Want to block distracting websites, monitor internet use, and keep your network secure against web-based threats? This list of the best internet filtering software covers website blocking solutions that are suitable for businesses, parental control, Mac users, and more.
This list of the best software to block websites spans across parental control apps and browser extensions for home users that want to easily block sites, web filtering software for small businesses that want to prevent access to high-risk and distracting sites, and enterprise-level website blockers with advanced security features.
Looking for more tools? Check out our list of the best USB control software and the best employee monitoring software
Notes:
Last Updated: 28 March 2023
BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements – no matter where their users are located.
With BrowseControl you can ensure a safe and productive environment by blocking high-risk, distracting, or inappropriate websites, improve network performance by blocking bandwidth hogs, and prevent users from using unsanctioned applications and software-as-a-service providers
BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.
BrowseControl’s central console allows you to configure your security policies from the convenience of a web browser.
With BrowseControl you can Block or allow websites based on URL, category, domain, or IP address, assign custom policies for each group of computers or users, prevent users from launching specific applications, and block network ports to reduce the attack surface of your network
There are three key methods for blocking websites with BrowseControl:
The Blocked List allows you to block specific websites based on URL, domain, or IP address
Category Filtering allows you to block millions of websites across over 100 content categories including pornography, social media, and virus-infected sites.
and finally, you can use the Allowed List to allow specific websites that would otherwise be blocked based on their category, or for the greatest security and control you can block all websites except for those that are on the Allowed List.
When your users try to visit a blocked website they can either be presented with a custom warning message or directed to another site, such as a page with a reminder of your organization’s internet use policy.
With BrowseControl’s App Blocker you can prevent your users from launching specific applications.
Simply select the group you would like to restrict, enter the Original Filename of the application to the Application List, and add it to the blocked applications list.
When the user tries to launch the blocked application they can be presented with a custom warning message that alerts them of the restriction.
BrowseControl is best used in tandem with our computer monitoring software BrowseReporter. Using both solutions provides the visibility and control you need to ensure that your organization’s computers are being used appropriately.
Don’t let internet abuse run rampant in your organization. Take back control over web browsing with a free trial of BrowseControl.
Get started today by visiting CurrentWare.com/Download
If you have any technical questions during your evaluation our support team is available to help you over a phone call, live chat, or email.
Thank you!
BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements—no matter where their users are located.
With BrowseControl web filtering software you can…
BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.
BrowseControl is exclusively available on Windows. It supports Active Directory import and sync that allows you to manage your users with your existing organizational units.
BrowseControl uses an internet filtering software client to enforce internet use policies on devices no matter which network they are connected to, making it the ideal solution for protecting remote workers.
BrowseControl has been verified as Citrix Ready. The internet filtering software can be installed on premises or to the cloud on a self-managed cloud virtual machine
BrowseControl is a module within the CurrentWare Suite. When purchased as a standalone module its pricing starts at $3.99 per license per month, paid annually.
The full CurrentWare Suite starts at $8.99 and provides additional modules for internet use monitoring, data loss prevention, and remote PC power management.
Discounts are available for prepayment and bulk licensing, managed service providers, and nonprofit/educational organizations.
A free trial of BrowseControl is available for 14 days and 10 computers.
Learn More: BrowseControl pricing and licensing FAQ
The Tennessee College of Applied Technology (TCAT) is one of the best technological educational institutions in the Tennessee area. To keep delivering a cutting-edge learning experience, TCAT Crump knew that they needed to integrate online resources into their curriculums and teaching methods.
But allowing internet access into a network is not without its risks. As an information technology instructor, Gabriel Alvarado is adamant that educational institutions need to defend against unauthorized access to personal information belonging to pupils, parents, or staff.
Gabriel knew that restricting internet access with the best internet filtering tools they could find was essential for protecting their students and network against web-based threats.
In addition to improving internet security, BrowseControl provided TCAT students with an optimal educational experience by blocking distracting websites during class hours and preventing bandwidth hogs from impacting the performance of the network.
BrowseControl’s convenient remote installation options and central management console made it the best internet filtering software for TCAT as they could deploy the software during the school term rather than having to wait until the holidays.
Staff and user accounts could be readily distinguished, allowing web filtering policies to be customized to the needs of each group.
BrowseControl’s central console allows you to configure your security policies from the convenience of a web browser.
With BrowseControl you can…
Block websites based on URL, category, domain, or IP address
Assign custom policies for each group of computers or users
Prevent users from launching specific applications
and Block network ports to reduce the attack surface of your network
There are three key methods for blocking websites with BrowseControl:
When your users try to visit a blocked website they can either be presented with a custom warning message or directed to another site, such as a page with a reminder of your organization’s internet use policy.
Learn More about BrowseControl’s features
”As a ‘novice’ I was able to set up with help from support in about an hour. Previous software took forever and didn’t work as advertised; this software worked right out of the box. It allows my workers to use the internet and make money for the practice without distraction/temptation to use personal websites/email/shopping.”
Gerard B., Office Manager, Capterra (2019)
“Browsecontrol is the best software for internet filtering. We can block specific websites and applications from the organization’s computer and internet. We can add and remove the restrictions instantly is a great feature. They have great customer support to solve our queries.”
Ajoob S., Engineer Trainee, Capterra (2022)
“We use Browse control and other CurrentWare products as an essential part of our security practices. I like the product, and it works great. We have utilized CurrentWare for the last eight years, and I’ve no complaints. Responsive support and willing to take feedback and suggestions. Highly recommended”
Anonymous Verified Reviewer, Capterra (2022)
The system works very well. Features like being able to provide a custom block screen are great. Being able to rename the system from the actual PC name helps to better identify the system in the admin interface. You can create a custom installer for client systems. It’s easy to update the client settings, and to import settings from an existing client to a new one.”
Ethan C., Director of Operations, Capterra (2022)
“The purchase and on boarding process was very smooth and customer support is very efficient . I had an executive who helped with the renewals although it was a non working day in his country , I would recommend it to anybody. The software is easy to install and was cheap to purchase and Cost wise very high ROI.”
