background image

 

 
 
 
 
 
 
 
 

 

 
 
 
 
 
 
 

Internet Content Inspector 

 
 

ICI-1000 / ICI-2000 

 
 

User Manual 

 
 
 
 
 
 
 
 
 
 
 
 
 
 

v1.00 

 
 

 

Summary of Contents for ICI-1000

Page 1: ...Internet Content Inspector ICI 1000 ICI 2000 User Manual v1 00...

Page 2: ...lOne 2011 Copyright The contents of this publication may not be reproduced in any part or as a whole stored transcribed in an information retrieval system translated into any language or transmitted i...

Page 3: ...ing 28 Webmail Read 30 Webmail Sent 32 INSTANT MESSAGING CHAT 34 Windows Live Messenger aka MSN 34 ICQ 39 Yahoo Messenger 41 QQ Messenger 43 UT Chat Room 48 Skype 49 Gtalk in HTTP Gmail 50 Internet Re...

Page 4: ...48 SEND MAIL SERVICE 151 Alert with Content 151 Alert Mail Box 152 Alert Sensitive File 153 Report Management 154 Event Management 155 Event Trigger Management 157 STATISTICAL REPORTS 158 Conditional...

Page 5: ...rd Searches 177 Fuzzy Searches 177 Proximity Searches 178 Range Searches 178 Boosting a Term 178 BOOLEAN OPERATORS 179 AND 179 179 NOT 179 180 GROUPING 180 FIELD GROUPING 180 ESCAPING SPECIAL CHARACTE...

Page 6: ...lnet sessions ICI system encourages efficiency prevents company network resource from abuses by employees tracing culprits of information and confidential data leakage and monitors activities and onli...

Page 7: ...ent comparison etc Who Need the ICI System Financial Banking and Investment Organisations where all Internet transactions and communications need to be archived Record Keeping Marketing organizations...

Page 8: ...rnet packets through a port mirroring capable switch normally a smart switch or layer 2 3 switch a HUB can be used too as HUB broadcast traffic to all ports It then parses decodes and reconstructs the...

Page 9: ...on at Telco or ISP networks This implementation is normally for lawful enforcement agencies LEA such as cyber security agencies national security agencies criminal investigation bureau police and mili...

Page 10: ...allation Guide x 1 CD Manual x 1 Mounting Bracket set x 1 Power Cord x 1 Front Panel 1 Power LED 2 HDD LED Rear Panel 1 Power Socket 2 Power Supply Unit 3 PS 2 KB Mouse for local console 4 VGA Display...

Page 11: ...ayer2 3 Switch with Port Mirroring feature For the best performance and keep disruption minimal we introduce the Mirror mode implementation only which provides the Real time Reconstruction and keep di...

Page 12: ...ystem uses port 443 for secure web access Please remember to key in https x x x x for example https 192 168 1 60 which is the default login 2 Before you use this system please make sure you have Java...

Page 13: ...he navigation icon bar is on the top section of the Web Management GUI ICI Homepage provides information on the Total Throughput Statistical Report as shown in diagram below with Top Down and Drilled...

Page 14: ...on Function Icon Function EMAIL RECORD SYSTEM STATUS CHAT RECORD SYSTEM TOOLS FILE TRANSFER RECORD REGISTER OTHERS RECORD DATA SEARCH HTTP RECORD ALERT SERVICE TELNET RECORD REPORT SYSTEM SETTING HOME...

Page 15: ...the total traffic amount usage by the entire network as well as breaks them out into different service categories Online User List will show the List of users IP Address and Account Mail Report allows...

Page 16: ...Example 1 Click on the Email POP3 Quantity of Daily Traffic it will List down the entire POP3 Emails in the database...

Page 17: ...n the HTTP HTTP Content weekly traffic throughput KB it will display the bar chart of the HTTP Content traffic for the entire week 7 days By clicking bar chat specific day it will lead you to that day...

