Benefits of the Outpost PRO   

Here is a list of features that you will find only in Outpost PRO:

 

Feature

Your Benefits

General

Multiple configurations

  • Can create different configurations for you and your family or colleagues.

  • Can prevent your children from accessing unwanted sites (sex, games, bomb making), from playing online games or chatting.

  • Can switch, using one mouse click, between "Work", "Rest", "I am away", "Block Everything", and "Children" configurations.

  • Can back up your configurations.

Using password protection

  • Can protect your settings so they cannot be changed without your permission.

Apply rules without need of interface

  • Can block unwanted traffic or content in a way that's completely hidden from users' eyes.

  • Can run as a service without need of an interface, thus saving your computer system resources.

Rule Creation

Specifying time intervals

  • Can allow or block applications depending on the time of a day and day of the week.

Reporting of important activity

  • Can have Outpost show a message box when a particular rule is triggered. For example, a warning message appears whenever someone connects to your PC or when some spyware on your computer tries to send your personal information over the Internet.

Running application if rule is triggered

  • If a rule is triggered, Outpost can launch any application or play any sound or even shutdown the computer! For example, if your children decide to play an online game, then a warning text from the parent can be shown and the online game is blocked.

System add Application Independent Rules

  • You can create a rule that will be applied to all applications.

  • You can create a rule that will allow or block low level system network activity.

  • You can create not only application level rules but also network rules based on particular IP addresses.

Trusted zone

  • One click configuration to allow all network activity for trusted home or work place computers.

Logging

Advance filtering of the Allowed and Blocked logs

  • Can get a one-mouse-click report including the history of each application's activity or each connection to your computer, whether allowed and blocked.

Exporting log files

  • Can export logs for back up purposes.

  • Can export logs for future analysis, for example, with Microsoft Excel or other third party applications.

Related Topics

How to Order

Contacting Technical Support