Anoop P, System Administrator, Capterra (2022)
Last Updated: 13 April 2022
Cold Turkey is a personal productivity improvement tool that allows you to block distractions such as unproductive websites or applications until a certain time. It is used by people that want to improve their productivity by enabling distraction-free sessions for their projects.
With Cold Turkey, you can readily limit screen time, temporarily block any distracting website you want, and even block distracting apps.
There is a free version of Cold Turkey that only blocks websites, as well as a perpetually licensed paid tier that introduces added features such as app control, passwords, user-based filtering profiles, and internet scheduling.
Cold Turkey’s browser extensions, ease of use for individual users makes it the best internet filter for personal productivity, preventing access to inappropriate websites, and limiting screen time.
Learn More: Cold Turkey System Requirements
*Firefox, Safari, and Google Chrome extension
The free version of Cold Turkey allows you to block websites, set website exceptions (allow list), configure timed blocks, and view device usage statistics.
The pro version (Blocker Pro) is only $49.00 CAD (~$38.84 USD) for a lifetime perpetual license, with only one purchase needed for all computers that you personally use. Students can request 20% off by going to the support page and clicking the link in the FAQ.
The pro version includes the following additional features:
Adding facebook.com to the block list will block all web pages on Facebook including subdomains.
Block websites based on predefined content categories.
Some web filters require you to block an entire website, which is troublesome if you want to block a website while allowing specific pages in that site.
With Cold Turkey you can granularly block or allow specific URLs in addition to blocking an entire website. You can also allow only a category of websites.
If the internet as a whole is a distraction you can prevent internet access entirely, forcing you to only focus on non-internet resources.
When a website is blocked, you’ll see a motivational quote to remind you that you should be working. The block page can be customized in the pro version.
Lock, log off or shut down your computer for a set period of time. This feature makes it easy to schedule time away from your workstation for a break or a quick walk.
In order to be an effective personal productivity tool, Cold Turkey provides web filter bypass protection to prevent users from simply disabling the filter and resuming their unproductive habits.
In the free version of Cold Turkey blocking policies will apply to the computer, including other users of the device. With the pro version you can enable user-based blocking to apply the restrictions to one user without affecting other users.
Note: As of April 2022 you cannot apply different filtering policies to each user with Cold Turkey.
With the Statistics Tab you can keep track of what websites and applications you spend time on so you can better understand which websites are distracting you.
“Super flexible and hard to trick”
Anonymous, AlternativeTo.net
“It helped me avoid lots of distractions!”
alxh28, AlternativeTo.net
“The greatest blocking distractions software ever.”
Helldorado, AlternativeTo.net
“Cold Turkey Blocker now costs double what it was when I first used it a couple of years ago. In addition, coupons are no longer offered unless you’re a student. The price hike is consumer unfriendly and I will have to think about continuing my support of this app.”
Jake Salzer, TrustPilot.com
“Easy setup and I love all the included lists of websites. You can block porn, distractions, news, movies and videos, games, and a variety of other things with a click of a button. Also, the scheduled blocks are easy to set up and really help a lot. Great customer service and everything was thought of. For example, the cold turkey website has a built-in timer to make sure that you can’t disable the program.”
Natanel Rozic, TrustPilot.com
As Cold Turkey is a consumer-grade product that is independently developed and supported by a single person the support offered is not as robust as what would be expected from an enterprise-tier product.
That said, the Cold Turkey website offers a convenient FAQ, user guide, and contact form that gets responded to within a few business days. These support options are perfectly suitable for a simple consumer-grade product like Cold Turkey.
Last Updated: 13 April 2022
Forcepoint (formerly Websense) provides a class of security solutions known as “Next Generation Firewalls” (NGFW).
These products build upon the protocol/packet filtering capabilities of traditional layer 3/layer 4 firewalls with added features such as deep-packet inspection, intrusion prevention, and added intelligence about potential threats to the network.
Forcepoint’s NGFW provides security and visibility across physical, virtual, and cloud systems with an integrated firewall/VPN, IPS, and layer 2 firewall.
Due to Forcepoint’s NGFW’s complexity of deployment and the cost of implementation it is best suited for large enterprises with a significant IT budget and the resources to dedicate IT staff to deploying and managing the solution. It would not be the best internet filter for small businesses without dedicated IT personnel.
See Also: Forcepoint alternatives for internet filtering and employee monitoring and Kaspersky alternatives
Forcepoint NGFWs can be deployed for internet filtering in a variety of ways (e.g., physical hardware appliance, virtual/cloud appliances, etc), with multiple products managed from a single console
They support cloud infrastructures such as Amazon Web Services, Microsoft Azure, Google, Oracle, IBM Virtual Appliance x86 64-bit based systems; VMware ESXi, VMware NSX, Microsoft Hyper-V, and KVM
The Forcepoint VPN client is available for Microsoft Windows, Android, and Mac OS.
Forcepoint has not provided pricing information for this product or service. There is a 30-day free trial available as well as add-ons such as URL Filtering, which is a separate subscription (listed as $14.99 per user/year on CDW).
Due to the wide variety of deployment options, add-ons, and the unique configurations required between different enterprise networks it is difficult to ascertain the exact price of Forcepoint’s NGFW.
For example, the Forcepoint Next-Generation Firewall 6205 Appliance is listed for $126,381.00 on CDW but some enterprises may require additional virtual/cloud deployments to manage their volume of traffic.
A pay-as-you-go Amazon Machine Image of Forcepoint’s Next Generation Firewall version 6.10.0 is available on the AWS store for $1/hour, though exact pricing will largely depend on usage.
Based on a purchase price of $145,395, NSS Labs gave Forcepoint an estimated $240,533 total cost of ownership (TCO) per 3 year period, making the TCO $6 per protected Mbps.
This section will provide highlights of Forcepoint’s NGFW for internet filtering. Forcepoint provides a specifications PDF with further details that is current as of 30 Jan 2023.