Page 18: ...ndow and you can select to click Throughput Statistical Report or Top N report Click on the Top N it will display the User Daily Traffic Top N by Listing the top user IP with information such as Who i...

Page 19: ...Click on Who is This will display the user IP relationship with username user login etc Click on Protocol it will display all applications and throughput KB used by this user IP...

Page 20: ...Besides generating report by IP Administrator can also generate report by Account basis...

Page 21: ...Click on the Daily Weekly or Summary Statistical Report of the particular user IP it will pop out a window display statistical on bar chart...

Page 22: ...Office Protocol 3 or POP3 Incoming Email obtainable information includes Date Time Account with IP MAC Sender Receiver CC Subject with Email content with attachment if any and Size Features in this P...

Page 23: ...ment in the Email Shows the IP address Forward Email Forward the Email to a specific Email account Source Code Shows the Email source and path Convertor Convert the subject name to another language to...

Page 24: ...Similar Search Search for Email with similar content Whois Provide information of Source and Destination IP and Hostname It allows you to search for the IP Address information through the Internet...

Page 25: ...View Email Content Click on the Email subject and Administrator can choose to open and view the Email content or save it into the hard drive of the Administrator PC...

Page 26: ...nt column Display the number of record per page Checkbox Check or tick the checkbox for deleting Attachment This symbol shows there is attachment in the Email Shows the IP address Forward Email Forwar...

Page 27: ...View Email Content Click on the Email subject and Administrator can choose to open and view the Email content or save it into the hard drive of the accessing PC...

Page 28: ...se to the account column Display the number of record per page Checkbox Check or tick the checkbox for deleting Attachment This symbol shows there is attachment in the Email Shows the IP address Forwa...

Page 29: ...View Email Content Click on the Email Subject link and you can choose to open and view the Email content or save it into the hard drive of your PC...

Page 30: ...the mouse to the account column Display the number of record per page Checkbox Check or tick the checkbox for deleting Attachment This symbol shows there is attachment in the Email Shows the IP addres...

Page 31: ...View Email Content Click on the Subject link and the following GUI which is the Webmail read content will be displayed...

Page 32: ...MAC Address by pointing the mouse to the account column Display the number of record per page Checkbox Check or tick the checkbox for deleting Attachment This symbol shows there is attachment in the...

Page 33: ...View Email Content Click on the Subject link and the following GUI which is the Webmail sent content will be displayed...

Page 34: ...ersation with content which includes file transferred and MSN webcam video session Features in this MSN GUI MSN Refresh the page content Delete Delete the MSN chat record that has been checked or tick...

Page 35: ...Checkbox Check or tick the checkbox for deleting File Transferred This symbol shows there is file transferred over the MSN Friend List This will show the entire friend list for the particular MSN acco...

Page 36: ...le chat session content It includes chat text message file transferred which can be opened and downloaded and webcam session reconstructed in ml20 format To playback the MSN webcam session click on th...

Page 37: ...k 1 Download and install MSN web recorder 1 0 2 from the following website at http ml20rc msnfanatic com download html 2 Start or execute the MSN web recorder 3 Open ml20 file File Open OPEN and selec...

Page 38: ...4 Click on Play to play back the record MSN webcam session...

Page 39: ...in Excel format and search for the chat record as shown below Search Search for ICQ record based on the specified parameters such as Date Time IP User Handle Participants and Account Display the numbe...

Page 40: ...ICQ Conversation Click on the Conversation link the following conversation window content will pop up and you can view the entire chatting session and files transferred as shown in the diagram below...

Page 41: ...he monthly chat record in Excel format and search for the chat record as shown below Search Search for YAHOO record based on the specified parameters such as Date Time IP User Handle Participants and...

Page 42: ...as follow Yahoo Messenger VoIP Play Back To play back Yahoo VoIP session you can click and download the VoIP audio file in GIPS format to your own PC You must have GIPS Decoder installed on your PC i...

