Request Quote

Log in to evaluate

Access downloads, trial keys, docs and resources.

Control the web. Fast, simple and powerful. Includes zero-touch BYOD web security.

Product features

URL Reputation and Cloud Intelligence

The Content Classifier rates and categorises Internet content into appropriate and inappropriate categories using a range of tools, techniques and methods to produce maximum accuracy in minimum time.

Content Categories

The URL database is a human verified list of hundreds of millions of web sites classified in over 140 categories and in multiple languages. The URL database server is updated on a daily basis and provides extremely fast verification of known Web sites. Policies can be created to "allow" or "deny" different categories, for different users and devices.

HTTPS Filtering & Deep Interception

The proxy server can control HTTPS/SSL sites without requiring a certificate to be installed in the client browser. This light-touch mode is perfect for fast deployment. For deeper inspection, the SSL Intercept feature can be enabled which allows the proxy server to decode encrypted (SSL) web sites by intercepting the transmission between the client browser and the remote web server.

Anonymous Proxy Detection

The proxy server is designed to detect zero-hour (or unclassified) anonymous proxy sites, or sites containing links to anonymisers. Combined with the database of known sites, which are updated daily, this provides a powerful and accurate defense against anonymous proxies.

Embedded URL filtering

Filters embedded URL's to protect against proxy avoidance e.g. using translators and cache services such as Google cache.

Image Content Filtering

The image filtering module attempts to rate image content (JPEG/JPG, BMP, GIF, TIF, TGA, WMF, PNG, MNG, PGX, PNM, RAS) in real time as the content passes through the proxy. The module adopts many complex techniques, such as edge detection, colour tones, curvature and body size algorithms to produce a probability rating as to whether the image is pornographic.

Custom URL Module

The Custom URL Module allows the administrator to create and manage groups of Web sites that are trusted or always denied. The categories from the Custom URL module that are active within a policy will always take precedence over any other filtering rules. This provides the administrator with the necessary control to maintain a subjective list of trusted and blocked sites.

File Extension

The File Extension module allows the administrator to specify a list of file extensions to block.


The MIME-Type module allows the administrator to specify a list of content types to block.

Safe Search

The Safe Search module forces anyone visiting Google, Yahoo!, Bing or YouTube to have "Safe Search" enforced regardless of whether the user disables it in their account profile. This can be applied on a per policy basis.

YouTube for Schools

The YouTube for Schools feature converts YouTube into a safe education resource for video content. This can be applied on a per policy basis. A YouTube for Schools account is required.

Redirect module

Automatically redirect requests to a particular domain somewhere else. For example, if your organisation wants to standardise on one particular Search Engine, you can redirect requests to other search engines to your preferred one.


Apply advanced regular expression matching to URL's, which allows for accurate keyword filtering on search engines.

Bypass module

Allow web applications and sites that do not support proxying to pass through. Sites can be bypassed for authentication, SSL inspection or both.

Policy Manager

The Policy Manager allows you to easily manage filtering policies for your users and devices. A policy consists of a set of rules and the rules correspond to the Content Filtering modules; Redirect, Custom URL, URL RegEx, Custom URL, Categories, Safe Search, Files, MIME Types, Images. You can create any number of rule combinations and policies.

Unfiltered Policy

The Unfiltered Policy mode allows completely unfiltered Internet access to the specified user, device or group. Access will still be logged.

Blocked Policy

The Blocked Policy mode blocks all Internet access for the specified user, device or group.

Restricted Policy

The Restricted Policy limits the specified user, device or group to an administrator defined list of trusted Web sites.

Filtered Policy

The Filtered Policy allows the administrator to define which Content Filtering modules, and their respective filtering options, are active for a specific user, device or group.

Advisory Policy

Same as Filtered Policy except the user may override any blocked requests.

Policy Scheduler

The Policy Scheduler allows the administrator to quickly and easily assign policies to users, devices or groups which are active at different times of the day or week.

Automatic Active Directory Synchronisation

Synchronise CensorNet with Active Directory by OU or Primary Group. CensorNet will automatically replicate the AD structure and any changes made to it. Easy!

Time Quota

Set a daily time quota for accessing specific categories of Web sites (e.g. Travel, Shopping, Social Networking). When the time quota is used up, the web sites are blocked until the following day

User Manager

The User Manager allows the administrator to quickly add, remove or update users known to the CensorNet Pro proxy. Users can be imported from a variety of authentication sources, including Microsoft Active Directory, LDAP and CSV. Any unrecognised users attempting to use the proxy will simply be filtered using the Default Policy.

Device Manager

The Device Manager allows the administrator to quickly add, remove or update device objects known to the CensorNet Pro proxy. Devices can be imported automatically using the "Probe LAN" tool or from a CSV file format. Any unrecognised devices attempting to use the CensorNet proxy will simply be filtered using the Default Policy.

Suspend User

The Suspend User option allows the administrator to prevent a user from accessing the Internet temporarily.

Request Unblock

The Request Unblock feature allows your users to request that a page is unblocked if they feel it has been incorrectly blocked by the proxy. Users can specify a reason and request an email when their request has been actioned.

Import Wizards

Import users and devices from a variety of sources using our easy to use import wizards.

Analyse Report

The Analyse Report will show the exact pages and objects were visited by a particular user or device between a specific date/time range and matching the specified criteria. The results can be expanded to show each individual URL visited and whether the request was allowed/denied and its classification.

Report Builder

The Report Builder allows the administrator to build customised reports based on the information collected by the proxy server. Any number of reports can be created based on different conditions, for example time/date, username, workstation, URL, filter module, violation and so forth. Report results can be exported.

Bandwidth Reports

Report on bandwidth usage by user, device, category and domain.

Chart Reports

The Chart Reports generate an easy to view graph and data snapshot based on a pre-defined set of templates. The chart and its data can be exported.

Activity Report

The Activity Report shows an instant snapshot of the users and devices accessing the Internet through the proxy.

Export Reports

Export selected report results and snapshots to Adobe PDF, Excel or CSV format.

Archive Manager

On very busy networks proxy can quickly collect gigabytes of information. The Archive Manager allows the administrator to move old data to an archive to improve performance. Archives can also be included in the reports created using the Report Builder.

Web Control Panel

The CensorNet system is administered through an easy-to-use and responsive Web-based Control Panel, accessible using a modern Web browser (such as Internet Explorer, Google Chrome or Mozilla Firefox).

User Authentication

The CensorNet Proxy server can operate with or without User Authentication. CensorNet supports Microsoft Active Directory, LDAP and internal authentication sources. With User Authentication turned on, users will be required to log-in before accessing the Web unless single sign on is enabled.

Active Directory Synchronisation

Quickly and easily replicate your Active Directory OU groups within CensorNet Professional and apply filtering policies.

Single-sign-on Authentication

The CensorNet Pro proxy server supports "negotiate kerberos" authentication for use with Microsoft Windows domains.

Captive Portal

The Captive Portal allows BYOD devices to authenticate with the proxy server using a valid username and password without the administrator having to configure anything on the device. The Captive Portal can also be accessed based on device address rather than user.


The Deployment option allows the administrator to review deployment settings and the proxy server automatically generates a valid WPAD proxy.pac file for the network.

Device Authentication

The CensorNet Pro proxy server can authenticate devices based on Hostname, IP address or MAC address. Devices can be added to a group with authentication disabled - ideal for guest environments.

Roles-based Administration

Create multiple administrator users and delegate access to different areas of the system. e.g. an admin user that can only access Reports or only manage Unblock Requests.

Parent Proxy

The administrator can specify a parent proxy or parent cache, which will force the proxy server to pass requests upstream.

Backup / Restore

The administrator can Backup and Restore the CensorNet Pro system easily using the tools provided.

Packet Trace

Diagnose connection issues with the inbuilt packet tracer and analyse the output using Wireshark.