Demand: There was a need to restrict access to inappropriate sites for better use of the Internet link and information security.
Implantation: It was used as a solution with a Debian Linux server and a Squid proxy server. As the company already had a server infrastructure with Microsoft PDC and as there was the need to create custom ACLs and user access report AD was used as an integrated authenticator. For access reports, Sarg chose to identify the users according to their access.
Conclusion: Goals were achieved because access was controlled and navigation reports are accessed through a restricted access dashboard.