Page 43: ...ist Administrator can download the monthly chat record in Excel format and search for the chat record as shown below Refer to 2 2 1 Search Search for QQ record based on the specified parameters such a...

Page 44: ...p as shown below Click on the icon to download QQ Cracker Tool setup zip Step 2 Install QQ cracker into computer Unzip the file and install the QQ cracker tool setup exe Click Next to continue Click N...

Page 45: ...nd signs means import means delete 2 QQ ID List QQ decrypted password information 3 Speed Test Password cracking capability number per second 4 START Start the process to decrypt 5 PAUSE Pause the pro...

Page 46: ...decrypt 2 Select all configurations 3 Start to decrypt 4 Look for the decrypted information at QQ ID List Information in QQ ID List with password cracked QQ Database Update Click on Information Updat...

Page 47: ...the following Window will pop out Close the Window and go to Update Information page This page will show the information of QQ Database being update You may now return to the QQ page and click on the...

Page 48: ...ws UT Chat Room Account List Administrator can download the monthly chat record in Excel format and search for the chat record as shown below Search Search for UT Chat Room record based on the specifi...

Page 49: ...parately Features in this Skype GUI Skype Refresh the page content Delete Delete the Skype chat record that has been checked or ticked Account List This section shows Skype Account List Administrator...

Page 50: ...ecord in Excel format and search for the chat record as shown below Search Search for Gtalk record based on the specified parameters such as Date Time IP User Handle Participants and Account Display t...

Page 51: ...Account List Administrator can download the monthly chat record in Excel format and search for the chat record as shown below Search Search for IRC record based on the specified parameters such as Dat...

Page 52: ...his FTP GUI FTP Refresh the page record List Delete Delete the Email that has been checked or ticked Pass Show Display FTP account password Search Search for FTP record based on the specified paramete...

Page 53: ...Whois Provide information of Source and Destination IP and Hostname It allows you to search for the IP Address information through the Internet...

Page 54: ...d are Bittorent eMule eDonkey Gnutella and Fast track Features in this P2P GUI P2P Refresh the page content List Delete Delete the record that is checked by clicking the Checkbox and Delete button Sea...

Page 55: ...es information of Web Sites accessed which includes Date Time Account with IP MAC and Host URL Web Sites Tag The Web Sites can be accessible by clicking on the URL Web Sites Tag with connection to the...

Page 56: ...Whois Provide information of Source and Destination IP and Hostname Allows you to search for the IP Address information through the Internet...

Page 57: ...cked Search Search HTTP Content record based on the specified parameters such as Date Time IP Content and Account Display the number of record per page Checkbox Records can be deleted by checking the...

Page 58: ...Source Code When click on the following UI will pop up to display the source code of webpage...

Page 59: ...HTTP Reconstruct Click on to refresh the page content List Delete Delete record which is checked Search Search the particular records based on the specified parameters such as Date Time IP URL and ID...

Page 60: ...Sample Reconstructed Web Page Note To view the reconstructed content firstly you are required to turn on Web Page Reconstruction Capturing Module...

Page 61: ...use Proxy Service You are also required to set your web browser configuration to access from by following proxy setting Proxy Address IP Address of the ICI system ex 192 168 1 60 Port 8888 With the a...

Page 62: ...ed parameters such as Date Time IP File Name and Account Rule Set Define the file extension which the system reconstructs There are two settings Reconstruct All or Set Manually Administrator can opt t...

Page 63: ...Sample HTTP Upload Download...

Page 64: ...ntent List Delete Delete record which is checked Search Search the particular records based on the specified parameters such as Date Time IP File Name and Account Display records per page Input the nu...

Page 65: ...Sample HTTP Video Stream...

Page 66: ...record which is checked Search Search the particular records based on the specified parameters such as Date Time IP and Account Display records per page Input the number and click on the confirm butto...

Page 67: ...Sample HTTP Request Content...

Page 68: ...content Facebook Chat will show the reconstructed results of chat content between the user and the friend List in his her Facebook account Facebook Games will show game played and the reconstructed Ga...

