Home Getting Started

Getting Started

By KyberGate
6 articles

Using KyberClassroom

Using KyberClassroom KyberClassroom gives teachers real-time visibility and control over student devices during class. Monitor screens, push URLs, restrict browsing to approved sites, and keep students on task — all from a simple web-based interface. Before You Begin - You must have a Teacher or Admin role in KyberGate - Student devices must be enrolled and actively filtering through KyberGate - KyberClassroom works best on a laptop or desktop browser (Chrome or Edge recommended) - If your school uses Google Workspace or Clever, classes and rosters are synced automatically Accessing KyberClassroom 1. Log in to dashboard.kybergate.com with your teacher credentials 2. Click KyberClassroom in the left sidebar 3. You'll see a list of your classes (synced from Google Classroom, Clever, or manually created) 4. Click on a class to start a session Starting a Classroom Session 1. Select your class from the list 2. Click Start Session 3. Choose a session mode: - Monitor Mode — See what students are browsing in real-time without restricting access. Best for independent work time. - Focus Mode — Push a specific URL or set of URLs to all devices. Only the pushed URLs are accessible. Best for guided activities. - Restrict Mode — Limit browsing to a custom list of approved sites. Everything else is blocked. Best for testing or research assignments. 4. The session begins immediately — the device grid shows all enrolled devices for that class The Device Grid Once a session is active, the Device Grid shows a thumbnail view of every student's screen: - Thumbnails update every 5–10 seconds - Color indicators: - 🟢 Green border — Student is on an allowed/expected site - 🔴 Red border — Student visited a blocked or flagged site - ⚪ Gray border — Device is idle or screen is off - Click any thumbnail to enlarge the screen view - Double-click to open a full-size live view of that student's screen 💡 Pro Tip: Use the grid view during independent work time. You can quickly spot students who are off-task without walking around the room. Pushing URLs to Students In Focus Mode, you can push specific URLs directly to student devices: 1. Click Push URL at the top of the session 2. Enter the URL (e.g., https://docs.google.com/document/d/...) 3. Choose delivery: - Open in new tab — Opens the URL in a new browser tab - Replace current tab — Navigates the student's active tab to the URL 4. Click Push 5. All student devices in the session will navigate to the URL You can push multiple URLs to create a curated set of resources for the class. Managing Student Access During a Session During an active session, you have several control options: - Lock screens — Temporarily black out all student screens (useful when giving instructions) - Close tabs — Close specific tabs on a student's device - Send a message — Display a message on the student's screen - Pause internet — Temporarily suspend internet access for a specific device Ending a Session 1. Click End Session at the top of the session view 2. Choose to: - Return to normal filtering — Students go back to their assigned filtering policy - Keep current restrictions — Maintain Focus/Restrict mode beyond the session (useful for testing periods) 3. A session summary is generated with: - Duration - Number of URL pushes - Blocked attempt count - Most visited domains during the session Creating Classes Manually If you don't use Google Workspace or Clever, you can create classes manually: 1. Go to KyberClassroom → My Classes 2. Click Create Class 3. Enter: - Class name (e.g., "Period 3 English") - Grade level - Students — Add by name, email, or device 4. Click Save 5. The class is ready for sessions Troubleshooting Student devices not appearing in the session: - Verify the device is online and filtering through KyberGate (check Devices page) - Ensure the student is assigned to the correct class - If using Google Classroom sync, verify the student is enrolled in the Google Classroom class Screen thumbnails not updating: - This can happen if the student's device has limited bandwidth - Try refreshing the session page - Ensure the KyberGate extension/agent is running on the student's device Pushed URLs not opening on student devices: - The URL must be in the allowed list for the current filtering policy or session mode - Check that the device has an active internet connection - On Chromebooks, ensure the KyberGate extension has the required permissions Focus Mode not restricting access: - Verify the session mode is set to Focus (not Monitor) - Students may have found an alternative browser — ensure only managed browsers are available on the device Related Articles - Getting Started with KyberClassroom - Screen View: Live Device Monitoring - AI Chat Monitor