Forcepoint’s NGFW detects malware over the FTP, HTTP, HTTPS, POP3, IMAP, and SMTP protocols.
Its file filtering and file reputation scanning supports 200 file types across 19 file categories, allowing organizations to detect and block known malware threats in files. Some appliances include a local antivirus scanning engine as well.
It also includes sandboxing as both a cloud and on-premises service to analyze the behavior of suspicious files.
Block endpoints from launching applications.
Forcepoint’s IPS monitors networks for potential indicators of compromise, alerts system administrators when a potential threat is found, and provides remediation such as closing access points.
With Forcepoint’s NGFW you can establish Policy-based VPNs and Route-based VPNs, allowing for a secure Site-to-Site VPN to route traffic through.
Forcepoint’s DLP features include application-layer exfiltration protection such as automatically allowing/denying network traffic originating from specific applications on PCs, laptops, servers, file shares, and other endpoint devices.
The URL filtering add-on is a separate subscription that allows admins to block or allow websites with custom or imported URL lists.
Similar Product: URL Filtering in BrowseControl
The NGFW’s Deep Packet Inspection enables the decryption of encrypted traffic so that related security features can analyze the contents of encrypted packets. It includes granular decryption of SSL/TLS traffic so admins can ensure that sensitive websites such as banking and healthcare sites are not decrypted.
Forcepoint’s central console provides the ability to manage large quantities of firewalls and fleets of firewalls at scale from a single dashboard. The dashboards can be accessed remotely.
While Forcepoint’s NGFW is a versatile and robust security tool, there have been critical feedback regarding their support, with the most critical reviews spanning between 2013-2016. While it appears that their support has improved since then more recent reviews continue to indicate issues in terms of responsiveness, though it’s possible that not all of these admins had an applicable SLA with the vendor.
“If you are looking for a Web Filtering solution, you would probably be better off with something else that is more cost effective, more flexible, and has a tech support that doesn’t take a couple days to contact you, nor months to actually fix the problem despite the severity.”
Rick Castello, Spiceworks.com (2013)
“This could be a good product but support is so poor it is unbelievable. They clearly do not read the details of support ticket then ask questions for which the answers were included in the original support ticket. We have had a problem with internet filtering which effects Outlook and they have not been able to resolve the fault for 3 years.
Origin IT, Spiceworks.com (2016)
The standard response is asking to provide wireshark traces even when they are not required. They usually only reply once in a 24 hour period, I think they aim to just shift the focus back on to the customer. We all are glad our contract ends before the end of the year. Avoid Forcepoint at all costs”
“My overall experience has been good. Forcepoint has come a long way with their product and the features being made available over the next couple of versions are exciting and needed. The Forcepoint team has been very good to work with and they have shown remarkable improvement in customer service and technical support.”
David Stanfield, Spiceworks.com (2017)
“Pros: The software is very easy to set up and use once deployed. The user interface is pretty straight forward and pretty basic to use.
Joevanne V., Capterra (2018)
Cons: Forcepoint has really gotten worse with the years. Features could be a lot better and more granular. The solution is very expensive compared to their competitors and they make you pay extra for malware detection.”
“In our opinion, the FortiGate Next-Generation Firewall is a great and strong security solution that no other security solution can match. Our firm is satisfied with this platform because the admin console is easy to use, and the process of learning is also simple. The initial setups are relatively simple to complete. A next-generation firewall also facilitates the connectivity of our numerous branch offices. For branch communication, we’ve additionally put up an SSL VPN. It works better than other comparative platforms.”
Anonymous Verified Reviewer, Gartner.com (2022)
“The support is horrendous for what we pay. With 4-hour turn-around support, you’d think we wouldn’t get someone from overseas replying 5 days later with a KB article when I clearly stated I need remote help. Now going through another ticket, 4-hour turn around, was contacted to get remote help two days later at 11pm at night. I am furious.”
Kyle Lerner, Spiceworks.com (2014)
“Product works ok, but support is nonexistent and their in place upgrades NEVER work!. Which is why I’m trying to get support! Currently on hold at 61 minutes. Also on my cell phone trying to contact a manager to complain. Now being told by dispatcher that he can’t find his manager.
Jason Chan, Spiceworks.com (2014)
This is on an open case that I emailed assigned tech at 1PM that upgrade blew out my Websense Web Security. Called at 5PM as I didn’t get ANY reply back.
And the kicker is that when I first open this case, I was on hold for 1.5 hrs waiting for tech! I ended up calling from my cell and was able to reach a mgr that time to complain!!!
I REALLY REALLY wish there is a negative star option. I’d rate them at a -50! especially since it’s an hour over when I should have left work!!!!”
“Pros: The software helps you to keep your network secure. It also delivers performance for email and web traffic.
Anonymous Verified Capterra Review (2019)
Cons: It is complex to configure. Also it is not very flexible. Transparent proxy is not possible. Proxy bypass rules have to be defined both it the proxy and in the firewall. That increases operational costs.
Reasons for Choosing Forcepoint Web Security: Our service partner gave this as only option.”
Support pricing is not publicly listed on Forcepoint’s website; CDW lists the cost of technical support at $21,851.99 per year.
Last Updated: 13 April 2022
In addition to offering Web Content Filtering on mobile devices, ManageEngine Mobile Device Manager Plus is a robust mobile devices management (MDM) solution that organizations can use to control and protect a wide range of devices including smartphones, tablets, laptops, desktops, and smart TVs.
Core features such as containerization, app distribution, and remote data wiping enable BYOD policies without compromising security and privacy.
ManageEngine Mobile Device Manager Plus lets you manage several types of mobile devices including smartphones, tablets, laptops, desktops, and smart TVs.
It supports multiple operating systems for mobile devices including Android, iOS, iPadOS, tvOS, macOS, Windows, and Chrome OS, making it an ideal solution for organizations that need to manage a wide range of mobile devices.
