One machine monitors the whole network, which is convenient to deploy.
"Bailuo network police" is only installed on one computer at the exit. Without installing the client, the network card address can be personalized controlled and managed by any computer across VLAN, platform, router and switch. At the same time, it is easy to bind the IP address with the network card and the machine name with the network card, so that the client cannot change the IP and machine name at will.
"Bailuo Network Police" is the only monitoring software in China with a self-developed bag-catching kernel. It has the characteristics of high stability, high security, high bag catching rate and powerful function. It is called "network control software tailored for large-scale enterprise traffic monitoring" by HC Network.
Two, prohibit all kinds of stock software and financial websites:
You can directly ban more than 80 kinds of stock trading software such as straight flush, great wisdom, money and analysts. By using the "Bailuo Cyber Police" in the global rules, you can ensure that your employees concentrate on their work, instead of being so anxious and unwilling to work on the Shanghai Composite Index.
Third, P2P download/chat control such as BT is prohibited to improve the efficiency of the company's network.
Various P2P software such as BT, Thunder, flashget flashget, GnuTella, eMule (electric donkey and mule), Cool Dog, POCO/PP, Cameng, Bai Bao, etc. are forbidden to restrict various illegal network applications within the company, so as to improve the network efficiency of the company.
Fourth, check the online dynamics of each computer in real time to understand the network:
You only need to open the remote management platform of "Bailuo Internet Police" and the nine real-time log windows of "Bailuo Internet Police" to help you know who each employee is chatting with? Who is watching Internet TV? Who is trading stocks? Who is playing the game? You can see it at a glance! And correctly guide or criticize and educate all kinds of irregular behaviors.
Five, prohibit all kinds of online games and entertainment websites:
There are no bubble halls, QQ games, wingers, Fang Hao, Lianzhong, other games, POPO games and China Game Center. The software can also ban all kinds of entertainment and leisure game websites, so that employees can work more professionally and improve work efficiency.
Six, chat monitoring:
Monitor the chat content of MSN, QQ chat room, ICQ/AIM, YAHOO and the chat behavior of SKYPE, QQ, POPO, UC, GTALK, Tradelink and Taobao Want Want, and ban all kinds of chat tools to improve the work efficiency during working hours.
Seven, mail monitoring, query:
Comprehensive monitoring of email content and attachment records sent through web, SMTP and POP3 can monitor more than 4,000 kinds of WEB mailboxes. You can consult and check the company mail at any time to understand the communication between employees and customers and protect the company's business secrets.
Eight, content filtering, alarm or blocking keywords:
Filter the content of sent and received messages-filter the sensitive content in the content, subject, email address, recipient, sender, cc and bcc of messages.
Filter forums and blogs-filter keywords in forum speeches, blogs and web pages.
Chat filtering-filtering MSN, YAHOO! Com, ICQ/AIM, and filter QQ number and chat content and number in QQ chat room to protect their business secrets from being sent out.
Nine, log query and statistics:
You can query logs of specified time range and service type through IP, MAC, machine name, tag and account number.
Through the direct inquiry of Bailuo network police, you can find out which websites each employee has visited, which services he has used, and his own bandwidth and traffic usage;
Through the reverse keyword query of Bailuo network police, we can know which employees have used a specific website or service, so as to find the problem;
You can also find out who has the most visits and uses chat tools most frequently through the statistical function.
X. Alarm log query:
Provide alarm log for system abnormality, content filtering, bandwidth flow control alarm, etc.
Through the alarm inquiry, we can know who illegally used the banned software service, who illegally modified the IP or machine name, and who used the traffic that exceeded the company's limit, so as to formulate more effective network management methods.
Eleven, file transfer query and control:
Through HTTP file query, you can query HTTP uploaded files, HTTP downloaded files, WEB mails, forum blogs, etc.
Queries prohibit QQ from sending files, QQ receiving files, MSN sending files, MSN receiving files, FTP uploading, FTP downloading, HTTP uploading, and HTTP downloading through other files.
Twelve, online time and upload and download traffic management alarm:
You can specify the data traffic or online time of each employee in the company for one day, and the people or computers that exceed the traffic or online time. White snail network police software can help you limit their continuous online, or remind this person that online time exceeds the standard.
Thirteen. Detailed control of web browsing, remote login and classification by the system;
Web browsing, Telnet and classified websites (such as portals, chat websites, entertainment websites, financial securities websites, game libraries, search engine libraries, recruitment websites and reactionary pornographic and violent websites) are prohibited. You can also customize keyword filtering, and you can define a library yourself to filter websites or keywords in this library.
Fourteen, advanced rules (time) settings:
Using time period control, you can specify
1. Website that employees can only visit at specified time;
2. Websites that are forbidden to visit at the specified time;
3. You can also disable all the functions mentioned above, such as QQ, BT and other network applications;
4. You can also specify that everyone can relax at noon and look at some entertainment news websites.
15. Monitor traffic dynamics at any time:
You can check the real-time traffic of each computer, upload and download traffic, and the total traffic of the company at any time.
Keep abreast of traffic distribution and identify network failures or virus outbreaks.
You can sort the traffic and get the person with the highest traffic or the department with the highest traffic for proper handling.
Sixteen, multilingual system:
Bailuo network police software includes five languages: Simplified Chinese, Traditional Chinese, Japanese, English and Korean, with one version in five languages, which can be switched freely without any garbled code. We can launch German, French, Spanish and other language versions within 1 week for specific big customers.
Seventeen, according to the authority for multi-level personalized remote management:
Bailuo network police software can be divided into three levels of personalized management: global management, group management and stand-alone management, which solves the problem that other software can only be based on group management, and its setting and operation are not flexible, so it is impossible to set different settings for each computer.
Bailuo network police software can set fewer user permissions and have different operating permissions for users. Bailuo network police software is deployed in C/S structure, and even if it is thousands of miles away, it can know the company network like the back of its hand.
Eighteen, the log compression encryption save high security, fast query speed:
Log compression storage and index query algorithm: Bailuo network police adopts a unique log storage method, that is, information index structure (similar to search engine), which saves all logs in files and has the ability of automatic repair. The log volume of Bailuo network police is usually only about110 of the normal log volume, which is 1/200 of the database log volume. "White snail network police" completely abandoned the database, and solved the problems such as troublesome database deployment, complex database maintenance, inability to store massive logs and a large number of mail/file logs.