This article describes the task, monitor abnormal system use, explains why it is important, and provides step-by-step instructions.
The proxy server can also log all URL requests for tracking purposes. You can then review the logs to monitor use and misuse of network resources.