ManageEngine Mobile Device Manager Plus is available as a free trial for 30 days with unlimited mobile devices. There is also a free edition that manages up to 25 devices, making it an ideal tool for small businesses.
They provide two paid tiers: Standard and Professional, each with their own set of features. A feature comparison table can be found here.
In addition to the pricing for the software itself, ManageEngine charges a separate fee for installation support and training.
To learn about pricing for ManageEngine Mobile Device Manager Plus, check out their pricing table.
This section highlights the key features offered by ManageEngine Mobile Device Manager Plus. Different features are available between their standard and professional tiers. A full feature comparison is available in their Edition Comparison Matrix.
Allow or ban which apps can be brought onto the company premises by employees. Lock down devices to run a single app or a set of apps. Prevent users from adding an unwanted browser extension to their bowser.
ManageEngine’s MDM Web Content Filter lets you control the web content that can be viewed on mobile devices with granular allow and block lists.
In addition to restricting or allowing URLs, the Web Content Filter supports the automatic restriction of websites that are known to have malicious content, allowing you to proactively block sessions that pose a risk to devices.
To help prevent data leaks to cloud services, you can restrict third party apps from accessing and backing up distributed documents.
Containerization is a critical feature if you want to allow employees to use personal cell phones for work purposes (BYOD).
With this feature you can create separate profiles for work and personal use, keeping all company-provided apps and data separate from the employee’s personal data.
With enterprise data stored in a separate encrypted container you can remotely wipe sensitive data and deprovision the device without affecting personal data outside of the container.
Reviews of ManageEngine compliment its affordability when compared to other MDM solutions and robustness of features. On the critical side reviewers have noted that customer support is notably below their expectations.
“Pros: We recently implemented ManageEngine to easily manage our devices, create uniformity, and enhance security. After using the product for roughly a month now, we are very please with the results. Our team quickly embraced the idea’s and have had great success. The front end interface is clutter free and customizable. The backend offers an abundance of control and analytics. We love the ability to remotely manage our devices including remote control when needed. Lastly, small business prices under 26 devices is FREE.
Cody H., Capterra (2020)
Cons: Customer service lacks due to lengthy response times and language barriers. While chat support is available, it can be difficult to communicate the problem/solution. In addition, when phoning for support or sales, the phone system is difficult couple with extended wait times.”
“Pros: When you’re working with a smaller budget and can’t afford to shell out the multi-thousand dollar MDM solutions, ManageEngine MDM+ has your back. It’s got all the features you need including remote deployment of apps and geolocation.
Elliott W., Capterra (2022)
Cons: In terms of assigning devices to users it can be a little confusing. Some users show up multiple times when assigning a device and it isn’t clear which one to assign it to. It’s also confusing where the users are tied to. Am I being charged per username creation? It isn’t really clear.”
ManageEngine charges a separate fee for installation support and training.
Last Updated: 13 April 2022
See Also: Net Nanny, https://www.netnanny.com/
In the modern digital age parents are increasingly concerned about what their children can access online. Intego ContentBarrier can block out entire categories of websites, so your children aren’t exposed to objectionable content. You can also set up a specific list of approved websites, so your kids can access them without accidentally running into the filter.
ContentBarrier allows for individual user profiles with customizable parental control settings for each family member. This allows families to apply restrictions based on the age groups of their children.
Restrict app usage to only approved apps.
Record keystrokes to monitor instant messages, emails, and more.
Periodically takes screenshots of the child’s desktop and saves them for review.
The Anti-Predator chat monitor feature monitors all standard chat protocols to detect inappropriate content and if it detects anything suspicious it immediately blocks the chat and emails the parent.
With the Anti-Predator chat monitor you can view the history of recorded chats, including the content of the chat and the ID of the chat partner. Its database of phrases is completely customizable and features five different languages.
ContentBarrier lets parents control and restrict the time of day their children can access the Internet, so they don’t try to sneak screen time late at night.
Time of day restrictions restrict internet access to specific times of the day, specific days of the week, a maximum amount of time per day, or temporarily blocks the user for a set period of time or until you unblock them manually.
Reviews for Intego ContentBarrier are largely positive. The anti-predator functions have helped it stand out from competing parental control software. Their support has also been given praise by third-party review sites.
“ContentBarrier is Intego’s parental control software, and I can safely say it’s one of the best around. It’s pretty advanced compared to the built-in Mac parental controls, and it also has a number of features that even Norton and Kaspersky — which have some of the best parental controls — don’t offer. ContentBarrier includes features like keystroke tracking, anti-predator alerts, screenshot recording, and application blocking.”
Katarina Glamoslija, SafetyDetectives.com (2022)
“Perfect Protection for younger children!
G. Murray, Amazon (2010)
This product helps protect your kids in multiple ways and beyond “safe browsing”. It integrates at the operating system level. This means that it works no matter what browser or e-mail or chat client you use…
The program includes standard “filters” for the types of web sites allowed; Gambling, Adult, Shopping, etc…. and also what is allowed in chats (things like “Are your Parents Home?”) The options also include what types of services/programs the user can run. For example, I can say that my teen can chat, but my 10 year old can’t…
One of the benefits of this program is that it has both time of day as well as length of day settings. (Normally you don’t see both in programs like this) Meaning, I can not only restrict my teen from using the computer only from 6AM to 10PM, but I can also combine in “for no more then 3 hours total for the day”. No more wasting time chatting or being on after lights out. Combined with the logging feature, it is really easy to tell if the child was doing homework and legitimately needs more time . (Which the parent can override the settings)”
“Intego ContentBarrier X9 offers 24/7 support from either filling out the contact form or through live chat on the Intego website. Response times are fast, and the staff is very knowledgeable. Further support is available directly from the Intego Twitter page.”
internet-security.bestreviews.net
iOS, iPadOS, and macOS support multiple forms of content filtering, including restrictions, global HTTP proxy with TLS/SSL inspection, filtered DNS, DNS Proxy, and advanced content filtering.
