BrowseControl Filter Configuration – Best Practices

BrowseControl Filter Configuration – Best Practices

Here are some quick tips that are best practices when dealing with your BrowseControl filtering setup:

URL Filtering List (Allow & Block Lists)

  • When adding URLs there are automatically wildcards(*) before and after the entries. 
  • Entering “” will block “****”. To make your blockages more specific use a “.” before the urls. I.e. 
  • You do not need to add any “*”  characters to the URLs
  • Be careful not to additional characters! is different from
  • “WWW.” is automatically trimmed from the URL. You can use the domain only.
  • Some websites have backend pages needed to load resources from additional sites. Most commonly will be login pages, or portal pages. Use the BlockedURL Log to identify blocked resources

Category Filtering

  • When adding items from the Category List, only add the categories you need to block; some categories such as “CDN”, “Images”, or “Portal” may cause unexpected behaviors when loading websites that rely on resources that fall under those categories
  • Use the Allowed List (whitelist) to provide exceptions to specific domains that would normally be blocked by a category, such as blocking the Social Networks category while allowing access to
  • You can find a detailed list of the categories and their descriptions here
  • You can locally change what categories a domain is classified as using the reclassification tool, or if you find an incorrectly classified website you can report it here

    • Related Articles

    • Security & SQL Database Best Practices

      Security and Workflows Connection to the Web Console Starting with v8.0.1, the CurrentWare web console will have a preconfigured self-signed SSL certificate that is enabled by default. This will ensure that network communication to and from the ...
    • Best practices to block mouse mover software

      Employers have a common concern with productivity when employees are working remotely A common occurrence with remote working is having employees fake mouse and keyboard movements to avoid getting an “idle” or “away” status with related work apps. ...
    • Best practices to catch mouse mover software

      To protect against the potential for data manipulation through the use of mouse manipulation software or physical devices that mimic computer activity, it is essential to be aware of these potential sources of inaccuracy. Through BrowseReporter you ...
    • CurrentWare Security Practices

      CurrentWare is committed to the security of its platform, its customers, and their data. Here’s an overview of the security measures we take to keep the CurrentWare Suite safe. Authentication Security Password Protected: The admin console cannot be ...
    • How do I Control Internet access with BrowseControl

      With BrowseControl website access permissions can be customized for your network based on the user or machine used to access the website, giving you a flexible solution for blocking websites across your network. You will first need to install the ...