Configurating the Logging policy is important for school safeguarding. It tracks user activity, including applications, websites, and keyword detection, ensuring proactive intervention and a secure learning environment.


Create a Policy

  1. Navigate to your Admin Centre and then "Logging" and "Policies":

    A screenshot of a login screen

Description automatically generated

  2. Once located click on "Create Policy"



Configure Policy Settings

  1. Type a name for this policy in the below box and select the site and group you wish to monitor, in our example we are applying the logging policy to Devices that are under 'Student Devices' within the Site 'Test Academy 01' You can also just apply to the entire site 'Test Academy 01' without selecting a sub group to include all devices.



  2. Toggle the relevant settings that you require

Enabled: Determines whether the policy is active or inactive.

Enforced: Ensures that this policy overrides all other configured logging policies.

Mergeable: Allows this policy to be combined with other active logging policies.

Overridable: Permits other policies to take precedence over this one.

       3. Configure Policy Items

Monitor Keystrokes

  • Purpose: Enables the monitoring of keystrokes within specified applications and web activity.
  • How to Configure: Toggle this setting to enable or disable keystroke monitoring.

Web Activity Action

  • Purpose: Allows the client to monitor and log the website activity on devices.
    How to Configure: Select the appropriate action from the dropdown menu. For example, "Log and Block" will log the websites visited and allow the ability to block website URLs.



Application Exclusions

  • Purpose: Exclude specific applications from keystroke monitoring.
  • How to Configure: Enter the process names (e.g., chrome.exe) of applications that should be exempt from keystroke logging. These applications will not be monitored.

Title Exclusions

  • Purpose: Exclude specific window titles from keystroke monitoring.
  • How to Configure: Input window titles (e.g., Notepad++) to be excluded. Keystrokes in these windows will not be logged.

SSL Application Inclusions

  • Purpose: Specify applications that should be included in SSL inspection.
  • How to Configure: List the process names of applications that require SSL inspection. Only these specified processes will undergo SSL inspection.

SSL Application Exclusions

  • Purpose: Exclude specific applications from SSL inspection.
  • How to Configure: Enter the process names that you want to exclude from SSL inspection. These applications will not be inspected for SSL traffic.

SSL URL Exclusions

  • Purpose: Exclude specific URLs or IP addresses from SSL inspection.
  • How to Configure: Specify the URLs or IP addresses that should be exempt from SSL inspection. Traffic to these addresses will bypass SSL inspection.

Safe Search

  • Purpose: Filters explicit content from search results by enforcing Safe Search on supported search engines.
  • How to Configure: Toggle this setting on to enable Safe Search and filter out inappropriate content.

Filter TCP Ports

  • Purpose: Monitor web traffic on specific TCP ports.
  • How to Configure: Specify the TCP ports (e.g., 443 for HTTPS, 80 for HTTP) that should be monitored. Web traffic through these ports will be inspected.

4. Custom Rulesets

 

Select the Custom ruleset you want to activate for this logging policy.

 

Custom rulesets include keywords that trigger violations bespoke to your portal. To learn how to configure them, click here.


A screenshot of a computer

Description automatically generated


Global Rulesets

 

Choose which Global rulesets you would like to be active with this logging policy. These are categories that are supplied by our safeguarding team, these contain pre-set keywords that can be unsafe and harmful to students.


A screenshot of a computer

Description automatically generated


Warning: Enable the libraries you wish to use but be aware that enabling "CTIRU URLs" or "IWF URLs" will trigger inspection on all websites. 

 

Once you have populated the settings you require, click 'Save' and these settings will then be applied to devices.


Now we can move onto setting up the email notifications, please see here