Mon - Fri 9:00 AM – 5:00 PMClosed on weekends

Monitor and control web activity

Uncontrolled web activity can impact productivity, lead to malware infections, increase costs and potential legal liabilities, as well as a bruised company image. GFI WebMonitor delivers unique web filtering capabilities by combining application-based traffic filtering with a website categorization functionality. Together they allow accurate control over what users are doing online and the applications they are using.

Manage bandwidth and internet usage

Browsing websites like YouTube and spending time on social media sites like Facebook can take up a huge chunk of bandwidth. GFI WebMonitor’s bandwidth control capabilities help administrators manage how that bandwidth is utilized and, in turn, reduce costs. Intuitive dashboards give a clear, detailed picture of how much bandwidth goes into productive activities, and how much of it is wasted on fruitless browsing. Then take full control over how it should be used.

Secure downloads and web browsing

Protecting the network against web-based threats is a major challenge for IT and security admins. Ignoring the dangers of online activity can lead to malware infections or data breaches. As a result organizations could incur heavy costs, poor productivity, downtime, compromised business-critical information and increased IT costs to repair the damage. Don’t let your reputation be tarnished if you can prevent it. GFI WebMonitor scans downloads in real-time using up to 3 antivirus engines to ensure malware-free downloads.

Increase productivity

Reduce time wasted by employees online through the granular management of their browsing habits.

Maximize available bandwidth

Set time and bandwidth thresholds, block streaming media, and gain via proxy caching.

Monitor HTTPS traffic

Protect against malware masking itself in HTTPS traffic, and block attempts to circumvent web filtering.

Immediate ROI

Reap financial rewards immediately by controlling employees’ Internet usage.

Proactively protect your network

Control downloadable file types, scan downloads using multiple antivirus engines and block known malicious sites.

Manage social media use

Facebook is one of the most popular sites on the whole internet, but is it where your employees should be?

Prevent data leakage

Block socially-engineered phishing websites and other online scams by controlling Internet access.

Filter internet use

Create and enforce an Internet usage policy to filter websites based on a list of over 280,000,000 domains.


Network traffic setup

  • Two Network Interface Cards (for Gateway mode only)
  • Router / gateway that supports traffic forwarding or port blocking (for Simple Proxy mode only)

x86 architectures

  • Processor: 2.0 GHz
  • RAM: 4 GB
  • Hard disk: 12 GB of available disk space

x64 architectures

  • Processor: 2.0 GHz (multi-core recommended)
  • RAM: 8 GB
  • Hard disk: 12 GB of available disk space

NOTE: Allocation of hard disk space depends on environment. The size specified is the minimum required to install and use GFI WebMonitor. The recommended size is between 150-250 GB.


Supported operating systems – server side

GFI WebMonitor can be installed on (x86/x64) versions of:

  • Windows Server 2016
  • Windows Server 2012 (including R2)
  • Windows Server 2008 (including R2)
  • Windows SBS 2011
  • Windows SBS 2008
  • Windows 10
  • Windows 8/8.1
  • Windows 7
  • Windows Vista SP2 or higher

NOTE: Transparent Proxy mode can only be enabled on certain operating systems. Click here for more information.

Other required components - server side

  • Microsoft Internet Explorer 10 or later, Mozilla Firefox (v31 or newer) or Google Chrome (v36 or newer) – for the main product console.
  • Microsoft .NET Framework 4.5.2 or newer
  • IMicrosoft IIS Express
  • Routing and Remote Access service on Microsoft Windows Server (for Gateway mode only)
  • Microsoft SQL Server Express 2005 or later
  • Microsoft SQL Server 2005 or later (for reporting purposes)

Knowledge base

Browse the GFI OneGuard knowledge base.

Monitoring the Web: It is all about security and nothing but security

Monitoring Web traffic within an organization is not only a major component of the security software and service architecture, but is also an important part of security policy. This white paper examines why organizations not only need to implement clear IT policy to support Web monitoring, they also need to reinforce this with clear training and communication.

Web security: 10 steps to effective web security

Achieving comprehensive Web Security is not a trivial task. The threat landscape of the Web is complex and ever evolving … and implementing mechanisms to mitigate threats coming from the various risks is a difficult task.

Web reputation: How it can help increase your online protection

Web Reputation is the latest method in use to boost protection against current to future malicious content on the web for those browsing the Internet. Using Web Reputation, websites are assessed for immediate and potential threats, malicious content and risky characteristics and a score (0 – 100) is given.

Internet use in SMBs: Towards a comprehensive internet security strategy for SMBs

Small and medium-sized businesses (SMBs) need a comprehensive Internet security strategy to be able to protect themselves from myriad web-based threats. Defining and implementing such a strategy requires proper preparation, a clear understanding of the technologies and methods that can be adopted, a good user-education program and a proactive approach to security.

GFI and FB Security Group does not do any form of refund. We encourage and highly recommend that you take advantage of their “Try before you buy” policy: Use the 30-day free trial period to thouroughly test and evaluate the product before purchasing.