Hospitals prohibit network games, chat QQ network management software

The Bailiwick LAN Control Software

The Bailiwick LAN Management Software is the newest monitoring software released by Shanghai Bailiwick Information Technology Company Limited, which integrates the functions of network monitoring, security auditing, email monitoring, chat monitoring, and so on.

1. A machine to monitor the whole network:

"Bailo Network Police" LAN management software is only installed on a computer, do not need to install the client, you can for the network address of any computer on the whole network across VLAN, cross-platform, cross-router, cross-switch personalized monitoring, and at the same time, you can easily realize the IP address and the network card binding, machine name and network card binding, so that the client can not change the IP and the machine name at will. At the same time, it can easily realize IP address and network card binding, machine name and network card binding, so that clients can't change IP and machine name freely. The system also comes with five languages: Simplified Chinese, Traditional Chinese, English, Japanese, and Korean, which can be freely switched at will without generating any garbled code.

2. Personalized management of each computer:

Can be personalized for each computer bandwidth control, you can control each computer in the daily or weekly Internet access to the total amount of time or the total flow of uploads and downloads of bytes per computer per minute or unit of time speed control, but also can be separately on the TCP bandwidth, UDP bandwidth, ICMP bandwidth, IGMP Bandwidth, WEB bandwidth, FTP bandwidth, email bandwidth, QQ bandwidth, MSN bandwidth, YAHOO! bandwidth, ICQ bandwidth, POPO bandwidth, UC bandwidth for the detailed management of the above traffic control, while the user is also able to control the management of bandwidth traffic and traffic alarm information to understand the network traffic conditions and to prevent the virus from further damage to the network.

3. Complete Chat Monitoring:

Complete monitoring and recording of MSN, Yahoo!

4. Super email monitoring:

Complete monitoring and recording of any email content and attachments sent through the WEB page, complete backup of any email content and attachments sent and received through OUTLOOK, FOXMAIL, etc., and the entire email monitoring module completely eradicates the common problem of missing captured emails, messy codes, and the inability to accurately restore the display of the common problem, whether it is HTML format emails or text format emails, it is also a good way to monitor the content of the email. The whole email monitoring module completely eradicates the common problem of missed emails, messy codes and inability to accurately restore the display, no matter it is HTML format emails or text format emails can be accurately analyzed and perfectly restored, and at the same time, it can also backup and record the contents of the files uploaded and downloaded through FTP and HTTP.

5. Complete page monitoring:

You can monitor the pages that users browse, and restore all the WEB pages that users browse to a complete backup, including the use of passwords to log in, and the pages that can not be viewed through the URL connection, which fully compensates for the major loophole of the way to view the pages through the URL connection restore, and really achieve a complete record of the WEB pages, which makes up for the inherent weaknesses of the monitoring software. It makes up for the inherent shortcomings of monitoring software.

6. Real-time online dynamic logs:

Dynamic display of all the machine's real-time Internet information, chat, QQ information, e-mail logs, upload and download logs, real-time traffic statistics, online alarms and online real-time monitoring of a machine or a group of machines online behavior, online alarms in real time to reflect the network of undesirable conditions, so that the network security The online alarm information reflects the adverse conditions of the network in real time, so that network security and hidden dangers can be found and solved at the first time, online dynamic display of the current online and offline machines as well as real-time traffic statistics, so that the manager of the entire LAN computer usage status and network traffic at a glance.

7. Prohibit WEB Paste and Email Outgoing:

Without affecting the normal Internet access, you can completely prohibit webpage paste, forum message, WEB mail and other outgoing behaviors through the HTTP protocol, so that administrators are no longer worried about inappropriate online speech, and no longer worry about technical trade secrets leaked through the Internet.

8. Blocking BT, eDonkey, and emule:

You can block BT, eDonkey, emule, and other BT download tools to prevent your network bandwidth from being consumed. It can monitor MSN, Yahoo!, ICQ, QQ, NetEase Bubble and other P2P instant messengers.

9. Remote control management:

You can manage the whole system remotely, not only can you realize multi-user remote operation at the same time, but also by assigning different management privileges to different levels and users, you can realize multi-level and multi-user remote operation and control of the system, so as to make the whole Internet management organized and hierarchical.

10. Prohibit file uploading and downloading:

Prohibit all file uploading and downloading via HTTP or FTP protocol. Various forms of control can be carried out for various types of upload or download file formats, so that the control of upload and download management is more flexible and targeted.

11. Advanced Email Monitoring:

You can send emails via SMTP protocol and receive emails via POP3 protocol with any kind of blocking control. You can send emails via SMTP protocol with any kind of control on sending and receiving mailboxes, such as you can only send emails to the specified mailboxes or specified mailboxes can be sent. You can perform arbitrary blocking control on the sending and receiving mailboxes of emails received through POP3 protocol, such as: you can only receive emails to the specified mailboxes or the specified mailboxes can be received only.

12. Based on the physical layer to control the seven layers of management:

Can manage the physical storage MAC address, can be arbitrary control of IP address management, you can only allow through the specified IP can also block the specified IP segment; based on the transport layer control, can be arbitrary control of the port management, you can only allow through the specified port, you can also block the specified port range, you can also specify the application of the port can only be sent or received.

Advanced Mode
Advanced mode provides a more comprehensive UEFI BIOS environment that is designed specifically for overclockers and power users who want maximum control over their PC's hardware.

13. Time Period Management:

: You can set up any management rules to control and manage any groups and individual machines in any time period, which is flexible and convenient to operate, and enables the administrators to achieve maximum personalized control and management of the Internet; you can set up idle settings for IP addresses so that other machines can't use them, and you can also set up release settings for VIP machines to do no monitoring at all. It also allows you to set the IP address to idle so that no other machine can use the IP address, and to set the VIP machine to idle without any monitoring, and to set the related URLs or ports to idle without any monitoring, which is really a good idea for the enterprise as a monitoring software.

14. Perfect filtering URL library management:

The program comes with ten major URL libraries such as pornographic reaction library, chat library, game library, finance and securities library, search engine library, recruitment library, movie and leisure library, URL keyword library, portal library, custom URL library, and so on, and the user can also manage the corresponding ten custom URL libraries by himself, and ten system libraries work together to complete the URL filtering work of the whole Internet management. The user can also manage the corresponding ten custom URL libraries, and ten system libraries work together to complete the URL filtering work of the whole Internet management.

15. Keyword-based control:

As long as the URL contains a set of keywords, it can be filtered through the keyword filtering not only can be set not allowed to go on that type of website with keywords, but also can be set to only be allowed to go on the website with a certain keyword, that is, to specify the mode of surfing the Internet.

16. Statistical query of Internet access information:

The complete record of all machines' Internet access information can be queried statistically, including machine name, source MAC address, source IP address, source port, destination MAC address, destination IP address, destination port address, operation type, service type, protocol type, title, content and time.

17. Perfect Statistical Query System:

Web browsing, web posting, file uploading, file downloading, sending mail, receiving mail, web sending mail, game logging, remote login, QQ chat, MSN chat, ICQ chat, YAHOO chat, P2P information, alarm information, page monitoring and other service types can be queried separately. It can also be used as a tool to help users to get the most out of their PCs.

18. Convenient and practical log export function:

Enables administrators to export monitoring logs for unified storage or analysis. All log files can not only save as a text file , but also can be saved as an EXCEL file , and can be printed out .