Introduction to Internet Behavior Management Functions

by qiaopene7q on 2009-11-25 16:54:29

1. What is Internet behavior management? What can Internet behavior management manage? Information security issues are not system problems, not hardware problems, not environmental problems; the key issue is still people-related. When a person is online, we have no way of knowing whether the website they log into is safe? Is it healthy? Does their internet usage affect their normal work and life? Is their internet behavior threatening the company's security? Could it bring legal risks? Are the emails they receive carrying viruses or traps? Traditional protective measures seem powerless in the face of new security threats brought by internet content and online behavior. If management could enhance control over content access and formulate fine-grained security strategies tailored to individual users, potential problems could be prevented, significantly reducing the security risks associated with the internet.

Elements of Internet Behavior Management:

- Online Employees (Who)

- Online Time (When)

- Websites to Access (Where)

- Network Applications to Run (How)

- Application Content (What)

- Available Traffic (How much)

- Online Periods (How long)

- Online Frequency (How often)

Formulating and implementing internet usage regulations

In most cases, a user unit will establish internet usage rules. However, these rules are not effectively enforced. The Netentsec product helps user units customize internet usage regulations and truly implement the relevant provisions.

Improving the work productivity of enterprise employees and increasing the utilization rate of equipment and bandwidth resources

Management based on user internet activity control can effectively help internet users reasonably allocate time for work and study, overcome laziness, and improve productivity. At the same time, it makes the network resources of the user unit, especially the bandwidth resources, more effectively used, ensuring the normal operation of important business and maximizing the return on investment in resource construction.

Preventing access to high-risk, illegal, and unhealthy internet content, avoiding legal disputes

Access control based on content classification eliminates contact and spread of illegal, unhealthy content such as pornography, anti-government, and cult materials. This avoids legal litigation caused by illegal statements or activities. On the other hand, blocking access to websites containing viruses, trojans, various malicious codes, and content fraud greatly reduces the possibility of induced security attacks and financial losses.

Preventing information leakage through external transmission

Effective event monitoring and alarms are implemented for various forms of information external transmission activities such as Email, Webmail, IM instant messaging, BBS forums to prevent confidential information leakage.

2. What is web filtering? How to block access to bad websites?

Web Filtering (Web Filtering) is no longer a new term. Due to the rapid development of the Internet, online information resources have started to flood everywhere, among which there are many bad information. Therefore, people began to explore various information filtering technologies to curb the spread of bad information and protect specific groups from being disturbed by malicious information. For example, protecting corporate employees from being disturbed by shopping and entertainment information affecting work efficiency; protecting young people from being poisoned by pornographic and violent information so that they grow up healthily; thus web filtering technology was born, and the content security market derived from it has also developed rapidly. Many domestic and foreign network device manufacturers have started to enter this field.

Web filtering function is one of the core functions of Internet behavior management products, and it is also the first point to consider when choosing. Therefore, the quality of the URL database of any Internet behavior management product is very important. When domestic users evaluate, they should pay more attention to the degree of localization of the database. Although the Internet knows no borders, the language and usage habits of each country and region are quite different.

Internet behavior management products should have the following WEB filtering functions:

- Support website access control based on pre-classified URL list technology

- URL filtering based on URL regular expressions

- Limitation management of request numbers and cumulative Web traffic based on users and time periods

- Support for custom URL classification

- Support for black and white list settings for Web access

- Support for querying URL access records, query results can be customized to generate multiple reports, and support for statistics ranking of access content, access volume, and visitors

Currently, most Internet behavior management products on the domestic market come from abroad, and there are relatively few proprietary products. Since foreign products mostly conform to European and American standards and adapt well to foreigners' Internet habits, Internet behavior management is based on controlling Internet content and managing Internet behavior to achieve more complete security goals. What websites do users like to visit? What instant messaging software do they use? What games do they play? What are their usage habits? These factors have an important impact on the standard definition of Internet behavior management products. Who understands Chinese Internet behavior and habits better? Their content filtering products are more suitable for application in the Chinese market.

3. What application software can Internet behavior management control? How to better control BT downloads? How to control online games?

A good Internet behavior management product can provide updates and maintenance of protocol analysis feature libraries for various popular network applications. By analyzing network applications at multiple levels and comprehensively, it ensures accurate control and management of various network applications. Users do not need to focus on application changes but only need to clarify their control requirements for applications to realize control and management. The application protocol database should include: IM instant messaging, P2P applications, network TV, streaming media protocols, online games, online stock trading, mail communication protocols, remote login protocols, etc., to ensure comprehensive control and management of users' Internet behavior.

