https://store-images.s-microsoft.com/image/apps.47399.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.5a809ecc-3770-4bb7-acd5-c5df05940ef6

Web Filtering Proxy

Diladele B.V.
Web Filtering Proxy for Azure Cloud
https://store-images.s-microsoft.com/image/apps.49576.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.e3aefef1-b24c-4cf5-8376-62a38249a595
https://store-images.s-microsoft.com/image/apps.49576.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.e3aefef1-b24c-4cf5-8376-62a38249a595
https://store-images.s-microsoft.com/image/apps.11254.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.9945cf7c-35f4-41d9-9587-95f275e858db
https://store-images.s-microsoft.com/image/apps.48233.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.6b5a0fa1-dfee-4a7d-aeba-2c4ed6ed08f1
https://store-images.s-microsoft.com/image/apps.47690.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.69482ff3-4f4f-449e-ab42-5a9ad63d0187
https://store-images.s-microsoft.com/image/apps.49673.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.809be21a-3982-4bd5-81e5-7e49aa00b287

Web Filtering Proxy

Diladele B.V.

Web Filtering Proxy for Azure Cloud

Web Filtering Proxy for Microsoft Windows is a new implementation of a classical web proxy running natively on Microsoft Windows. It can be easily integrated with Microsoft Active Directory, work as Secure Web Proxy, decrypt HTTPS traffic, filter HTTP requests and responses and inspect contents of downloaded HTML pages. This offer will be of great interest to the network administrators for all levels of businesses who need to quickly deploy secure cloud based HTTPS proxy for the roaming business users, ensure company policy compliance by inspecting HTTPS traffic, block access to inappropriate web sites and prohibit file downloads. Filtering levels can be adjusted for different groups of authenticated users, Active Directory security groups, IP addresses, subnets or address ranges. The application works transparently for any endpoint device and requires minimal device-specific configuration. The application can be easily deployed on terminal servers and is able to enforce different levels of filtering for different groups of terminal users. Access logs of traffic monitor module allow administrator to see the list of most visited sites, URLs and quickly identify connections consuming most bandwidth. Extensive graphical reports provide complete picture of web traffic within a network. The application is managed using convenient and easy Microsoft Management Console snap-in.
https://store-images.s-microsoft.com/image/apps.49576.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.e3aefef1-b24c-4cf5-8376-62a38249a595
https://store-images.s-microsoft.com/image/apps.49576.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.e3aefef1-b24c-4cf5-8376-62a38249a595
https://store-images.s-microsoft.com/image/apps.11254.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.9945cf7c-35f4-41d9-9587-95f275e858db
https://store-images.s-microsoft.com/image/apps.48233.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.6b5a0fa1-dfee-4a7d-aeba-2c4ed6ed08f1
https://store-images.s-microsoft.com/image/apps.47690.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.69482ff3-4f4f-449e-ab42-5a9ad63d0187
https://store-images.s-microsoft.com/image/apps.49673.7fde68b7-28c6-46f9-8f28-912460ceb61e.d9646e6c-16b6-4a89-ba1a-57347d724713.809be21a-3982-4bd5-81e5-7e49aa00b287