Businesses can leverage these natively supported internet filtering options to restrict internet access by using Apple Business Manager, integrating with a third-party MDM solution, or developing their own apps through the Apple Developer Program.
Businesses can use Apple Business Manager completely free of charge. Using Apple Business Manager is highly recommended for any business purchasing Apple devices for their employees. However, it‘s meant to be used together with an MDM solution, which may have an associated cost.
Membership costs for the Apple Developer Program (if you are looking to distribute custom apps to businesses in Apple Business Manager) will need to be considered.
Website restrictions can be configured with Screen Time or with the Web Content Filter payload. Your mobile device management (MDM) solution can also configure website restrictions.
The setting can be configured to allow all websites, limit adult content or specific websites only, or save usernames and passwords for specific websites:
In macOS 10.15, or later you can also:
Apple devices support global HTTP proxy configuration. Global HTTP proxy routes most device web traffic through a specified proxy server or with a setting that’s applied across all Wi-Fi and cellular networks.
This feature is commonly used by K–12 or businesses for internet content filtering in an organization-owned one-to-one deployment, in which users take their devices home. It allows the devices to be filtered both in school (or at the place of business) and at home.
When devices send network traffic through a VPN or packet tunnel network activity can be monitored and filtered. This configuration is similar to devices that are directly connected to a network where traffic between the private network and the internet is monitored and filtered.
You can configure DNS Proxy settings for users of iOS, iPadOS, and macOS devices enrolled in a mobile device management (MDM) solution. Use the DNS Proxy payload to specify apps that must use DNS proxy network extensions and vendor-specific values. Use of this payload requires an accompanying app that is specified using the app’s bundle identifier.
A proxy server acts as an intermediary between a single computer user and the internet so that the network can ensure security, administrative control, and caching service. Use the Proxy MDM payload to configure proxy settings for Mac computers enrolled in a mobile device management (MDM) solution.
This payload supports configuring proxies for the following protocols:
There are no reviews for this Apple feature.
AppleCare for Enterprise offers 24/7 technical support for end users and onsite service for two, three or four years; the pricing for AppleCare for Enterprise is not publicly listed.
AppleCare for Enterprise is available in volume-based price tiers starting at 200, 1000 and 5000 covered devices. Contact Apple, an Apple Authorized Reseller or an Authorized Carrier Partner to receive a quote for AppleCare for Enterprise.
For more information, see the AppleCare Professional Support page.
Last Updated: 13 April 2022
DNS filtering is similar to URL filtering in that they both block websites; the key difference is that DNS filtering blocks entire websites based on DNS queries rather than specific URLs. DNS Filtering relies on the Domain Name System (DNS) to block, or allow, content on a specific network.
DNS is platform and browser agnostic, giving DNS filtering tools the ability to apply web access rules across all devices independent of the OS or browser type.
DNS filtering will allow you to block undesirable domains for your entire network, however it lacks the ability to block a website while allowing individual web pages within that site.
DNS filtering products work at the network level, making it easy to configure a single policy that applies to all devices that connect to a given network.
While this is not as customizable as the features provided by an endpoint-based web filter and the policies cannot protect off-network devices without a dedicated software agent, it is an ideal solution for organizations that want to control internet access for guest networks.
Learn More: What’s the Best Way to Block Websites?
See Also: WebTitan Alternatives
WebTitan is a DNS internet filtering service provider that is suitable for MSPs, internet service providers, and guest networks. It works by routing network internet traffic through its DNS service where the requested websites are then categorized based on WebTitan’s website category database.
WebTitan offers a cloud-based service that makes setup as simple as logging in, adding your external IP address, installing the WebTitan SSL certificate, and setting up your desired internet use policy before redirecting your DNS to WebTitan
WebTitan can be deployed via the cloud or on premises as a software or virtual appliance.
As the cloud-based deployment requires no local software installation it is entirely platform agnostic, making it suitable for mixed platform environments.
WebTitan offers businesses a choice of two cloud-based Internet filters – WebTitan Cloud to protect fixed networks, and WebTitan Cloud for WiFi to protect wireless networks and the users connected to them. Both are deployed via a redirection of the business´s DNS server settings.
To ensure that remote workers have the same DNS filtering policy as their in-office counterparts, WebTitan offers a roaming agent known as WebTitan On-the-Go. The roaming client is compatible with Windows, Mac, iOS and Chromebooks.
WebTitan cloud is priced at $532.00 per year for a minimum of 25 users, with discounts available for higher user counts and multi-year contracts. A free 30 day trial is available.
WebTitan’s web category filtering sorts URLs into 53 predefined categories such as social media, news, pornography, gambling etc. It includes a category that blocks known malware, phishing, viruses, ransomware & malicious sites.
One pain point of category-based web filters is that websites are occasionally misclassified. To help mitigate the impact of false positives WebTitan offers Cloud Keys that allow you to create exceptions to the general internet policy without having to alter the policy for an individual.
Each Cloud Key can be created for single or multiple uses, controlled by time or date and enabled or disabled by the administrator.
A Block Page or Access Denied Page is the web page that displays when a user attempts to access a website that they are not permitted to view because of their policy settings. In WebTitan you can customize the title, access denied message, and provide additional information.
WebTitan’s filtering policies can be customized per IP and per location. You can create allow lists that provide exceptions to the general policy to, for example, block all social media except LinkedIn.
After installing a DNS Proxy and the WebTitan Active Directory Agent (WADA) on your network WebTitan Cloud can also assign custom policies to a user or groups of users.
WebTitan Cloud allows organizations to block access to unwanted applications, such as games and P2P apps.
WebTitan offers a few internet usage reports, with metrics such as:
Reviews for WebTitan praise its overall ease of use and support. They are most critical about the complexity of setup for networks that require more than the basic DNS service and the lack of granularity some of the features have.
“Pros: WebTitan, like all TitanHQ products, is immediately ready to use and requires minimal technological effort to ensure the safety of all of your employees. Remote, domestic, and traveling workers can all benefit from the OTG client’s security features. It’s difficult to say what to say. DNS security that covers all bases.