Page 69: ...ith IP MAC username password server IP and session play back Features in this Telnet GUI Telnet Click on to refresh the page content List Delete Delete record which is checked Search Search the partic...

Page 70: ...View the Telnet Session The following GUI will be popped up when Administrator click the link Record File This GUI acts as a video player Administrator can view the process step by step...

Page 71: ...lete the record that is checked by clicking the Checkbox and Delete button Search Search the Online Game record based on the specified parameters such as Date Time IP Port Game Server IP Game Server P...

Page 72: ...ludes Date Time Account Caller Number Called Number Mode of VoIP VoIP Protocol Type Codec and VoIP Audio File with play back capability Note that this is additional license module Features in this VoI...

Page 73: ...VoIP license which is optional purchase Upload the VoIP license at Registration GUI Browse for the VoIP License licence txt and upload for activation Ensure that you have also started the VoIP Recons...

Page 74: ...ns Features in this Unknown Connection GUI Unknown Connection Lists Refresh the page content List Delete Delete record checked by clicking the Checkbox and Delete button Search Search the Unknown Conn...

Page 75: ...will give more detail regarding the operation modes and how to setup the operation mode properly DNS Setup Setup the Domain Name Server DNS IP The IP can be obtained from your ISP providers System Po...

Page 76: ...ng One is the configuration of management port and the other is configuration of the capture port These two configurations can operate together in one NIC card or separately operate in different NIC c...

Page 77: ...C card labelled Number 2 with port eth1 for management system web telnet access can be connected to the HUB or Switch This section illustrates the way of how to set up the Mirror Mode with the followi...

Page 78: ...up 5 Click on the button Set on Device eth1 or eth2 or eth3 Only one Ethernet port can be set to capture the data Set 3 Finish Setup 6 Click on the button Finished the system will reboot and the netwo...

Page 79: ...y to set up the Bridge Mode with the following diagrams step by step Step 1 Bridge Setup 1 Select and tick the option BRIDGE 2 Select Bridge port 1 and 2 two NIC cards as shown on the following diagra...

Page 80: ...ne visual device called br0 to manage the data It is suggested that Administrator to choose this visual device br0 to capture the data as well Set 3 Finish Setup 6 Click on the button Finished the sys...

Page 81: ...DNS Setup Input the primary and secondary DNS provided from your ISP provider click on the button Reset to set up Shutdown and Reboot Administrator can shut down or reboot the system through this GUI...

Page 82: ...setup allows Administrator to setup the time zone and system time Automatic setup allows Administrator to add additional time server for time synchronization It also allows Administrator to setup the...

Page 83: ...mat Some Samples Setup Sample 1 Record all information captured from IP 192 168 1 10 Key in host 192 168 1 10 Sample 2 Records all information captured from IP 192 168 1 10 and 192 168 1 20 or 192 168...

Page 84: ...includes hard disk capacity utilization and available space size in Gbytes and left Warning message can be configured to be issued to Administrator when utilization reaches the threshold The system m...

Page 85: ...Services Logger Services Set Logger File Size and Sniffer Agent Management System Services This section allows the Administrator to setup the system services such as FTP server packet source module s...

Page 86: ...serving function Full Text Service Engine Allow full text search function search by key word Packet Parsing Module Packets parsing function System Time Synchronizer NTP Allow system time synchronizati...

Page 87: ...ICAP proxy server to be properly configured to send the data to the ICI system for reconstruction Besides this section also allows Administrator to setup raw data reserving function It allows Adminis...

Page 88: ...the ICI system Administrator can export or download these syslog messages by using FTP client with Console username password set Administrator needs to manually calculate the MD5 hashed value from thi...

Page 89: ...ess or subnet that has the permission to access the ICI system 1 Allow Access by Specific IP Address 2 Allow Access by Subnet Sniffer Agent Management If Administrator needs to change the default snif...