Internet behavior management should have the following application controls:

IM Instant Messaging: Supports time-sharing and user-based control and management of popular local instant messaging tools, such as QQ, MSN, Yahoo Messenger, etc.

P2P File Downloads: Supports time-sharing and user-based control and management of popular local P2P peer-to-peer download tools, such as BT, eMule, Openext, etc.

Streaming Media: Supports time-sharing and user-based online playback and download control management for common streaming media protocols, such as RTSP, MMS, etc.

Online Games: Supports time-sharing and user-based control and management of various popular local online games, such as Warcraft, ZT Online, Bubble Fighter, QQ Game, etc.

FTP, Telnet Control Management

Supports application record queries, and query results can be customized to generate various reports

Supports statistical rankings for various protocol applications

4. How should enterprises allocate bandwidth? How does the Internet behavior management product perform bandwidth management?

The construction of informatization is the construction of productivity. After completing the basic construction of informatization, more and more businesses in enterprises begin to rely on network operations. In addition to key business systems such as ERP, CRM, OA, e-commerce, video conferencing, there are also non-critical business applications such as P2P downloads, online games, online videos, online stock trading, forming complex network application "arteries". However, just like a room full of people where everyone wants to speak and speak at the same time, without good bandwidth planning and strategies, network congestion will become a nightmare for enterprises.

Applications keep emerging, and the demand for bandwidth keeps growing. Without a good bandwidth assurance mechanism for normal business, critical business may be interrupted by irrelevant matters, affecting work efficiency. Besides supporting refined control of various Internet applications, Internet behavior management products also provide quantified management of various applications. According to the business needs of different user groups and users, set the priority of applications, reasonably allocate bandwidth resources, and provide differentiated bandwidth services.

Support strategy customization based on users and time periods

Support self-defined bandwidth channels, corresponding priorities, and upper/lower limits of rates

Support bandwidth channel allocation based on applications (protocols)

Bandwidth is crucial for the smooth operation of key businesses. Different positions and jobs have different bandwidth demands. A good Internet behavior management product should set the priority of applications according to the business needs of different user groups and users, reasonably allocate bandwidth resources, and provide differentiated bandwidth services. We must clearly define who? At what time? Whether a certain network application can be used? How much bandwidth can be owned? Bandwidth management needs to take users or applications as objects, time as a dimension, and bandwidth values as levers to formulate detailed management and allocation strategies, truly helping enterprises enhance bandwidth value.

5. How to conduct email monitoring? Can email attachments be monitored? How to stop sending confidential information?

Transmitting information through the Internet has become a key application for enterprises, but issues related to the confidentiality, health, and politics of information also arise. A qualified Internet behavior management device should be able to formulate detailed information sending and receiving monitoring strategies, effectively controlling the scope of dissemination of key information and avoiding possible legal risks.

Good Internet behavior management products should have the ability to monitor information transmission channels such as Email, Webmail, BBS, IM, for example, auditing the content of emails, email attachments, chat content, post content, etc., comprehensively.

An Internet behavior management product should have the following functions:

Email: Monitor and record emails sent externally via the network. Viewable information includes email headers, body content, send time, sender, etc.

Email: Support querying email records, and customizable generation of various reports from query results.

Webmail: Support activity monitoring and recording for various popular Webmail services.

Post: Support review and control of posting information on BBS forums.

6. Is it better to deploy Internet behavior management in-line or out-of-band? What are the differences between in-line and out-of-band deployment?

Internet behavior management products are deployed after most security systems and network systems have been established. Therefore, the ease of deployment and failure rate of such products are crucial to customers. The new deployment should not change the original network structure or affect network performance.

Currently, the deployment methods supported by Internet behavior management products on the market mainly include in-line and out-of-band. If solely considering the effect of security filtering, only traffic passing through the security device can guarantee true security. Out-of-band deployment might be affected by the status of the mirror port of the core switch, posing potential delays in security. All out-of-band monitoring products find it difficult to intercept data sent via UDP, and interception often has some delay, making the interception of sensitive data less effective and prone to missing monitoring data.

7. Hai Rong Tian Yu Technology Co., Ltd. is the gold-level authorized agent for Netentsec Internet Behavior Management. The company provides cybersecurity and management solutions to enterprise users at the most favorable prices and best services. The company's free consultation hotline: 4006-567-456