Anonymous Verified Reviewer, Capterra (2022)
Cons: There is a bit of a delay when importing restricted sites. Likewise, I dislike the WADA agent, but I am ready to accept it in exchange for AD integration.”
“Pros: We have used similar products but they kept changing the product and increasing the cost, they would have no customer support and you could not even email them. WebTitan has excellent support and service, they helped us set it up, configure it, and install it. They are super responsive on email their products works for exactly what we want it to do. It was the best solution for us to monitor some end clients without limiting the rest of the network or having something we could not easily access. For us it is the prefect product, something non-IT staff can set up monitor and use daily to limit risks by a completely open internet policy. This was exactly what we needed!
Mark H., Capterra (2021)
Cons: My only gripe would be that the install for the OTA product is a little tricky to install. Not super hard but an app or something that is easy would have been preferred, so it kind of makes a one man band kind of set up. Of course, we could have installed it on the whole network but that was what we were trying to avoid a complex install that only our network people could really set up and deploy.”
“Basic, mid level product.
Rick P., Capterra (2021)
Pros: Fairly easy to implement as SaaS service, but still needs a service installed that runs on all endpoints.
Cons: It needs the ability to block nefarious sites at a more granular level. Anonymous reporting is too vague and too pervasive.”
“Pros: Cloud based management with proxies onsite. Easy to change rules and allow one time access to blocked sites for approved use. Logging is good.
Cons: Remote users, laptops and home users are not protected when off company network. Relying on the proxy servers as dns servers works great when onsite. Has a hard time with Remote Desktop Servers, identifying users… these may be misconfigurations but we have not found an easy way for their WADA to break out RDS users.” – Brian M., Capterra (2020)
OpenDNS and Cisco Umbrella are both DNS-based internet filtering services provided by Cisco. OpenDNS provides a basic suite of network filtering features that is best suited for home networks, prosumers, and small businesses.
Cisco Umbrella is an enterprise product that expands on the features of OpenDNS with options for a Secure web gateway, Cloud access security broker (CASB) features, a cloud-delivered firewall,in-line DLP inspection and blocking, as well as reporting features.
“OpenDNS is an American company providing Domain Name System (DNS) resolution services—with features such as phishing protection, optional content filtering, and DNS lookup in its DNS servers—and a cloud computing security product suite, Umbrella, designed to protect enterprise customers from malware, botnets, phishing, and targeted online attacks. The OpenDNS Global Network processes an estimated 100 billion DNS queries daily from 85 million users through 25 data centers worldwide.” – Wikipedia
Until June 2014, OpenDNS provided an ad-supported service and a paid advertisement-free service. Once OpenDNS was bought by Cisco in 2015 it split into OpenDNS for consumers and small businesses and Cisco Umbrella for enterprise users.
OpenDNS is a suite of consumer-focused products aimed at making your internet faster, safer, and more reliable. It is best for home or small business users. OpenDNS offers DNS resolution as an alternative to using Internet service providers’ DNS servers or locally installed DNS servers.
With filtering or pre-configured protection, you can safeguard your family against adult content and more. It’s the easiest way to add parental and content filtering controls to every device in your home network.
Cisco Umbrella provides protection against threats on the internet such as malware, phishing, and ransomware.
Its SASE architecture combines the functions of network security, including zero-trust network access, cloud access security broker (CASB), secure web gateway (SWG), and firewall as a service (FWaaS) with wide area network (WAN) capabilities to support the secure access needs of organizations.
As OpenDNS and Cisco Umbrella are both DNS-based products their basic DNS functions are entirely platform agnostic. Both include options for endpoint clients that enable more granular control.
OpenDNS applies filtering settings based on the public IP address of your network. Deploying OpenDNS is usually as simple as making a small configuration change to your external DNS to point it to their nameservers.
The recommended deployment method involves configuring DNS settings to the home router, though there are deployment methods that specifically configure workstations, smart devices, and servers.
The OpenDNS Prosumer client is available for Windows or Mac.
Cisco Umbrella is deployed through the configuration of an Umbrella virtual appliance (VA). Two VAs are required for high availability. In the case of multiple distant offices connecting to a central Umbrella server, each office requires their own pair of VAs.
Cisco Umbrella’s endpoint clients are compatible with Windows, Mac, Chromebook, iOS, and Android.
OpenDNS Home Free is available at no cost. It uses a preconfigured web content filtering database to block specific categories of websites.It includes options such as Family Shield that is preconfigured to block adult content and the classic OpenDNS Home which offers customizable filtering and basic protection.
OpenDNS Prosumer is $20.00 per user, per year (up to 5 users) and uses the Cisco Umbrella dashboard. It protects personal devices on or off-network via Windows or Mac agents. It does not provide network-wide coverage, just coverage for particular Windows and Mac computers.
The Prosumer version offers:
OpenDNS Home VIP is $19.95 per user, per year. It is like OpenDNS Home Free but the stats are kept for one year instead of 2 weeks, there are 50 instead of 25 entries for blacklist/whitelist, and there is an optional whitelist-only mode which can be enabled.
OpenDNS Premium DNS uses the Cisco Umbrella dashboard with enhanced stats and logs including real-time activity monitoring, but it does not come with any filtering or blocking. It just shows the categories the domains belong to if the domains are already categorized.
There are various packages available for Cisco Umbrella, each with their own features and price points. There is also a separate DNS Monitoring Package that provides free, recursive DNS services with real-time reporting and categorization but no internet blocking features.
The main packages are
Paid support packages are available, though pricing is not listed on their website. According to WebTitan the Cisco Umbrella DNS pricing in January 2022 is in the region of $2.70 per user per month. CDW lists Cisco Umbrella Insights – 3-Year Subscription License + Gold Support for $84.99.
You can try Umbrella for free for 14 days.
OpenDNS includes the ability to enforce schedules to limit time online for the entire web or select websites.