Last updated on Apr 17, 2026

How to Enroll Devices

How to Enroll Devices Device enrollment is the process of connecting your school's devices to KyberGate so they can be filtered, monitored, and managed. KyberGate supports iPads, Chromebooks, macOS, and Windows devices through platform-specific enrollment methods. Before You Begin - You must have Admin access to the KyberGate dashboard - You need admin access to your MDM solution (for iPads/macOS) or Google Admin Console (for Chromebooks) - Have the KyberGate PAC file URL and CA certificate ready (both available in the dashboard under Devices → Enrollment) - Ensure your network allows outbound connections to *.kybergate.com on ports 80, 443, 8080, and 8443 Enrollment Overview KyberGate uses a proxy-based architecture for web filtering. Enrollment involves two key components: 1. PAC File (Proxy Auto-Configuration) — Tells the device where to send its web traffic for filtering 2. CA Certificate — Enables KyberGate to inspect HTTPS traffic (SSL/MITM inspection) so encrypted sites can be properly categorized and filtered Both must be deployed to every filtered device. Method 1: Enrolling iPads via MDM This is the most common enrollment method for schools with iPad fleets. 1. Log in to the KyberGate Dashboard 2. Go to Devices → Enrollment → iPad 3. Download: - The KyberGate CA Certificate (.cer file) - Note the PAC File URL (e.g., https://pac.kybergate.com/proxy.pac?org=YOUR_ORG_ID) 4. In your MDM (Jamf Pro, Mosyle, or Kandji): For Jamf Pro: - Go to Configuration Profiles → New - Add a Certificate payload → upload the KyberGate CA certificate → set to "Trust" - Add a Global HTTP Proxy payload → select "Auto" → enter the PAC file URL - Scope the profile to your target devices/groups - Click Save For Mosyle: - Go to Management → Profiles - Create a new profile with the Certificate and Proxy payloads - Deploy to your target device groups For Kandji: - Create a new Library Item with Certificate and Proxy settings - Assign to your target Blueprint 5. Devices will receive the profile on next check-in (usually within 15 minutes) 6. Verify enrollment: Go to Devices in the KyberGate dashboard — enrolled iPads should appear with a green status 💡 Pro Tip: Test the profile on a single device before deploying to your entire fleet. Verify that browsing works normally, blocked sites show the KyberGate block page, and activity appears in the dashboard. Method 2: Enrolling Chromebooks via Google Admin 1. Log in to the KyberGate Dashboard 2. Go to Devices → Enrollment → Chromebook 3. Copy the Chrome Extension ID for your organization 4. In Google Admin Console: - Navigate to Devices → Chrome → Apps & Extensions → Users & Browsers - Click the + button → Add Chrome app or extension by ID - Paste the KyberGate extension ID - Set installation policy to Force install - Select the target Organizational Units (OUs) - Click Save 5. The extension will automatically install when students sign in to their Chromebooks 6. The extension configures proxy settings and certificate trust automatically — no additional MDM configuration needed 💡 Pro Tip: Create a test OU in Google Admin with a few devices to validate the extension before rolling out to the entire school. Method 3: Enrolling macOS Devices 1. Log in to the KyberGate Dashboard 2. Go to Devices → Enrollment → macOS 3. Download the KyberGate Agent (.pkg installer) Via MDM (recommended): - Upload the .pkg to your MDM (Jamf Pro, Mosyle, or Kandji) - Deploy as a managed installation to target devices - The agent handles everything automatically: installs the CA certificate, configures the PAC file, and starts filtering Manual installation: - Double-click the .pkg file on the target Mac - Follow the installation wizard - Enter admin credentials when prompted - The agent will start automatically and appear in the menu bar Method 4: Enrolling Windows Devices 1. Log in to the KyberGate Dashboard 2. Go to Devices → Enrollment → Windows 3. Download the KyberGate Agent (.msi installer) Via GPO/SCCM/Intune: - Deploy the .msi as a software package through your preferred management tool - The installer runs silently with /quiet flag - Example silent install: msiexec /i KyberGateAgent.msi /quiet /norestart Manual installation: - Run the .msi installer on the target Windows PC - Accept the UAC prompt - The agent installs, configures proxy settings, installs the CA certificate, and starts filtering Verifying Enrollment After enrolling devices, verify everything is working: 1. Check the Devices page — The device should appear with a green status indicator 2. Browse to a blocked site — The KyberGate block page should appear 3. Check Activity Logs — Browsing activity from the device should appear within 2–5 minutes 4. Test HTTPS filtering — Visit an HTTPS site in a blocked category to confirm SSL inspection is working (you should see the block page, not a browser certificate error) Troubleshooting Device not appearing in dashboard: - Confirm the PAC file URL is correctly configured - Verify the device has internet connectivity - Check your MDM for deployment errors or pending profile installations Certificate errors in the browser: - The CA certificate may not be installed or trusted - On iOS: Check Settings → General → About → Certificate Trust Settings - On macOS: Check Keychain Access → System → look for the KyberGate certificate - On Windows: Run certmgr.msc and check Trusted Root Certification Authorities HTTPS sites not being filtered: - This indicates the CA certificate is not properly installed - Reinstall or redeploy the certificate through your MDM - Some apps (like Firefox) maintain their own certificate store — see our Firefox configuration guide Related Articles - Enrolling iPads via Jamf Pro - Enrolling Chromebooks via Google Admin - Enrolling Devices via Mosyle - System Requirements and Supported Devices