Page 90: ...upported by ICI such as MAPI RPC of Microsoft Exchange Server etc Sample Implementation Administrator setup a specific Email account on the Email server where all the Emails received by all Email acco...

Page 91: ...Logger Services This section allows the Administrator to start or stop the logger services protocols decoding and reconstruction...

Page 92: ...P Link Module This section allows the Administrator to activate or de active HTTP Link search function HTTP Content Module This section allows the Administrator to activate or de activate HTTP Content...

Page 93: ...limit for different Internet services which the system will reconstruct and stored Example Set FTP file limit to 10 MB This means if the FTP download upload file size is more than 10 MB the system wi...

Page 94: ...to start the Skype Sniffer Agent service at system service setup page The Sniffer Agent Management page will List out the local network PC IP Address with Skype Agent installed or not yet installed Ad...

Page 95: ...Sniffer Agent Diagram The conversation will contain the text chat and voice call record Note Please ensure the Sniffer Agent purchased has been installed successfully at target user PC Go to Task Mana...

Page 96: ...word Administrator can change the system console client console access by putty or monitor console and FTP access password through this GUI The console account name is default set as admin and not is...

Page 97: ...Backup Modules and Notification Auto Backup Schedule On this section the Administrator can setup the schedule to enable the system to start the backup process automatically at pre defined date time I...

Page 98: ...o define storage days of the reconstructed data files DBtag file after the backup file in ISO format has been created Auto Backup Administrator Notification Once the system complete the automatic back...

Page 99: ...constructed data files DBtag files and backup service categories for backup into ISO format before burning out in to CD DVD or export into external storage Backup ISO files can be burned into CD DVD o...

Page 100: ...ackup ISO file Features in this GUI 1 FTP Host The FTP server IP address where the backup ISO file is to be sent to 2 User The FTP username account 3 Password The FTP password 4 Port Number The FTP po...

Page 101: ...first priority or DATA file as first priority Administrator can reset the setting by click on the Reset button Set 3 Red Threshold and Green Threshold Setting Red Threshold is the hard disk space cap...

Page 102: ...allows the Administrator to inspect each protocol and set the port number value for those service categories where the port number is variable Administrator can add and delete port number manually fo...

Page 103: ...ing on the Add button Administrator can add new port number Click Submit to finalize the adding of port number Delete Port Number By clicking on the port number admin can delete the port number for th...

Page 104: ...n this Online IP GUI 1 Online IP List Click to refresh the Online IP List content 2 Add Delete To create delete and auto search for Online IP 3 Set IP To hide or skip certain IP 4 Import Export IP To...

Page 105: ...tick the IP check box at the Online IP List page Then click on Add Delete Delete to delete the IP record Add Delete Search Administrator can also search for the IP in the organization network by subne...

Page 106: ...ed to this specific IP will not be captured Import Export IP Administrator can import targeted IP List in Excel file format into the ICI system Besides Administrator can also download the IP List Form...

Page 107: ...play the IP addresses skipped and not captured by the system Search IP This section allows the Administrator to search for a specific IP address Search Account This section allows the Administrator to...

Page 108: ...nistrator can start or stop the account detection service for entire network all online IPs or Administrator can even specify to start or stop the account detection service for specific online IP Mail...

Page 109: ...Online IP List Traffic Statistics and Traffic Content Online IP User IP Statistics When click on the User IP Administrator can obtain the Daily Throughput Statistical Report of that particular IP...

Page 110: ...elow diagram will provide you the List or related user accounts of various Internet services for that particular user IP Client Search Click on the following client search will provide you all the tra...

Page 111: ...Online IP Account Statistics Account Statistics will show you the daily throughput statistics of that particular user account...

Page 112: ...Login List It shows all login attempts to the ICI system whether it is a successfully login or a failed login Information obtainable includes IP Login ID Login Date Time and Login Language...

Page 113: ...pgrade the system Step 1 Administrator browses for the update patch file and upload the file to the system Step 2 If upload is successful click on Execution to run the Update process Step 3 Check on t...

