Avatar of Pau Lo
Pau Lo
 asked on

Inappropriate use of Internet access

I am looking for some guidance on potential watermarks/triggers for misuse/overuse of internet activity by internal staff. We have a websense installation in place that blocks the company deemed inappropriate categories.

1) In your organisations do you go any deeper than the block certan categories policy, i.e. do you still review inappropriate access

2) Could you provide a top 5 watermarks/triggers for identifying potential misuse of internet access?
Network AnalysisNetwork Management

Avatar of undefined
Last Comment
Darr247

8/22/2022 - Mon
ASKER CERTIFIED SOLUTION
Randy Downs

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
Pau Lo

ASKER
Thanks, but we have a policy similar in place, it was more specific triggers we could switch on to identify users who are abusing the internet access in works time. And some feedback on useful triggers that we could look to use.
SOLUTION
Darr247

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
William Peck