Last updated on Apr 17, 2026

Setting Up Web Filtering Policies

Setting Up Web Filtering Policies Web filtering policies are the core of KyberGate. They determine what students can and cannot access online. This guide walks you through creating, configuring, and deploying filtering policies for your school. Before You Begin - You need Admin access to the KyberGate dashboard - Have a plan for your filtering strategy: what to block, what to allow, and whether policies differ by grade level, time of day, or device group - Review the Understanding Content Categories article to familiarize yourself with KyberGate's category system Understanding Policy Structure Each filtering policy in KyberGate consists of: 1. Category Rules — Allow or block entire content categories (e.g., "Social Media," "Gaming," "Adult Content") 2. Domain Lists — Custom allow-lists and block-lists for specific domains 3. Keyword Filters — Block pages containing specific keywords 4. SafeSearch — Force safe search on Google, Bing, YouTube, and other search engines 5. Schedule — When the policy is active (school hours, after hours, or 24/7) 6. Assignment — Which devices or device groups the policy applies to Step 1: Create a New Policy 1. Navigate to Web Filtering → Policies 2. Click Create New Policy 3. Enter a Policy Name (e.g., "Elementary Students," "High School Default," "Staff/Faculty") 4. Optionally add a Description to help other admins understand the policy's purpose Step 2: Configure Category Filtering KyberGate classifies websites into 50+ content categories powered by a database of over 1.3 million domains. For each category, you can set one of three actions: - Allow — Let the traffic through - Block — Show the KyberGate block page - Flag — Allow the traffic but log it as a flagged event for review Recommended category settings for K-12: | Category | Elementary | Middle School | High School | |----------|-----------|---------------|-------------| | Adult Content | 🔴 Block | 🔴 Block | 🔴 Block | | Social Media | 🔴 Block | 🟡 Flag | 🟡 Flag | | Gaming | 🔴 Block | 🔴 Block | 🟡 Flag | | Streaming Video | 🔴 Block | 🟡 Flag | 🟢 Allow | | Education | 🟢 Allow | 🟢 Allow | 🟢 Allow | | News | 🟢 Allow | 🟢 Allow | 🟢 Allow | | Malware/Phishing | 🔴 Block | 🔴 Block | 🔴 Block | | AI Chat Tools | 🔴 Block | 🟡 Flag | 🟡 Flag | 💡 Pro Tip: Use the Flag action for categories you're unsure about. This lets students access the content while giving you visibility into usage patterns to make informed policy decisions later. Step 3: Add Custom Domain Rules Beyond category filtering, you can add specific domains to allow or block: 1. In the policy editor, click Custom Domains 2. To allow a domain (override a blocked category): Add it to the Allow List - Example: Allow kahoot.it even though Gaming is blocked 3. To block a domain (override an allowed category): Add it to the Block List - Example: Block tiktok.com even though Social Media is set to Flag 4. Use wildcards: *.example.com blocks all subdomains of example.com Step 4: Configure SafeSearch 1. In the policy editor, toggle SafeSearch Enforcement to ON 2. This forces safe search results on: - Google Search - Google Images - Bing - YouTube (Restricted Mode) - DuckDuckGo 3. KyberGate enforces SafeSearch at the proxy level — students cannot disable it Step 5: Set the Policy Schedule 1. Click Schedule in the policy editor 2. Choose when this policy is active: - 24/7 — Policy applies at all times - School Hours Only — Uses your configured school schedule - After Hours Only — Applies only outside school hours - Custom Schedule — Define specific days and times 3. You can create separate policies for school hours and after hours with different filtering levels Step 6: Assign the Policy to Devices 1. Click Assignment 2. Choose how to assign: - All devices — Every enrolled device uses this policy - Device groups — Assign to specific groups (e.g., "3rd Grade iPads," "Library Chromebooks") - Individual devices — Assign to specific devices 3. If a device matches multiple policies, the most restrictive policy takes priority Step 7: Test with Policy Simulator Before publishing: 1. Go to Web Filtering → Policy Simulator 2. Select your new policy 3. Enter test URLs and verify the expected behavior: - An educational site → Should be allowed - A gaming site → Should be blocked - A site on your allow list → Should be allowed 4. Adjust the policy if the results don't match your expectations Step 8: Publish the Policy 1. Review all settings 2. Click Save & Publish 3. The policy will propagate to devices within 1–2 minutes 4. Monitor Activity Logs for the first hour to catch any unexpected blocks or allows Troubleshooting Policy not taking effect: - Check that the policy is assigned to the correct device group - Verify the device is online and checking in - Wait 2–3 minutes for policy propagation Sites being incorrectly categorized: - Use the Domain Checker tool to see how KyberGate categorizes a domain - Submit a recategorization request through the dashboard - In the meantime, add the domain to your custom allow/block list Multiple policies conflicting: - KyberGate uses a "most restrictive wins" model when devices match multiple policies - Check the device detail page to see which policy is active Related Articles - How Web Filtering Works in KyberGate - Creating and Managing Filtering Policies - Managing Bypass Domains - SafeSearch Enforcement

