(It is an enterprise level network monitoring software. One machine installation can monitor, record and control the online behavior of other computers in the LAN. It is used to prevent the disclosure of important information and confidential documents of the unit; Supervise and review the behavior of restricting network use; Back up important network resource files. The main functions are: first, network behavior and content monitoring: including: website browsing monitoring, email receiving and sending monitoring, chat Behavior monitoring, game behavior monitoring, FTP monitoring, traffic monitoring, custom monitoring; (1) Anyview can record the webpages browsed by all users in the LAN in real time (including webpage title, webpage content, website, webpage size, etc.), and provide them for managers to view in the form of webpage snapshot; (2) Anyview can record all emails sent and received in the LAN in real time (including emails of pop3/smtp protocol and HTTP protocol), and detect and record the IP address, sending and receiving time, title, recipient / sender, attachment, content, email size and other information used. (3) Anyview can monitor the use of various chat tools by LAN users in real time, check the chat tools used by online users, online and offline time and other information, and save it. (4) Anyview can record the files (service address and content) uploaded and downloaded by all users in the network through FTP protocol in real time. (5) anyview can monitor all online game behaviors and define the online games to be monitored by itself; (6) Anyview can monitor users' real-time traffic, historical traffic analysis and traffic ranking (7) anyview can customize the monitored network applications, such as BT, stock software, FlashGet, etc. 2. General, full series, whole network, custom, port level online behavior control includes: website browsing control, email receiving and sending control, chat Behavior control, game behavior control, custom behavior control, port level control; All controls can be targeted at three-tier objects (a network, a group, a computer); Can be for a specified period of time; Can be targeted at the specified protocol tcp/udp; Universal free definition; Full series port level management; (1) It can prohibit browsing all websites, only allowed to browse designated websites (white list), forbidden to browse designated websites (blacklist) (2) it can prohibit sending and receiving mail, only allowed to send and receiving designated post offices (white list), forbidden tactics designated post offices (blacklist) (3) it can prohibit all chat Behaviors (such as QQ, MSN, ICQ, Yahoo, UC, popo, e-phone, etc.), and you can add chat by yourself Behavior control list; (4) All online games can be banned (such as Lianzhong, China game center, etc.); And you can add online game behavior control list by yourself; (5) It is forbidden to customize the control list, such as stock software, BT software, etc; And initiate blocking; (6) It can strictly control the whole series of port levels of the whole udp/tcp network segment, and support the blacklist and whitelist functions; 3、 Content filtering functions include: filtering unnecessary monitoring images and behaviors, ignoring monitoring; It can operate for three kinds of objects (a network, a group, a computer); (1) Monitor all, do not monitor, and only monitor some applications (2) website filtering white list and blacklist functions. 4. IP and MAC binding includes: prohibit MAC address modification, prohibit all IP address modifications, and prohibit some IP address modifications; Effective prevention Non Access network resources by users; 5、 User management includes: group addition and deletion, user name modification, lock group refresh, monitoring object setting (1) automatically search the computers in the LAN and automatically resolve the machine name, and distinguish users by MAC address by default (2) allow to establish groups and allow to refresh groups; Convenient management and authority control; (3) The user name can be modified to facilitate identification and management. After the grouping permission is moved, the new grouping permission will be inherited naturally; 6、 Other functions. (1) C/s management mode is adopted, and hierarchical permission management is supported. Anyview supports the separation of server and client programs, supports multi client connections, and allows different monitoring permissions to be given to different consoles. If there is a fixed external IP, it can be remotely managed and viewed; (2) Cross platform monitoring; The monitored computer can also be UNIX, Linux and other operating systems; (3) There is no need to install any software on the monitored and managed computer. One machine runs and the whole network is managed; (4) Support the backup and recovery of intercepted monitoring content and configuration files; Support unlimited IP network segment monitoring (5) adopt connection password management and prohibit non Method user connection, using console password management, prohibit non View by users; (6) The engine runs in the background as a system service (like IIS), and can be monitored without login and user intervention; (7) Offline browsing monitoring data function, with the function of automatically detecting whether the connected equipment is hub; (8) After the official version is installed, the trial version on other machines in the same network segment cannot operate normally. Our website reminds: for the development of Chinese software, please support the genuine version.
This document contains the following attachments:
AnyView. rar....)