Best ways to control/monitor internet access

Posted on 2011-04-22
Last Modified: 2013-12-06
Have a consulting customer that is using a Win2008R2 server environment.  Router is the router provided by charter communications.  It is not a CISCO but a more limited type of router.  They desired to monitor/log and/or control internet access.

What are the best tools to use for this purpose and estimated costs?  I have heard about surfcontrol in the past, which is a software solution as I recall and the Iprism appliance from St. Bernard Software.  We use the Iprism appliance in our office currently and have liked what it provides.

Any suggestions on other tools, either appliances or software, and the pros/cons of each.

Question by:cwsoft05
    LVL 29

    Accepted Solution

    Track4win works pretty good at monitoring/controlling. It costs $14-$40/user depending on the number of users
    LVL 9

    Assisted Solution

    by:Sean Meyer
    I like the Watchguard Firewall solutions -- Newest version gives you the ability to log and drill down to user level through integration with your active directory.

    $300 for wired solution $375 for wireless. Not sure of additional costs for the software. I know for my products it is free for the first year.
    LVL 3

    Assisted Solution

    With the SonicWall TZ210 and higher (with the new FW 5.8) you can control trafic on user level. You can use local users or connect to AD.
    The price is 830 euro incl 1year subscription.

    Featured Post

    Highfive + Dolby Voice = No More Audio Complaints!

    Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

    Join & Write a Comment

    If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    24 Experts available now in Live!

    Get 1:1 Help Now