Time of day block allows you to configure content filtering that changes according to the specific time intervals. Time blocks can be set in 15 minute increments. As an example, you can block certain categories from 5 PM to 8 PM and use the ‘All other times’ setting for the rest of the day.
OpenDNS provides web content filtering at the individual domain level, which enables administrators to use allow and block lists to limit internet access.
When you manage domains directly, these settings override any specified through category filtering. For example, you can filter the Social Networking category while allowing access to Facebook.
OpenDNS provides web content filtering categories that you can apply to your network. The custom setting allows filtering from over 55 content categories.
Cisco Umbrella’s features are spread throughout their various packages. What features are available are dependent on whether you get DNS Security Essentials, DNS Security Advantage, SIG Essentials, or SIG Advantage.
Cisco Umbrella routes risky domain requests to a selective proxy for deeper URL and file inspection. This allows you to effectively protect critical infrastructure without delay or performance impact.
Cisco Umbrella data loss prevention (DLP) inspection and blocking capabilities protect sensitive data from being transmitted to unwanted destinations. You can monitor and enforce DLP policies in real-time and inspect data in-line with full SSL inspection.
The SIG tiers allow you to sandbox suspicious files for further inspection. You can also block files based on signatures from an antivirus engine.
Cisco Umbrella provides visibility into cloud apps used across your organization, giving you the ability to identify potential risks and easily block specified applications.
Cisco Cloudlock is the API-based cloud access security broker (CASB) that helps accelerate use of the cloud. By securing your identities, data, and apps, Cloudlock combats account compromises, breaches, and cloud app ecosystem risks.
Umbrella’s CASB features also include cloud app discovery, risk scoring, blocking or activity controls. You can scan and remove malware from cloud-based file storage apps
“Great for my test lab at home where I play with website development. Not so great in the enterprise. Would probably be a good fit for cash strapped small business.”
Robert Stahl, Spiceworks.com (2016)
“What do you like best?
Julián C, G2.com (2019)
It was really easy to configure and let the rest do it for itself. I have 2 nephews and they keep using my laptop to watch internet videos and they don’t really know about phishing or suspicious websites. This is the best way to relax and let them navigate freely when I’m not around.
What do you dislike?
The amount of RAM it takes sometimes made me realize it wasn’t a really good choice when my little nephews weren’t visiting me abroad so I uninstalled it when they were back to the country. I’ll use it again when they visit me”
“What do you like best?
Eddie R, G2.com (2018)
OpenDNS is super easy to set up and once setup in your router covers all devices connecting to it. It’s very good at filtering inappropriate content like pornography or many other categories that are laid out
What do you dislike?
It’s unfortunate though that If users have administrative access to their internet settings they could bypass the dns lookup setting that keep OpenDNS working.”
“What do you like best?
Pinisetty S, G2.com (2021)
1. Easy to configure Network and security profiles.
2. Web filter option for different categories.
3. Easy to configure end devices.
4. Easy to monitor users who visited malicious domains.
5. Option to take reports for the DNS queries.
6. Option to block and allow specific URLs.
What do you dislike?
1. Logs take time to appear in the dashboard.
2. Cost of the subscription is expensive.”
“What do you like best?
Anonymous Verified Reviewer, G2.com (2021)
It’s relatively easy to set up and maintain policies. It’s very effective at controlling access to sites that violate corporate policy or potentially malicious content while being transparent to users. Used in conjunction with AnyConnect VPN, Umbrella also protects off-site users.
What do you dislike?
There’s not much to dislike about Umbrella. It’s not inexpensive, but well worth it for the additional layer of protection it provides.”
“What do you like best?
Evan L, G2.com (2018)
I like the idea of DNS query filtering beyond what’s typically available at no cost. I like the ability to do reporting on the data to get insights not typically available without manually collating DNS lookup data. I also like the idea that if DNS results are returned for malicious websites or services you can point a finger at your vendor and that provides some CYA.
What do you dislike?
I dislike the implementation documentation, the confusing nature of the setup calls, and overall the idea that the sales people don’t really grasp the technical requirements for enterprise rollouts. They just sell sell sell and really don’t take the extra time to learn current architecture, caveats, etc. They solution requires virtual appliances (which they weren’t very helpful designing architecture) and installing agents on the domain controllers (which they also weren’t exactly upfront about). They left me and my team to learn the ins and outs and design the rollout. We also had to enable different audit logging on our domain controllers and they didn’t tell us that either.”
Cisco Umbrella
Cisco Umbrella has paid support tiers. Pricing is not publicly available, though they do provide a support packages datasheet with more information.
An internet filter—also known as a “web filter” or “website blocker”—is an internet content restriction tool that restricts access to websites based on parameters such as URLs, web content categories, IP addresses, and keywords.
Internet filters are used to block distracting websites such as social media, prevent access to sites with inappropriate content such as pornography, and enforce company internet usage policies.
Depending on the vendor an internet filter can be as simple as basic website blockers or include advanced features such as web content category filtering and application control.
When a blocked site is visited the user is typically presented with a block screen message from the internet filter that indicates why the website is blocked.
Types of internet filters:
This section will briefly cover the benefits of blocking websites with web filter solutions. For more information, see our article on the benefits of web filtering for businesses.
What is the best internet filter for you depends greatly on your needs. Whether you are a parent looking for parental control apps to limit and monitor your child’s online activity and limit screen time or a business that needs web filters to secure remote and in-office employees against distracting websites and malware, there is a suitable website blocker for you.
Need to restrict internet access in your network? In this tutorial you will learn how to block websites using a free trial of BrowseControl, CurrentWare’s web content filtering software.
With BrowseControl you can…
Block websites based on URL, category, domain, or IP address
Schedule unique internet restrictions throughout the day
Assign custom policies for each group of computers or users,
and enforce internet usage policies, even when devices leave the network
There are 3 ways to block employee internet access with BrowseControl
1) Block access to specific websites with the Block List
2) Restrict internet access to only certain sites with the Allow List
3) Using the Category Filtering feature you can block access to content categories such as Porn, Virus Infected, or Social Media
For complete control over internet and application use in your network, you can combine BrowseControl with BrowseReporter, CurrentWare’s internet monitoring software.