Last updated on Apr 17, 2026

Quick Start Guide: Setting Up KyberGate for Your School

Quick Start Guide: Setting Up KyberGate for Your School Welcome to KyberGate! This guide will walk you through the essential steps to get your school's web filtering, device management, and student safety monitoring up and running. Follow these steps in order for the smoothest setup experience. Before You Begin Before starting your KyberGate setup, make sure you have: - A KyberGate account — If you haven't signed up yet, visit kybergate.com and create your organization - Admin access to your school's MDM solution (Jamf Pro, Mosyle, Kandji, or Google Admin) - A list of your school's domains that should always be allowed (e.g., your SIS, LMS, assessment platforms) - Your school's organizational unit (OU) structure if using Google Workspace - Approximately 30–60 minutes for initial setup Step 1: Log In to the KyberGate Dashboard 1. Navigate to dashboard.kybergate.com 2. Sign in with your administrator credentials 3. You'll land on the Dashboard Overview page, which shows real-time activity once devices are enrolled 💡 Pro Tip: Bookmark the dashboard URL — you'll be visiting it frequently during the first few days of deployment. Step 2: Configure Your Organization Settings 1. Click Settings in the left sidebar 2. Under Organization, fill in: - School Name — displayed on block pages and reports - Time Zone — ensures activity logs and schedules align with your local time - School Schedule — define your school hours (e.g., 7:30 AM – 3:30 PM). Filtering policies can differ between school hours and after hours 3. Click Save Changes Step 3: Set Up Your First Filtering Policy 1. Navigate to Web Filtering → Policies 2. Click Create New Policy 3. Give your policy a descriptive name (e.g., "Default Student Policy" or "Elementary School Policy") 4. Configure filtering categories: - Block categories like Adult Content, Gaming, Social Media, Gambling, Malware - Allow categories like Education, Reference, School Tools - Toggle SafeSearch Enforcement to ON (forces safe results on Google, Bing, YouTube) 5. Add any custom domains to the allow or block lists 6. Set the schedule — choose whether this policy applies during school hours only, after hours only, or 24/7 7. Click Save & Publish 💡 Pro Tip: Start with a moderate policy and adjust based on the activity data you see in the first week. It's easier to tighten filtering than to deal with complaints about over-blocking. Step 4: Enroll Your Devices KyberGate supports multiple platforms. Choose the guide that matches your device fleet: iPads (via MDM) 1. Go to Devices → Enrollment 2. Download the KyberGate MDM Profile (PAC file configuration + CA certificate) 3. In your MDM (Jamf Pro, Mosyle, or Kandji): - Upload the CA certificate as a trusted root certificate - Configure the PAC file URL for automatic proxy settings - Deploy to your target device groups 4. Devices will appear in the KyberGate dashboard within 2–5 minutes