{"id":1038,"date":"2014-09-02T11:02:41","date_gmt":"2014-09-02T15:02:41","guid":{"rendered":"http:\/\/209.208.108.186\/?p=1038"},"modified":"2014-09-02T11:02:41","modified_gmt":"2014-09-02T15:02:41","slug":"filtering-and-identifying-web-activity-by-user-name","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/","title":{"rendered":"Filtering and Identifying Web Activity by User Name"},"content":{"rendered":"<p><a href=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1039\" src=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg\" alt=\"Identifying Web Activity by User Name\" width=\"145\" height=\"145\" \/><\/a><\/p>\n<p style=\"text-align: left;\">When a company implements Web filtering and monitoring software, it typically wants to filter and monitor the Web traffic flowing through its network by user name versus IP address for various reasons. Some of these reasons include curtailing casual surfing, protecting against security threats, and conserving bandwidth. Furthermore, a company\u2019s Acceptable Use Policy (AUP) is usually based on user names and\/or groups of user names. Therefore, the application that enforces and monitors the company\u2019s AUP needs to identify Web activity by user name. IP addresses can be dynamic, and sometimes more than one employee can log on to a computer, and hence, more than one user name will be using the same IP address.<\/p>\n<p style=\"text-align: left;\">Many an IT administrator is tasked with ensuring that the company\u2019s employees are going through<br \/>\nthe proxy that is in place, so that Web activity can be monitored by user name. To get user names<br \/>\nand authenticate users, IT administrators can choose any of the proxy configuration options and<br \/>\nauthentication methods described below.<\/p>\n<p style=\"text-align: left;\">Depending on the company\u2019s preference, one proxy configuration option may be more favorable than the other. Here, we will discuss applying browser settings manually, pushing out group policies using Active Directory (AD), using a captive portal, and installing client software. We will also touch on the different ways that you can authenticate your Internet users using our CyBlock products.<\/p>\n<p style=\"text-align: left;\"><a title=\"Identity Management Tech Brief\" href=\"https:\/\/www.wavecrest.net\/products\/cyblock\/sa\/include\/FilteringIdentifyingWebActivity.pdf\" target=\"_blank\">Read more<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When a company implements Web filtering and monitoring software, it typically wants to filter and monitor the Web traffic flowing through its network by user name versus IP address for various reasons. Some of these reasons include curtailing casual surfing, protecting against security threats, and conserving bandwidth. Furthermore, a company\u2019s Acceptable Use Policy (AUP) is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,24,106,385,89],"tags":[444,119,416,132,446,445],"class_list":["post-1038","post","type-post","status-publish","format-standard","hentry","category-acceptable-use-policy","category-control-internet-access","category-cyblock-appliance","category-cyblock-cloud","category-cyblock-proxy","tag-aup","tag-employee-web-use","tag-filter","tag-ip-adresses","tag-monitor","tag-user-name"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Filtering and Identifying Web Activity by User Name - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Filtering and Identifying Web Activity by User Name - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"When a company implements Web filtering and monitoring software, it typically wants to filter and monitor the Web traffic flowing through its network by user name versus IP address for various reasons. Some of these reasons include curtailing casual surfing, protecting against security threats, and conserving bandwidth. Furthermore, a company\u2019s Acceptable Use Policy (AUP) is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-02T15:02:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Filtering and Identifying Web Activity by User Name\",\"datePublished\":\"2014-09-02T15:02:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/\"},\"wordCount\":241,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg\",\"keywords\":[\"AUP\",\"employee web use\",\"filter\",\"ip adresses\",\"monitor\",\"user name\"],\"articleSection\":[\"Acceptable Use Policy\",\"Control Internet Access\",\"CyBlock Appliance\",\"CyBlock Cloud\",\"CyBlock Software\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/\",\"name\":\"Filtering and Identifying Web Activity by User Name - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg\",\"datePublished\":\"2014-09-02T15:02:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Filtering and Identifying Web Activity by User Name\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Filtering and Identifying Web Activity by User Name - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/","og_locale":"en_US","og_type":"article","og_title":"Filtering and Identifying Web Activity by User Name - Wavecrest Blog","og_description":"When a company implements Web filtering and monitoring software, it typically wants to filter and monitor the Web traffic flowing through its network by user name versus IP address for various reasons. Some of these reasons include curtailing casual surfing, protecting against security threats, and conserving bandwidth. Furthermore, a company\u2019s Acceptable Use Policy (AUP) is [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2014-09-02T15:02:41+00:00","og_image":[{"url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Filtering and Identifying Web Activity by User Name","datePublished":"2014-09-02T15:02:41+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/"},"wordCount":241,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg","keywords":["AUP","employee web use","filter","ip adresses","monitor","user name"],"articleSection":["Acceptable Use Policy","Control Internet Access","CyBlock Appliance","CyBlock Cloud","CyBlock Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/","url":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/","name":"Filtering and Identifying Web Activity by User Name - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg","datePublished":"2014-09-02T15:02:41+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#primaryimage","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2014\/09\/identity-crisis-300x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/filtering-and-identifying-web-activity-by-user-name\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Filtering and Identifying Web Activity by User Name"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=1038"}],"version-history":[{"count":7,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1038\/revisions"}],"predecessor-version":[{"id":1046,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1038\/revisions\/1046"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=1038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=1038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=1038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}