All right, let’s get started.
To begin, sign up for a free trial of BrowseControl at CurrentWare.com/Download. After filling out the form you will be provided with the files you need to get started with BrowseControl.
To install BrowseControl, run CurrentWare.exe on the administrator’s computer and follow the installation instructions; this will install the CurrentWare Console and Server.
After that, deploy the CurrentWare Client Setup file (cwClientSetup.exe) on all of the computers you would like to control.
From there you can import your Active Directory organizational units or manually create your desired policy groups.
For full installation instructions, please visit our knowledge base at CurrentWare.com/Support.
Now that you have BrowseControl installed, I’ll show you how to block specific websites based on their URL, domain, or IP address with the URL Filter.
This feature can be used to block your employees from accessing distracting websites like Facebook, TikTok, or Instagram.
First, decide whether you want to control internet access based on users or computers and select the desired mode.
Next, click on the URL Filter then select “Blocked List”
From the drop-down menu, select the group of computers or users that you want to restrict
Enter the URL, domain, or IP address of the websites you want to block to the master URL list, then press the Enter key or click “Add”.
BrowseControl will apply a wildcard to the URL, ensuring that any paths within the domain will be blocked as well.
In the master URL list, select the websites you want to block for the chosen group, then click “Add to Blocked List”.
If you would like to add the selected websites to the block list of multiple groups, you can press the drop-down arrow and select “add to multiple groups”, select the desired groups, then click “add to blocked list”
If you have a large number of websites you would like to block, you can also use the import feature to import an existing list.
Finally, click “Apply to Clients”.
That’s it! You have now blocked your employees, students, or patrons from accessing those specific websites.
Next, I’ll show you how to restrict internet access to only certain sites.
This feature is ideal if you want to prevent your employees, students, or patrons from accessing websites that are not explicitly allowed by your organization.
The process is identical to how you would block a website, except this time you will set the internet to “off” and add the websites you would like to allow to the Allow List.
With this method, your users will only be able to access the exact websites that have been approved by your company.
Here are the full instructions.
First, decide whether you want to control internet access based on users or computers and select the desired mode.
Next, click on the URL Filter, then ensure that “Allowed List” is selected
From the drop-down menu, select the group of computers or users that you want to restrict
Next, set the internet to “Off”. This will ensure that only the websites that are added to the allowed list can be accessed.
Enter the URL, domain, or IP address of the website you want to allow to the master URL list, then press the Enter key or click “Add”. BrowseControl will apply a wildcard to the URL, ensuring that any paths within the domain will be allowed as well.
In the master URL list, select the websites you want to allow for the chosen group, then click “Add to Allowed List”
If you would like to add the selected websites to the Allowed list of multiple groups, you can press the drop-down arrow and select “Add to Multiple Groups”, select the desired groups, then click “Add to Allowed list”
If you have a large number of websites you would like to allow, you can also use the import feature to import an existing list.
Finally, click “Apply to Clients”.
Next, I’ll show you how to block websites based on content categories such as Porn, Virus Infected, and Social Media
With BrowseControl’s category filtering feature you can block billions of websites across over 100 URL categories. More than 10,000 new domains are added each day, making it simple to restrict internet access even as new sites emerge.
Here’s how:
First, decide whether you want to control internet access based on users or computers, then select the desired mode.
Next, click on “Category Filtering”
From the drop-down menu, select the group of computers or users that you want to restrict
Select the web content categories you would like to block, then click “Add to Blocked List”
Finally, click “Apply to Clients”.
That’s it!
The Allow List can also be used in tandem with the Category Filtering feature to allow websites that would otherwise be blocked based on their content category.
For example, you could use the Category Filtering feature to block Social Media while still allowing access to LinkedIn.
Now that you’ve seen the 3 key ways you can block a website with BrowseControl, I’d like to show you how to restrict internet access at certain times.
With BrowseControl’s Internet Scheduler you can schedule custom block or allow lists throughout the day.
This feature will bring some flexibility to your internet restriction policies; in this example, we will allow our employees to browse the internet during lunchtime.
Here’s how to use the internet scheduler
First, decide whether you want to control internet access based on users or computers and select the desired mode.
Next, click on “internet scheduler”
From the drop-down menu, select the group of computers or users that you want to restrict
Next, click “New Schedule”
Set the start and end time of the schedule. Then, select the schedule type.
Internet On will allow internet access to all websites that are not on the URL Block List
Custom allowed list will only allow access to specific websites.
Custom blocked list will block access to a specific list of websites and allow access to the rest of the internet.
Custom Category blocked list will block specific categories and allow access to the rest of the internet.
Next, set your desired schedule frequency.
Daily will enable the schedule every day during the specified time period.
Weekly will enable the schedule only on specific days of the week.
Monthly will enable the schedule only on specific months.
Next, click “Add Schedule”.
If you selected one of the custom block or allow list options, you can click the link provided under the “schedule type” column to set the websites or categories that you would like on the list.
And finally, click “Enable Scheduler” if it is not already enabled
That’s it for today. If you’re ready to start blocking websites you can get a free trial of BrowseControl at CurrentWare.com/Download.
If you have any questions during your evaluation our support team is available to help you over a phone call, live chat, or email.
See you next time!
Are you a business looking for a cost-effective website blocker solution for blocking sites for your remote and in-office employees? Get started today with a free trial of BrowseControl, CurrentWare’s internet filtering software.
For further control over internet use you can combine BrowseControl with BrowseReporter, CurrentWare’s computer usage monitoring software for tracking time spent browsing the internet and using Windows apps. Both modules operate from the same central console, making managing internet use for your users simple and convenient.
BrowseControl’s Key Features
Want to learn about more the features of the BrowseControl web filter solution? Click the “Learn More” button below for a full list of BrowseControl’s web control features.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |