Reporting on Longhorn: Your Top Questions, Answered

Reporting web activity is a key responsibility for our community members in school IT. Aside from blocking inappropriate content, getting accurate and detailed reports on user activity is critical to keep students safe and on-task.

That’s why we dedicated a Summer of Longhorn webinar to reports. Web Filter 3: Longhorn makes it easy for IT professionals to customize reports and dashboards for granular and high-level views of activity.

If you missed the reporting webinar, check out this page to access the recording. You can also register for upcoming Summer of Longhorn webinars.

Here are some Q&A’s from the Summer of Longhorn reporting webinar and resources to help you leverage Longhorn’s most powerful reporting capabilities.

Got questions for us about your filter reporting? Leave them in the comments section on this post — we’re happy to help!


What’s the difference between authentication and identification?

User authentication implies the user has entered some form of information so the filter can recognize that user.

Identification is transparent; there is an agent on the device itself, and network access retrieves the user’s information from the agent.

In network access reports, you can see authentication and identification histories on your users.

Learn more about authentication and identification on our Community site.


Do reports show web activity from students who use filtering bypass programs such as UltraSurf and Psiphon?

Through the Activity Logs tab, you can customize reports to quickly see which users have attempted to reach filter bypass tools.

In addition, if a URL is unknown to our database, the filter will categorize it as unknown and block activity for the user. Some filtering bypass methods will attempt to mask a blocked site through a URL that appears as a random string of letters or numbers (example below); the filter will catch and block those instances.

Filter bypass tools are a huge concern and we’re here to help. Join us on August 10 for a Summer of Longhorn webinar dedicated to just this topic. We have new features to help you manage this activity and ensure students are unable to bypass your filter.


Has anything changed about how Web Filter handles suspicious search queries?

This is an ever-evolving feature in the Lightspeed Systems filter. Longhorn leverages a powerful database of common search terms on Google and Bing to catch suspicious terms as they’re searched.

Longhorn’s AI database updates every five minutes to ensure you have the most up-to-date, comprehensive list of suspicious search terms.

Learn more about Web Filter 3: Longhorn’s suspicious search query capabilities here.


Does adding a widget to your dashboard put an additional load on the network?

Widgets are summary reports that you add to your dashboard to see aggregated information on network activity.

An efficient network is crucial, and our filtering solutions are designed to have a low impact on network load. We set aside RAM so you can use as many widgets as you like without experiencing network delays.

Learn how to create widgets here.

That’s not all! Longhorn also has live reports, drill-down capabilities, and a lot more to make reporting more valuable than ever.

Not on Web Filter 3 Longhorn yet? It’s easy (and free) for Web Filter customers to upgrade. Find out how to get the latest version here.

Not a customer? Request a demo here.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>