In the last chapter, we saw how network administrators can block intranet users from visiting objectionable sites on the intranet using server software. But in many cases, intranet administrators want to do much more than simply block users from visiting objectionable sites. They may also want to track the overall usage of the Internet from inside the intranet, and be able to see in exquisite detail exactly how the Internet is being used-for example, to see the times of the greatest access, or which departments and subnets make the greatest use of the Internet. And they may want to track not only how people on the intranet are accessing the Internet, they may also want to see how they are using the intranet itself.
All that can be done-and a lot more-using intranet monitoring software. This is software that sits on a server, and monitors all traffic between the Internet and the intranet. It can also monitor all traffic on the intranet itself.
The software works by examining every IP packet coming into and going out of the intranet. It looks into both the IP header and at the data itself. The intranet administrator decides what kind of traffic to track. For example, access to intranet and Internet Web servers; FTP (File Transfer Protocol) usage; access to newsgroups; use of e-mail; and Telnet could all be tracked using this software. The monitoring software can then log all that traffic in extraordinary detail. It can track the destination address as well as the originating address; the amount of data transferred; the time of day; and many other pieces of data. All that data is automatically put into a database that intranet administrators can use to create reports of just about any type.
This information can help intranet administrators in many ways. It can help them know when new bandwidth needs to be ordered or new servers need to be installed. And it can also tell them if inappropriate sites are often visited.
Some monitoring software goes beyond merely tracking usage, and allows administrators to set access rules for the entire corporation or for individual departments. For example, it will allow network administrators to lock out certain sites from the entire corporation, such as those that have pornographic material on them. And it can let them decide on a department-bydepartment basis what kind of Internet access should be allowed.
While this type of software is certainly helpful to intranet administrators, some intranet users may be leery of it. They may think that it has a "Big Brother" feel to it, that intranet administrators are violating their privacy, or watching in detail how they use their computers. While that is a possibility, when used correctly the software can help to make sure that the network is functioning at top efficiency, and not to snoop into other people's lives.
Server software is available to allow for extensive monitoring of how intranet users access the Internet. Administrators may find it useful to know, in general, what kinds of sites are being visited, and may even want to track what sites individual users are visiting. It is possible to do much more detailed analysis as well, including how much individual users access the Internet, what hours are most heavily trafficked, and much more. The software can also customize how people are allowed to access the Internet and/or the intranet. All outgoing and incoming traffic must pass through the monitoring machine.