule Always Enabled Enable using an Advanced Schedule Category URLs Enter URL ex domain com Apply Keyword Safe Search E Select all s LLC All rights res All trademarks and demarks te are the pro ed of their respective ovmers Figure 40 Custom Allowlist Categories iBoss Enterprise Select the custom allow list categories to apply to this group These categories allow you to create custom lists of URLs that can be applied to multiple groups Use the custom category feature to avoid adding the same URL to multiple groups This feature allows you to create custom Allowlist list categories Enter the URL of the website you would like to add the currently selected category in the text box below and click the Add URL button Any group that has this category checked will also have the URLs in this category applied Youtube Video Category This option allows you to allow specific YouTube videos while blocking having the Audio Video category still block the YouTube site Apply Keyword Safe Search Allows the domain or URL if it contains this keyword added This is not recommended as it may allow false positives Rev
212. tings must match the security key configured in the Active Directory plugin installed on each domain controller Global Settings Enable AD Plugin Enable this option if you are going to be using the Active Directory Plugin Security Key This is the security key used to communicate with the domain controller and iBoss They must match exactly Note Changing the port request wait time request fail time or request backlog size will not take effect until the iBoss is restarted Port This is the port number used for the active directory plugin Default is 8015 Request Wait Time This is the Request Wait time for how long the Plugin will wait to respond to the iBoss Request Fail Time This is the Request Fail time for how long until the request fails to the iBoss Request Backlog Size This is the backlog size for requests that are waiting to process Request Count Current Request Count Successful Request Count Current Successful Request Count Unsuccessful Request Count Current Unsuccessful Request Count Active Directory I nfo Name This is for reference of which Active Directory server you are adding Description A description can be added for reference I P Address This is the IP address of the Active Directory server Default Filtering Group This is the default filtering group for this active directory domain Once finished click Add to add the Active Directory server Rev 5 0 27 215 May 26 2010 Page 34
213. tion under Main Menu gt Setup Network Connection Enter Local Subnet This is the section to add local subnet information Type This is the option to choose whether it is a Range or Subnet I P Start Range option This is the start IP address of the IP range you are adding I P End Range option This is the end IP address of the IP range you are adding IP Address Subnet option This is an IP address of the IP subnet you are adding typically you enter the broadcast address Subnet Mask Subnet option This is the subnet mask for the IP subnet you are adding Authentication Method This is the option whether to authenticate with fixed filtering or NTLM with Active Directory Filtering Method This is the option to choose whether this IP range or subnet are filtered and identified by IP address Mac Address or Mac Address through an internal gateway Default Policy This is the default filtering policy for the IP range or subnet you are adding Login Page Group This is the Login group page for user login used for the IP range or subnet you are adding Bandwidth Accounting This option is to choose whether to account for bandwidth for the IP range or subnet you are adding Rev 5 0 27 215 May 26 2010 Page 51 of 191 Phant m iBoss Technologies En 3 2 3 11 Register Internal Gateways m IBoss Jump To Please Select X oe Web Filters Product Support My iBoss Register Internal Gateways Bosse
214. to send an email alert whenever a user exis from this fikering group Alerts wil only be sent when a user logs in manually with overnde and wil not be tent when a user is autheenicated transparentty MT finabled Video Desktop Recording This setting enables desktop recording to occur when the abov threshold arzena is reached In addon you can speofy the duration of the desktop recording The computer must be registered with the iBoss and have VNC enabled for this settings to have effect In addition the computer must have a compatible VNC application installed and running Disabled Enabled Record video for 1 Me Include The Following Categories Ads Modda Phones Adult Cont Nens Akcohoi T ob Organizations Ant Porn Nodty Auctions Pobtcal Audio amp Video buto Bany Swmsst Dating amp Personals staurants Food Dicbonary Drugs Educabon Entertainment ore Fite Sharing Sports Finance amp Investment Technology Forums sobat DEN Transportabon Travel Games nce amp Mate Government rus amp Malware Guns amp w Web Based E mad Wealth web Hostir Image Search web Pro Figure 49 Real time Monitoring Recording Rev 5 0 27 215 May 26 2010 Page 90 of 191 Phant m iBoss Technologies Enterprise The VNC recording feature is not included by default It is a feature add on upgrade This feature allows you to adjust the settings f