Chromebooks (via Chrome Extension) 1. Go to Devices → Enrollment → Chromebook 2. Copy the Chrome Extension ID 3. In Google Admin Console: - Navigate to Devices → Chrome → Apps & Extensions - Add the KyberGate extension by ID - Force-install it for your target OUs 4. Devices will check in once students open Chrome macOS / Windows (Native Agent) 1. Go to Devices → Enrollment → Desktop 2. Download the appropriate agent installer (.pkg for macOS, .msi for Windows) 3. Deploy via your MDM or manually install on each device 4. The agent configures proxy settings and installs the CA certificate automatically Step 5: Verify Everything Is Working 1. Go to Devices in the sidebar — you should see your enrolled devices appearing 2. Open a browser on a test device and visit a site in a blocked category 3. You should see the KyberGate block page with your school's name 4. Check Activity Logs to confirm browsing data is flowing in Step 6: Integrate Your User Directory (Optional but Recommended) 1. Go to Settings → Integrations 2. Choose your directory provider: - Google Workspace — Click "Connect Google Workspace," authorize with your admin account, and select the OUs to sync - Clever SSO — Enter your Clever District ID and authorize the KyberGate app - ClassLink — Follow the ClassLink OAuth flow to connect your roster 3. Once connected, student and teacher names will appear alongside device activity instead of just device IDs Step 7: Invite Your Team 1. Go to Settings → Team Members 2. Click Invite Member 3. Enter their email and assign a role: - Admin — Full access to all settings and policies - Teacher — Access to KyberClassroom and student activity for their classes - Viewer — Read-only access to reports and activity logs 4. They'll receive an email invitation to join Troubleshooting Common Setup Issues | Issue | Solution | |-------|----------| | Devices not appearing in dashboard | Verify the PAC file URL is correctly configured in your MDM. Check that devices have internet connectivity. | | Block page not showing | Ensure the CA certificate is installed and trusted on the device. Without it, HTTPS filtering won't work. | | SafeSearch not enforcing | Confirm SafeSearch is toggled ON in your filtering policy. Some browsers cache DNS — have students restart Chrome. | | Activity logs empty | It can take 2–5 minutes for the first logs to appear. If nothing shows after 10 minutes, verify proxy settings on the device. | What's Next? Now that your basic setup is complete, explore these features: - KyberClassroom — Real-time classroom monitoring and screen view - KyberPulse Safety Alerts — Get notified about concerning student behavior - Advanced Filtering Policies — Fine-tune your filtering with custom rules and schedules - Reporting & Analytics — Understand browsing trends and identify at-risk students Related Articles - System Requirements and Supported Devices - Understanding the KyberGate Dashboard - How to Enroll Devices - Setting Up Web Filtering Policies

Last updated on Apr 17, 2026

System Requirements and Supported Devices

System Requirements and Supported Devices KyberGate is designed to work across the full spectrum of devices found in K-12 environments. This article covers platform support, minimum requirements, and network prerequisites for a successful deployment. Before You Begin Review this article before purchasing devices or planning a deployment to ensure full compatibility with KyberGate's proxy-based filtering architecture. Supported Platforms iPad (iOS/iPadOS) - Minimum OS: iPadOS 15.0 or later - Enrollment method: MDM profile (PAC file + CA certificate) - Supported MDMs: Jamf Pro, Mosyle, Kandji, Apple Business Manager - Requirements: - Device must be supervised (enrolled in Apple Business/School Manager) - MDM must support Global HTTP Proxy or PAC file configuration - Wi-Fi connectivity required Chromebook (ChromeOS) - Minimum OS: ChromeOS 100 or later - Enrollment method: Chrome extension (force-installed via Google Admin) - Requirements: - Device must be managed through Google Admin Console - Chrome extension force-installed at the OU level - Google Workspace for Education account required macOS - Minimum OS: macOS 12 (Monterey) or later - Enrollment method: Native KyberGate Agent (.pkg installer) - Requirements: - Admin privileges for initial installation - MDM recommended for silent deployment (Jamf Pro, Mosyle, Kandji) - Agent auto-configures proxy and installs CA certificate Windows - Minimum OS: Windows 10 (version 1903) or later / Windows 11 - Enrollment method: Native KyberGate Agent (.msi installer) - Requirements: - Administrator privileges for installation - .NET Runtime 6.0 or later (bundled with installer) - Can be deployed via GPO, SCCM, Intune, or manual installation Network Requirements KyberGate uses a cloud proxy architecture with SSL/MITM inspection. Your network must allow the following: | Requirement | Details | |-------------|---------| | Outbound HTTPS (443) | Required — all filtering traffic flows over HTTPS to KyberGate proxy servers | | Outbound HTTP (80) | Required — for PAC file delivery and HTTP site inspection | | Proxy ports (8080, 8443) | Required — KyberGate proxy communication ports | | PAC file URL | Must be accessible from all devices: https://pac.kybergate.com/proxy.pac | | CA Certificate | Must be installed as a trusted root on all filtered devices | | DNS | Standard DNS resolution required; KyberGate does not require custom DNS servers | Proxy Network Regions KyberGate operates proxy servers in 8 global regions with smart geo-routing via the PAC file: 1. US East (New York) — Primary for East Coast schools 2. US West (Los Angeles) — Primary for West Coast schools 3. US Southeast (Atlanta) 4. US Midwest (Chicago) 5. US South (Dallas) 6. US Northwest (Seattle) 7. EU West (London) 8. APAC (Singapore) The PAC file automatically routes traffic to the nearest available proxy server for optimal performance. 💡 Pro Tip: If your school uses a firewall with outbound filtering, whitelist *.kybergate.com and the proxy IP ranges provided in your admin dashboard under Settings → Network. Browser Compatibility | Browser | Support Level | |---------|--------------| | Google Chrome | Full (recommended) | | Safari | Full (via system proxy on macOS/iOS) | | Microsoft Edge | Full (Chromium-based) | | Mozilla Firefox | Partial — requires manual proxy configuration (Firefox uses its own proxy settings) | | Brave | Full (Chromium-based) | ⚠️ Important: Firefox does not honor system-level proxy settings by default. For Firefox to work with KyberGate, you must configure network.proxy.type via GPO or enterprise policy. We recommend using Chrome or Edge for the simplest deployment. Bandwidth Requirements KyberGate's proxy adds minimal overhead to your network: - Per device: ~50–100 KB/day for proxy metadata and policy sync - SSL inspection: Adds ~5–10% latency on first connection to a domain (subsequent connections are cached) - Dashboard/reporting: Administrative traffic is negligible For a school of 500 devices, expect approximately 25–50 MB/day of additional KyberGate management traffic. MDM Compatibility Matrix | MDM Solution | iPad | macOS | Windows | Chromebook | |-------------|------|-------|---------|------------| | Jamf Pro | ✅ Full | ✅ Full | ❌ | ❌ | | Mosyle | ✅ Full | ✅ Full | ❌ | ❌ | | Kandji | ✅ Full | ✅ Full | ❌ | ❌ | | Google Admin | ❌ | ❌ | ❌ | ✅ Full | | Microsoft Intune | ⚠️ Partial | ⚠️ Partial | ✅ Full | ❌ | | Jamf School | ✅ Full | ✅ Full | ❌ | ❌ | Troubleshooting Q: Can I use KyberGate on unmanaged/BYOD devices? A: Yes, but with limitations. Users can manually configure the PAC file and install the CA certificate. However, MDM-managed devices provide the best experience with automatic configuration and tamper protection. Q: Does KyberGate work on mobile hotspots? A: Yes — KyberGate filtering is proxy-based, not network-based. As long as the device has the PAC file configured and CA certificate installed, filtering works on any network. Q: What happens if the proxy server is unreachable? A: The PAC file includes failover logic. If the primary proxy is down, traffic routes to the next nearest region. If all proxies are unreachable, the PAC file can be configured to either block all traffic (fail-closed) or allow direct connections (fail-open) based on your policy preference. Related Articles - Quick Start Guide: Setting Up KyberGate - How to Enroll Devices - Network and Proxy Settings

Last updated on Apr 17, 2026

Understanding the KyberGate Dashboard

Understanding the KyberGate Dashboard The KyberGate Dashboard is your central command center for monitoring student internet activity, managing devices, and responding to safety incidents. This guide explains every section of the dashboard so you can use it effectively. Before You Begin - You must have an Admin or Viewer role to access the full dashboard - Devices must be enrolled and actively filtering for data to appear - Activity data typically appears within 2–5 minutes of device enrollment Dashboard Overview When you first log in, the Dashboard Overview presents a real-time snapshot of your school's internet activity: Key Metrics Panel At the top, you'll see four key metrics: 1. Active Devices — Number of devices currently connected and filtering through KyberGate 2. Requests Today — Total web requests processed in the current 24-hour period 3. Blocks Today — Number of requests blocked by your filtering policies 4. Safety Alerts — Active KyberPulse alerts requiring attention Activity Feed Below the metrics, the Live Activity Feed shows a real-time stream of web requests: - Green entries — Allowed requests - Red entries — Blocked requests - Orange entries — Flagged requests (matched a safety keyword but were allowed) - Each entry shows: timestamp, device name, student name (if directory integrated), URL, category, and action taken 💡 Pro Tip: Click on any entry in the activity feed to see the full request details, including the filtering policy that matched and the content category classification. Navigation Sidebar The left sidebar provides access to all major sections: | Section | Description | |---------|-------------| | Dashboard | Overview with real-time metrics and activity feed | | Devices | Manage enrolled devices, view status, and assign policies | | Web Filtering | Create and manage filtering policies, domain lists, and categories | | KyberClassroom | Teacher-facing classroom management and screen monitoring | | Activity Logs | Searchable, filterable history of all web requests | | Reports | Weekly report cards, student risk scores, and analytics | | KyberPulse | Safety alert configuration and incident management | | Settings | Organization settings, integrations, team members, and billing | Real-Time Activity Logs Navigate to Activity Logs for a detailed, searchable view of all web traffic: 1. Search bar — Search by URL, domain, student name, or device name 2. Filters: - Date range — View activity for any time period - Action — Filter by Allowed, Blocked, or Flagged - Category — Filter by content category (e.g., Social Media, Gaming, Education) - Device/Student — Filter to a specific device or student - Policy — See which policy triggered the action 3. Export — Click the export button to download logs as CSV for reporting Device Grid The Devices page shows all enrolled devices in a grid or list view: - Status indicators: - 🟢 Green — Online and actively filtering - 🟡 Yellow — Online but last check-in was >5 minutes ago - 🔴 Red — Offline or not filtering - Quick actions: Click any device to view its activity, change its policy, or initiate a screen view - Bulk actions: Select multiple devices to reassign policies, move to groups, or push URLs Network Health Score The Network Health Score (visible on the dashboard overview) is a 0–100 score that reflects your filtering infrastructure's health: - 90–100: Excellent — All systems operational, low latency, all devices checking in - 70–89: Good — Minor issues detected (e.g., a few devices not checking in) - 50–69: Fair — Some devices offline, elevated proxy latency, or policy sync delays - Below 50: Needs Attention — Significant issues with device enrollment, proxy connectivity, or certificate deployment Click the score to see a breakdown of contributing factors and recommended actions. Policy Simulator The Policy Simulator (under Web Filtering) lets you test how your policies will handle specific URLs before deploying changes: 1. Enter a URL in the simulator 2. Select the policy to test against 3. Click Simulate 4. The result shows whether the URL would be allowed, blocked, or flagged, along with the matching rule and category 💡 Pro Tip: Always use the Policy Simulator before making policy changes in production. It prevents accidental over-blocking of educational resources. Incident Timeline Found under KyberPulse → Incidents, the Incident Timeline provides a visual history of safety-related events: - Events are plotted on a timeline with severity indicators - Click any event to see full context: what the student searched, which device, timestamps - Incidents can be marked as Reviewed, Escalated, or Dismissed - Export incident reports for documentation and compliance Troubleshooting Dashboard shows 0 active devices: - Verify devices have the PAC file configured and CA certificate installed - Check that your network allows outbound connections to KyberGate proxy servers - Go to Devices and check individual device status for error messages Activity logs are delayed: - Small delays (1–3 minutes) are normal as logs are processed in near real-time - If delays exceed 10 minutes, check the Network Health Score for proxy connectivity issues Some devices show as offline but are being used: - The device may have lost its proxy configuration (common after OS updates) - Redeploy the MDM profile to refresh proxy settings Related Articles - Quick Start Guide: Setting Up KyberGate - Understanding Activity Logs - Student Risk Scoring - KyberPulse: Real-Time Safety Alerts

Last updated on Apr 17, 2026