Page 114: ...ture allows the Administrator to check on the system main processes status or health condition which includes Sniff Mod OpenRaw Parser Disk Space and Software Version You may refresh or restart the se...

Page 115: ...n Raw Raw data packets service categorization process This process is responsible to categorize raw data according to different services applications protocols Parser Raw data decoding and reconstruct...

Page 116: ...rnet traffic from all domains Create a new domain by clicking on Create and the Domain Setting Windows will pop up Input domain by ex 192 168 1 0 255 255 255 0 Click OK to complete Implementation samp...

Page 117: ...HTTP Webmail and Telnet in the category List Features in this GUI 1 Mode choose what data type you want to delete e g POP3 2 Date Time Delete the data within the period specified 3 Field Specify the r...

Page 118: ...f the actual number of record exceed the threshold specified FIFO theory apply For example The threshold number for the data type POP3 is 50 The actual number of records for POP3 is 55 ED system will...

Page 119: ...ith different visibilities For example the Administrator can create a Group known as Sales Department Visible Group Then the Administrator can define what this Group can view view all or view none or...

Page 120: ...he Administrator to setup the visibility group with different operating authorities by setting up 4 different rules read only recorded record read recorded content read and set the content read and wr...

Page 121: ...This section allows the Administrator to create the users It also allows the Administrator to assign the Group to the specific user created Please refer to screen shot below for the setup of the User...

Page 122: ...Import Export This section allows the Administrator to import or export the users with pre defined setup The template XML format can be downloaded for editing...

Page 123: ...ain the system can send alert Email to the Administrator Administrator can upload the sample alert Email to the system Notification Parameters Administrator can specify the Email account that the aler...

Page 124: ...the Administrator when the pre defined IP has consumed and reached the throughput threshold defined Show Monitored IP Click on the Show Monitored IP link and targets which are being monitored will be...

Page 125: ...ota Edit Monitored IP Admin can edit the monitored IP PC parameters such as Bandwidth GB Client Mail etc Interval Time H The interval time specify the duration that the target IP PC is to be monitored...

Page 126: ...and Account List into the system and allows retrieval or accessing of reconstructed data based on the List Administrator can use Excel csv file which contains the input of user account and MAC to uplo...

Page 127: ...n the Administrator can pre defined the IP Address Type and Account Search by IP Address or Account The Administrator can click on the IP Address or Account to find the data related to that particular...

Page 128: ...e Directory AD server running on the network Administrator can start the AD Server service at SETTING SERVICES Therefore the system will auto retrieve and show the IP and AD Account for all categories...

Page 129: ...ease send the Signature File by email to support level1 com with the subject ICI License File Request Step 3 After Registry has been verified the details it will send the user the license file with th...

Page 130: ...s already pre registered Please check by clicking the registration page You will be able to see the following diagram with the serial no user license and license expiry date You can also check from th...

Page 131: ...ord s search supports full Boolean Algebra concept For full details of Full Text Search please refer to Appendix in this guide string up to 32 words 128 bytes per word AND OR NOT NEAR Logic Applicatio...

Page 132: ...be but by for if in into is it no not of on or such that the their then there these they this to was will with Does not support a single English alphabet search Same concept as Stop Words For example...

Page 133: ...nd display them according to application The key source of search is from Similar Group Words Source SMTP POP3 IMAP WEBMAIL subject from to cc bcc attachments content ICQ MSN QQ YAHOO sender receiver...

Page 134: ...Conditional or Parameter Search The system provides advanced Data Search Conditional or Parameters Search function Information or data recorded can be searched based on different applications and par...

Page 135: ...1 249 FTP User The FTP user account admin P2P Tool The P2P tool use LimeWire P2P File The P2P file name Abc mp3 Game Name The name of the online game Kartrider MSN Account The account of MSN User Han...

Page 136: ...e records of specific source IP Step 1 Type the Source IP 192 168 1 20 and click on the button search Step 2 Result will be shown Step 3 Click on the SMTP icon above the records will be shown as the f...

Page 137: ...ource IP and MSN account Step1 Type the Source IP 192 168 1 20 Msn account she0430 hotmail com and click on the button search Step 2 Result will be shown Step 3 Click on the MSN icon above the records...

Page 138: ...ail com 2 User reference account as she0343 hotmail com and participant reference account aries0724 msn com Instruction When you key in two textbox column the first textbox column is as single account...

Page 139: ...c040201 hotmail com and participant reference account she0430 hotmail com 3 User reference account as diesis ms62 hinet net and participant reference account she0430 hotmail com Instruction When you k...

Page 140: ...she0430 hotmail com and participant reference account dc040201 hotmail com 3 User reference account as she0430 hotmail com and participant reference account diesis ms62 hinet net Instruction When you...

Page 141: ...ccounts without key in participant reference accounts at MSN ICQ YAHOO The data search based on the search parameters of user reference account or participant reference account aries0724 msn com or dc...

Page 142: ...m only 3 multi account then checkbox column will be enabled the data will be searched like as below user reference account dc Level1 com or user reference account web Level1 com then use and combining...

Page 143: ...one user reference account without key in participant reference account at MSN ICQ YAHOO The data search based on the search parameters of user reference account or participant reference account she04...

Page 144: ...hen use and combining the other searching column 2 When you key in the first textbox column as single account dc Level1 com then checkbox column will be selected only participant reference account and...

Page 145: ...ion and input the information to search click on SEARCH and the system will look up the related information in the database and List them down You may select and click on the item Listed It will direc...

Page 146: ...arching for Association or Relationship By clicking on the Association at the Function column of the Listed information you may search for account that is related to this interaction chat email etc Th...

Page 147: ...file size It also allows the Administrator to search for the file using the search function Search for the Captured File Search for a file with the similar content Administrator can also upload a fil...

Page 148: ...low him to view back all the items that he has searched before and with the original search result Whenever the Administrator does a Free Text Search he can bookmark it by clicking the icon on the lef...

Page 149: ...as well as export the bookmark in ISO format The Administrator can use FTP client to access and download the ISO file from the system The Administrator can login to the system by using FTP client with...

Page 150: ...Search for Bookmark Item The Administrator can search for the bookmark item This will show the previously searched and bookmarked record...

Page 151: ...all emails POP3 SMTP IMAP or Webmail from account abc xyz com to himself herself at admin level1 com Alert with Content Administrator can set up the alert parameters based on the different service cat...

Page 152: ...sed requires authentication 4 Account and Password Provides the account name and its password here for authentication 5 The button OK is to submit the setting 6 The button Reset is to clear up the set...

Page 153: ...Alert Sensitive File Administrator can upload certain files to the system If these files are found in any of the Internet content communications alert email can be sent to the Administrator...

Page 154: ...Report Management This section will List out all the scheduled reports setup by the Administrator The Administrator can delete this schedule report delivery setup...

Page 155: ...as delete of record stop of services change of network settings etc It provides information of Date Time event occurred Event Severity Warning 5 Notice 6 and Info 7 Event Type System Event or User Ev...

Page 156: ...llow you to search for particular event according to Event occur Date Time Severity Type of Event and Event Subject Note Do ensure that you turn on Event Log service at System Settings Services System...

Page 157: ...ement Click on Alarm Report Management and the following Windows will appear Input the Alarm Method Subject Mail Receiver Mail Subject and Mail Content and Save Then go to Step 2 Step 2 Setup Create A...

Page 158: ...single application or protocol group of users different online activities as well as various statistical reports Conditional Reports Single Report Step 1 Identify the period that the specific categor...

Page 159: ...Step 2 Click Show Chart...

Page 160: ...art Type Show Top Sort by Clip Change Chart then can display you the type you would like to display Download File The report can be downloaded in chart figure png format Print The report can be printe...

