Phase 1 - Day 0 to Day 8 – Monitor the situation
The strength of GFI WebMonitor comes from applying policies based on the specific circumstances of your environment. Rather than applying policies blindly, it is best that you collect some data on your users browsing habits – and then apply policies accordingly.
Installation and configuration
Installation and configuration are outside the scope of this guide. Refer to the Quick Install Guide – a short reference guide designed to get you quickly off the ground with the installation and essential configurations or the Administrator Guide for more detailed information.
Additionally, our support center is always ready to help you out in any problems you may encounter while installing or using the product.
Testing users
It is highly recommended to set up a fixed number of testing users for the trial to get some relevant data on their browsing patterns. Use Group Policy objects (GPOs) to set proxy settings on the selected client machines so that these point to the GFI WebMonitor server. You can also configure each machine manually. Using either WPADWeb Proxy AutoDiscovery protocol. or Transparent Proxy is not recommended as with these methods GFI WebMonitor can intercept traffic from all machines in your network. As stated before, ensure that you introduce users where web filtering/blocking does not create any issues. It is not recommended to include high-profile users (for example, CEO or senior management).
Default policies
We recommend you leave the initial setup as is. Upon installation, GFI WebMonitor includes a number of pre-configured policies to ensure that high risk and potentially unsafe material is blocked, but anything else is allowed. Some of these policies are enabled by default, while others are turned off. Using this set-up, monitor your current situation. GFI WebMonitor works behind the scenes to gather some essential reporting data that will be used later on in the trial.
Monitor for one working week
Start monitoring immediately using the Home page and interactive Bandwidth, Activity and Security dashboards or the real-time traffic charts to know what is going on in your environment and analyze the current situation as necessary.