215. to send email reports SMTP Server Address This is the domain or IP Address of the SMTP mail server you would like to use Requires Login If your server requires a username and password set this option to Yes Username This is the username for servers that require login If the Requires Login option is set to false you can leave this option blank Password This is the password of the user for servers that require login 5 4 6 2 Report Maintenance Settings These settings allow you to configure the maintenance options for the report manager Maintenance occurs once per day Perform Maintenance At This is the time you would like maintenance to occur Configure this option for a time when the network has the lightest load Maximum time to perform maintenance This option allows you to limit the maximum maintenance time Although maintenance may not take too long to complete if the report manager is shrinking the database or performing other intensive routines maintenance may take a long time to complete It is important that the iBoss is given enough time to complete all of its tasks The Unlimited option is recommended Perform Full maintenance at the specified time above This option allows you to configure a full maintenance cycle to occur at the specified time It is highly recommended that this option is set to disabled The report manager database will be locked if full ma
216. top 6 31 kbits sec 196 More m Figure 76 Current Top Bandwidth Consumers 5 4 1 3 Real time Web Hit activity graph This section shows total the current total webhits per second as well as the total current violations per second It will also show statistics at the top for the speed of hits per second hour and day Web Hit Activity Below is a report of the current real time web hit activity Hits Per Second 0 Hits Per Hour 0 Hits Per Day 0 02 02 PM 02 02 PM 02 02 PM 02 03 PM seh Webhits sec HNMWwWhOAONDWOO All Web Hits Sec All Violations Sec Eee Figure 77 Real time Webhit Activity Rev 5 0 27 215 May 26 2010 Page 127 of 191 Phant m iBoss Technologies Enterprise 5 4 1 4 Real time website activity This section shows the current websites being visited The URLs are updated in real time as users on the network access website destinations It will also provide details about the URL access including categories The list will highlight URLs that were blocked by the iBoss This list is updated in real time without the need to refresh the page This section also has a filter to only show a specific User and or Action Allowed or Blocked You may simply click the username in this list to automatically set the filter to a specific user You may also click the Pause button to stop the list from scrolling Rev 5 0 27 215 May 26 2010
217. ty number will match over those with a lower priority number when a user is a member of multiple groups that match the Active Directory eDirectory or LDAP server Rev 5 0 27 215 May 26 2010 Page 119 of 191 Phant m iBoss Technologies Enterprise Note When identifying computers on your network you may choose one of the filtering groups below or instead bypass filtering entirely for a particular computer Note You may put a higher number in the Priority group so that it has higher priority than the other filtering groups if users fall under more than one filtering group Copy Settings This allows you to quickly copy filtering settings from one group to another Please select the group to copy settings from and a group to copy settings to and then click the COPY button below Note When you copy settings from one group to another all filtering settings from the destination group will be erased and replaced with the source group This process is not reversible and the original settings for the destination group will be lost 4 4 3 1 Filtering Group Tabs Group 1 v gt Group 1 _Group2_ Group3 Group4 Groups Figure 72 Filtering Group Tabs When configuring the rules for your iBoss you will notice the Group tabs at the top of each configuration page These pages allow you to set different filtering rules for the different filtering groups The selected group will appear to have the tab in front of the other tabs To swi
218. ubscription Network Settings Configure IP Address Settings g e 182168120 Subnet Mask 255 255 2550 Gateway 192 168 1 1 l o it DNS 1 192 168 1 1 DNS 2 0000 All trademarks and r Figure 98 Configure IP Address Settings This section allows you to set the network settings for the external report manager You may set the IP address Subnet Mask Gateway DNS 1 and DNS 2 After entering the settings click Save The iBoss Enterprise Reporter will need to reboot after saving Default iBoss Enterprise Reporter IP Address Settings I P Address 192 168 1 20 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 DNS 1 192 168 1 1 DNS 2 0 0 0 0 You may set these settings through the serial console Please refer to the serial console settings in the iBoss serial console section Rev 5 0 27 215 May 26 2010 Page 157 of 191 Phant m iBoss Technologies 5 4 7 6 Subscription only in the external report manager Current Generated Report Video System Activity Reports Schedules Desktop Settings Information General Report Users Register iBoss Devices Time Network Settings Settings Report Manager Subscription Subscription Key X Edit es LLC All rights reserved ebsite are the property of their respective owners All trademarks and registered trademarks on this Figure 99 Subscription This section allows you to enter the subscription key You may click Edit to enter the key
219. ule Green or checked indicates access is allowed during the time block specified Red or unchecked indicates access is blocked during the time block specified Note For the Advanced Category Scheduling to function the category to be scheduled must be currently blocked on the Internet Category Blocking setup page Rev 5 0 27 215 May 26 2010 Page 65 of 191 Phant amp m Technologies 4 2 1 2 Identify Theft Phishing IP Address Blocking Page iBoss Web Filters Identity Theft Detection Phishing This page has been blocked by the iBoss due to a possible identity theft attempt This page may be a Phishing attempt to steal your personal information If you do not recognize the web address as being valid it is recommended that you do not submit any personal or sensitive information to the website URL Content Description Direct IP Address access not allowed E J TEE X0 SW 11 ESTO 1 Dr 010 2010 Phantom Technologies Inc All rights reserved All trademarks and registered trademarks on this website are the property of their respective owmers Figure 33 Identity Theft Detection Page When a page is blocked from of the iBoss due to detection of Identity Theft Phishing IP Address URL Blocking this page will show up in the web browser to the user You may manually login and add the blocked Identity theft page IP address to the allowlist if you feel that you have received the Identity Theft Detectio
220. ups for units Easily connect and configure settings without needing to know your IP address Connect to all your devices securely using SSL and AES encryption without needing to set up a VPN No static P address required The Remote Management can securely connect to your iBoss units even through firewalls The Remote Management portal will allow you to manage multiple locations that have the iBoss installed through one managed account You or the iBoss units may be set up anywhere in the world with and Internet connection 6 1 Set Up Account You may create a Remote Management account through https www iphantom com enterprisemanagement main html This will allow you to manage all of your iBoss units remotely This one account can manage multiple iBoss units You can access your Remote Management account from anywhere in the world 6 2 Adding Units to Your Account You may add multiple iBoss units to your account for which you would like to manage You may also give the added unit a nickname to remember where the unit is located 6 3 Groups You may create and edit groups to help manage your units Using groups allows you to organize your units and manage settings together for units of the group You may upload or sync settings for all units within a group making it easier and quicker to configure multiple units 6 4 Management Easily connect and configure settings without needing to know your IP address of where your iBoss units ar
221. use over the Blue text in the Descnpbon column for more formation about the entry You may click the More button for more entries in the current Dady report Apply Filters User mm Action AR M I an emm Bazar 9 Figure 74 Current Activity Rev 5 0 27 215 May 26 2010 iBoss Page 125 of 191 Phant m iBoss Enterprise Technologies 5 4 1 Current Activity The current activity section shows active real time information about the network This information is updated in real time automatically 5 4 1 1 Real time Web Hit Activity Graph The first section includes a real time Web Hit Activity that includes Web Hits per second and Violation per second Bandwidth Activity Below is a report of the current real time bandwidth activity kbits sec Upstream 0 288 kbits sec 05 15 08 05 41 PM 05 15 08 05 41 P E Total Bandwidth Upstream Downstream i Figure 75 Real time MRTG Bandwidth Graph 05 15 08 05 43 PM 5 4 1 2 Current Top Bandwidth Consumers This section includes the top consumers of bandwidth updated in real time You can click on the More button for more details of users Rev 5 0 27 215 May 26 2010 Page 126 of 191 Phant m iBoss Technologies Enterprise Current Top Bandwidth Consumers Below is a list of the current top bandwidth consumers Please allow 20 30 seconds for data to appear User Bandwidth Packets 10 128 31 176 0 061 kbits sec 1 chrislap
222. vent that the iBoss administration password becomes lost there is a way by which it can be recovered If you checked the Password Recovery option on the iBoss when the password was initially setup you will be prompted to have the password E mailed to you upon a failed login attempt Follow the link provided on the login page to have your password E mailed to the address specified during the Password Recovery setup If you did not enable the password recovery option you can contact the Phantom Technologies support department to have the password E mailed to a specific address Note that you will be prompted for account authentication information before a password recovery request is fulfilled The password may be reset by performing a factory reset on the iBoss however this action is typically reserved as a last resort due to the fact that ALL of your settings will be erased back to factory defaults 8 2 Resetting to Factory Defaults The iBoss can be reset back to factory default settings through two different methods After performing the factory reset all of the iBoss settings will be set back to default values including Internet connection Internet filtering and password settings Note The tamper log cannot be erased by a factory reset This is by design for security reasons 8 2 1 Through the iBoss User Interface Login to iBoss Interface http myiboss com From the Home page go to My Preferences and System
223. ver is located User Search Filter This is the filter that is used to search for a username in the LDAP server This filter must result in a single user record The filter must also contain 96s which will be replaced by the username There must not be any other percent signs in the search filter Example Active Directory sample sAMAccountName s Default Filtering Group This option allows you to use a default filtering group if no LDAP group can be matched with an active iBoss Filtering Group You can choose to Deny Access if no group match or choose between the different filtering groups Use SSL This option allows you to turn on SSL encryption with your LDAP server SSL Certificate This section allows you to paste the Certificate for the SSL Encryption used by your LDAP server Once you have finished entering information click the Add button Once it has been added click the Test button next to the entry in the box If you would like to edit the server information click the Edit button and the fields will be able to edit Once updated click the Edit or Save button 3 2 3 2 1 1 Match Active Directory Groups with iBoss Filtering Groups Once you have the LDAP Active Directory Settings configured you will need to match your Active Directory groups with the iBoss filtering groups You can simply rename the filtering group names to match the Active Directory group names To do this from the main menu click on Identify Computers am
224. will query the eDirectory tree for any new logon events that have occurred and associate the user with the eDirectory filtering policy This option only applies when using eDirectory polling When using eDirectory events this option is not used User Polling In Progress Indicates whether the iBoss is polling the eDirectory server for logged in users Last Users Found Count Used to indicate how many new users the iBoss found during the last sync with eDirectory Below the global settings there is a Force Sync button which will cause the iBoss to immediately start pulling users from eDirectory and associating them with iBoss filtering policy You can use this status count to determine how many users the iBoss found in eDirectory You should click the Refresh button while performing a full synch to get updated status on this value eDirectory I nfo Server Registration Settings This section allows you to add and edit settings for individual eDirectory servers Typically you can add the top level master eDirectory replicas However if possible it is recommended that all eDirectory servers to which users authenticate are registered in this section The following describes the settings within the eDirectory Info section used to register the eDirectory server Rev 5 0 27 215 May 26 2010 Page 40 of 191 Phant m iBoss Technologies Enterprise Name Use this setting to specify the server name You can also use a friendly na
225. y iBoss Preferences Help Topics sS Enterprise e Preferences What do you want to do Set or Change Password Reports Le Bl Configure Report Settings internet Customize Block Pages Controls Le Change Time Zone Ld Preferences Edit System Settings Setup Remote Management 2009 Phantom Technologies LLC All rights reserved All trademarks and registered trademarks on this website are the property of their respective ovmers Figure 50 Edit My Preferences The Preferences menu allows you to choose options for configuring the current preferences of the iBoss These are the options to choose from Set or Change Password Configure Report Settings Customize Block Pages Change My Time Zone Edit System Settings and Setup Remote Management Set or Change Password This option allows you to set or change the admin password used for logging into your iBoss device Setup Report Settings This option allows you to setup report settings for report manager Customize Block Pages This option allows you to customize the blocked pages Change Time Zone This option allows you to change your current time zone This option is important for your logs and schedules to work accurately Edit System Settings This option allows you to change system settings Setup Remote Management This option allows you to setup Remote Management Rev 5 0 27 215 May 26 2010 Page 92 of 191 Phant m iBoss Technologies
Download Pdf Manuals
Related Search
Related Contents
Documento PDF (Tesi di dottorato) - Padua@Research V4N6 - Forth Calligaris DIVA Elegant Home Fashions HDT559 Instructions / Assembly WOLF-Garten HS-W Use & Care Guide GGU-SETTLE - Index of ボータブルガス温度測定器シリーズ 据付型ガス濃度測定器シリーズ General instructions and User`s Manual for spray gun cleaner Copyright © All rights reserved.
Failed to retrieve file