Page 161: ...rnet applications such as POP3 SMTP FTP MSN etc 4 IP Key in IP address manually 5 IP List Administrator can select the IP addresses based on the List of IP displayed 6 Delete All Delete Selected Admin...

Page 162: ...ces Usage Report It shows the number and percentages of different services protocols usage on the network By clicking on the service on the pie chart it will link to List out all the related service a...

Page 163: ...nt network services count By clicking on particular service such as HTTP Page it will direct you to the bar chart of HTTP Page report for last 7 days By clicking on the specific day bar chart for HTTP...

Page 164: ...users on the network By clicking on the TOP 10 of each Listed URL it will direct to the page which shows the IP List that visited the website URL most often From there admin can click on Relations Dai...

Page 165: ...ort It shows the Online IP List and Account with throughput statistics Click on the icon beside the User IP it will show you the relationship of this IP with the accounts or usernames captured from di...

Page 166: ...Click on search client will provide you all the data reconstructed for the particular client or IP Address...

Page 167: ...earch particular keyword on the database and the report can display the number of time count the keyword appears daily for the last one month For example by key in the keywords vic and search for it i...

Page 168: ...Daily Report can be configured to be sent to the Administrator every day at specific time Click on Start at the Status and fill the information such as receiver subject content send time and click OK...

Page 169: ...Bittorrent Protocol BitCometdz uTorrent BitSpirit BitTornado BitLord BitBuddy Flashget 1 81 Azureus BitTorrent BitTyrant ezpeer Gnutella Protocol Foxy LimeWare BearShare eDonkey eMule eDonkey eMule F...

Page 170: ...Hero GrandChase SA CG HB Pangya TS DOMO Mystina Heatproject LoveBox BO ZT DTG SANGO SWDOL FairyLand Superrich Dekaron DOMOFREE King of king 2 OO2jam WOW RICHOL WE5 Seal Cabal RO FongShen COCOCAN Roha...

Page 171: ...dmin can retrieve the ICI system data log via ftp Please make sure that you have configured the FTP Console Username and Password also make sure that you have started the FTP service at Services secti...

Page 172: ...ax format is YYYYMMDD Ex 20080916 time Syntax format is HHMMSS Ex 231020 subject Mail subject from Sender to Recipients cc Carbon copy bcc Blind carbon copy ext File name extension Ex doc txt exe POP3...

Page 173: ...16 time Syntax format is HHMMSS Ex 231020 icqOwner Initiator of message communication icqWhom Participant of message communication Yahoo Messenger type YAHOO account The target account of record srcIp...

Page 174: ...stname Ex www google com tw HTTP File Download Upload type HTTPFILE account The target account of record srcIp Source IP address of record mac Source MAC address of record date Syntax format is YYYYMM...

Page 175: ...tax format is YYYYMMDD Ex 20080916 time Syntax format is HHMMSS Ex 23102 tool Name of on line game Ex WOW Telnet Communication type TELNET account The target account of record srcIp Source IP address...

Page 176: ...n be specified with a pull down menu should not be added to a query string which is subsequently parsed but rather added as a TermQuery clause Terms A query is broken up into terms and operators There...

Page 177: ...arch for text or test you can use the search te t Multiple character wildcard searches looks for 0 or more characters For example to search for test tests or tester you can use the search test You can...

Page 178: ...ents whose titles are between Aida and Carmen but not including Aida and Carmen Inclusive range queries are denoted by square brackets Exclusive range queries are denoted by curly brackets Boosting a...

Page 179: ...f a single document This is equivalent to an intersection using sets The symbol can be used in place of the word AND To search for documents that contain jakarta apache and Apache ICI Inner Search Eng...

Page 180: ...se the query jakarta OR apache AND website This eliminates any confusion and makes sure you that website must exist and either term jakarta or apache may exist Field Grouping Inner Search Engine suppo...

Page 181: ...Technical Support Email support level1 com...

Reviews: