by
Bec May
The KCSiE (Keeping Children Safe in Education) filtering and monitoring requirements sound straightforward enough on paper. Schools and colleges need appropriate filtering and monitoring systems. Those systems need to protect children from harmful content, support online safety, be reviewed regularly, and involve the right people across safeguarding, leadership, and IT.
Lovely. Nice and tidy.
The problem, however, is that school digital environments are rarely, if ever, nice and tidy.
They are cluttered with school and college devices, personal devices, mobiles, guest networks, cloud platforms, apps, firewalls, filtering systems, monitoring tools, identity systems and old bits of infrastructure nobody wants to touch because “Dave set it up in 2018 and Dave has since moved to Cornwall”.
And this is where we often see KCSiE filtering and monitoring become tricky in practice. The challenge is not simply whether your school has filtering and monitoring systems in place. It is whether those systems work across the environments that students actually use.
Can your school easily identify access to harmful content, including dates, times, usernames, and context? Can your designated safeguarding lead access meaningful reports quickly, without involving IT? Does your school have a clear policy (and someone to action it) for reviewing filtering decisions so that harmful content stays blocked without creating unreasonable restrictions on legitimate teaching and learning? Can you quickly prove to Governors and trustees that systems are compliant, and more importantly, effective? Does the school have visibility across school and college devices, mobile, BYOD, and personal devices?
Many schools get stuck here, in the gap between theoretical provision and the daily reality of keeping students safe online.
One of the big problems we see with filtering and monitoring in schools is when it is treated solely as a technical control.
Spoiler alert: It is not.
Yes, system administrators play an important role: they configure filtering systems, manage internet access, run system checks, investigate technical issues, work with providers, review firewall logs, and help stop students from bypassing the network with proxy services or VPNs.
But it is not IT’s job to assess safeguarding concerns, decide whether an alert needs pastoral follow-up, or carry the school’s safeguarding responsibility.
KCSiE expects the right people to understand their roles and know when to act:
Your designated safeguarding lead (DSL) should lead on safeguarding and online safety. That includes understanding what your monitoring system surfaces, reviewing relevant reports, responding to safeguarding concerns, and knowing how to escalate concerns.
Your senior leadership team (SLT) is responsible for ensuring that filtering and monitoring systems are purchased, reviewed, understood, and used properly. They should oversee reports, document decisions on what is blocked or allowed, and ensure staff understand the school’s policies, processes, and procedures.
Your governing body or proprietor has overall strategic responsibility. They need assurance that appropriate filtering and monitoring systems are in place, working effectively and reviewed regularly.
Your IT support, whether in-house or third-party, has technical responsibility for maintaining systems, providing reports, completing actions after checks or concerns, and working with the DSL and SLT to identify risk, carry out reviews and run checks.
All staff also have a role. They need to know how to report safeguarding or technical concerns, especially if unsuitable material is accessed, filtering fails, alerts are triggered, or restrictions are affecting teaching and learning.
Key takeaway: IT manages the systems. The DSL interprets safeguarding risk. SLT owns the process. Governors seek assurance. Staff report concerns. That is how filtering and monitoring move from “we have a system” to “we know what to do when it surfaces a risk.”
Most schools understand that the DfE expects appropriate filtering and monitoring systems. The harder part is making those systems work in the daily reality of school life. This is where schools often get stuck. Not because they do not care, and not because the technology is useless, but because filtering and monitoring only work when the systems, people and processes line up.
When monitoring systems are poorly configured, fail to exclude associated safe terms, and lack granular data around alerts, they can create a lot of noise.
Not all alerts are created equal. A student searching for self-harm content demands an immediate, careful response, but that's a very different situation from a student who stumbles onto a flagged website while researching a sensitive but lesson-relevant topic.
The problem is that many monitoring systems can't tell the difference. They fire real-time alerts for every slightly suspicious web hit, flooding designated safeguarding leads with noise. When everything looks urgent, nothing does. DSLs already carry a significant workload, and burying them in false positives doesn't just waste time. It risks the alerts that genuinely matter getting lost in the pile.
Key Takeaway: Set up alerts so issues that need immediate attention are clearly surfaced, not buried among low-risk activity. Your DSL should be able to prioritise genuine safeguarding concerns without wading through noise. Reports from monitoring solutions need to include enough detail to understand what happened, who was involved, what was searched or accessed, when it occurred, and whether this is part of a wider pattern.
Under KCSiE guidelines, schools need to manage risk without shutting down legitimate learning. Easier said than done, right?
The statutory guidance also states that filtering systems should not prevent students from learning to assess and manage risk. Young people still need age-appropriate opportunities to learn about online relationships, misinformation, online harms, consent, and privacy, helping them grow into responsible digital citizens.
This makes filtering decisions a policy issue, not simply a technical one. Schools need a clear process for deciding:
What should be blocked?
Who can request a change to a policy?
Who approves exceptions?
How is safeguarding risk considered?
How are teaching and learning needs considered?
How are decisions recorded?
How often are filtering decisions reviewed?
It's a fine line here. If filtering policies are too lax, students may access harmful, illegal, or adult content, as well as other risky material. If filtering is too severe, it can block access to legitimate resources for PSHE, RSE, mental health, current affairs, and support and information about LGBTQ+ inclusion and sexual health.
Key Takeaway: The goal is not to block everything remotely uncomfortable. Rather, the aim is to strike a balance between safeguarding students online AND ensuring they can access age-appropriate resources responsibly.
Filtering and monitoring standards don't start and stop with school and college devices.
The DfE specifically tells schools and colleges to consider school-managed devices taken off site, unmanaged devices under BYOD schemes, guest access, portable Wi-Fi, mobile and app technologies, and whether providers can filter those environments. This is the bit that can catch schools out.
The issue here isn’t whether you can control what's happening on every personal device in every pocket — that would just be madness. The issue is whether your school understands where its filtering and monitoring systems apply, where they do not, and how those limits are reflected in risk assessments, acceptable use policies (AUPs), and safeguarding procedures.
This is where firewall-level visibility becomes useful. If a student is using a BYO device or mobile device on the school network, your firewall will still log that data, and Fastvue Reporter for Education can use it to generate user-linked reports and alerts.
Key Takeaway: A school that understands its blind spots can manage risk honestly. A school that assumes 'the filter has it covered' may be missing quite a lot.
The DfE filtering and monitoring standards ask schools and colleges to consider mobile and app technologies, not just traditional web browsing.
And with fair reason. Remember when internet access was slow, limited, and used only for a quick Yahoo search and an update to your MySpace song? I may be showing my age here, but you get my point. The internet is now a fully thriving ecosystem that competes with real life for our youth's attention, and often wins. Digital learning is an inextricable part of the educational system; kids’ relationships form and grow through chat apps and gaming experiences, and teens are increasingly turning to AI chatbots when they need advice.
Schools, therefore, need to be clear about what their systems can and cannot see:
Can your filtering and monitoring systems show search terms, URLs, domains, or only broad categories?
Can they identify the user?
Can they surface repeated behaviour over time?
Can they show what a student actually searched for or watched, or only that an IP address visited YouTube at 11:42 am?
YouTube is a good example of why URL-level reporting isn't enough—seeing that a student accessed youtube.com doesn't tell your DSL much at all. The student could have been watching a maths explainer, violent videos, self-harm content, or a live gaming stream.
Detailed reporting becomes extremely useful here. Fastvue Reporter provides clearer context on YouTube activity, including video titles, channels, watch time, and search activity, giving DSLs a way to quickly identify concerning activity related to self-harm, extremism, drugs, and adult content.
Fastvue's new Microsoft 365 integration extends visibility beyond web activity. Where configured, it can surface keyword-matched concerns from internal email and Teams chats, helping schools identify risks such as bullying, student wellbeing concerns, or language that may need to be reviewed under your school's Prevent Duty responsibilities.
Generative AI adds another layer of complexity to schools' filtering and monitoring responsibilities. Students are using AI tools for learning, but they are also increasingly turning to gen AI for relationship and mental health advice, to generate deep fakes, to write abusive messages, and to explore topics like looksmaxxing, the manosphere, and other extremist corners of the internet. Where this activity is not visible to schools, clear policies, education, and safeguarding processes need to account for those gaps.
Where AI prompt activity is available in firewall logs, Fastvue can surface it in reports and alerts, providing visibility into prompts across the main safeguarding concerns, as well as an all-prompts view in the Internet Usage report.
Key Takeaway: DfE guidelines don't expect you to have perfect visibility into every app, device, or message. It does require honest visibility into what your systems can see, clear policies for what they cannot, and reporting that gives safeguarding teams enough context to act when concerning patterns appear.
Filtering and monitoring systems tend to fall short for one major reason: they don't align with their school's daily safeguarding reality.
It's generally not because the filtering systems fail or because schools don't care. It's because the right information isn't reaching the right people in a form they can easily understand and act on.
Firewall logs, filtering reports, and monitoring data can be extremely useful for safeguarding and technical concerns alike. In certain cases, they can also be completely unreadable to anyone outside the IT department.
A DSL does not, and should not, have to wade through IP addresses, categories, ports, and timestamps with no context. They need to know what happened and who was involved, what risk it may indicate, so they can make informed decisions about what action may be needed.
The DfE says monitoring data should be provided in a format that staff can understand, and that users should be identifiable so that concerns can be traced back to individuals rather than year groups or classrooms. This is the difference between a technical log and safeguarding software that schools can apply to their existing safeguarding workflows.
Key takeaway: Your safeguarding team needs reports and alerts they can quickly and easily interpret. Monitoring data should be user-linked, non-technical, and relevant, so DSLs can quickly see what happened, who was involved, and whether the activity needs follow-up.
Some systems go the other way.
Yes, they can show you that a category was blocked or that someone triggered an alert, but they don't provide enough detail to understand intent or risk. Our APAC manager explains it this way: some tools tell you there is a fire somewhere in the building. Fastvue helps show where it started, who was involved, and what happened next.
There is a big difference between a student accidentally landing on an image-generation app that is blocked by your filtering systems and one who repeatedly searches for new deepfake apps to create images of their classmates. The question is, is your DSL able to quickly and easily see the difference?
Key Takeaway: A blocked category or generic alert is not enough. Your school needs reports that show intent, pattern, and context, so your DSL can distinguish between a one-off blocked page and behaviour that may indicate a real safeguarding concern.
Effective KCSiE filtering and monitoring systems should surface both safeguarding and technical concerns. Some schools get stuck here, because nobody is quite sure who is actually responsible for following up on alerts and reports.
The DfE guidance is clear that this is a shared responsibility, not an IT-only job. Your DSL should lead on safeguarding and online safety, including reviewing relevant reports, conducting risk assessments, responding to safeguarding concerns identified through filtering and monitoring, and providing governors with assurance on the effectiveness of the filtering and monitoring tools. IT support is responsible for working with providers, maintaining systems, providing reports, completing actions in response to concerns or checks, and working closely with your DSL and SLT to identify risks, carry out reviews, and run checks.
So what does this mean in practice? An example looks like this: attempts to access a suspicious domain may start as a technical event that IT sees as the firewall blocking them. If they continue trying to access the site, the safeguarding team may need to step in and run additional reports to gain deeper context. Ensuring that everybody knows their role and how to follow up is central to keeping children safe in education.
Key Takeaway: Your school needs a clear alert workflow. Who receives alerts? Who reviews them? Who decides whether something is technical, safeguarding-related, or both? Who records the concern? And who reports trends back to leadership? If you can't answer these questions, you may need to go back to basics. Assign roles and responsibilities, and refresh your guidelines around how your school responds to concerns surfaced by your school's filtering and monitoring.
As the World Wide Web evolves and expands at a never-before-seen pace, so too are expectations on schools for how they manage filtering and monitoring systems across the board.
Filtering and monitoring advice has recently tightened around three practical areas: annual review, illegal websites, and technical coverage.
The DfE now expects schools to review filtering and monitoring provision at least once every academic year, and sooner if risks, technology, working practices, or device setups change. That review should consider vulnerable students, SEND, EAL, BYOD, generative AI tools, mobile and app content, and whether staff can actually use the reports provided.
The UK Safer Internet Centre has also expanded its guidance on appropriate filtering to reflect the Online Safety Act. Schools are now advised to check that providers block illegal child sexual abuse material via IWF services and unlawful terrorist content via the police-assessed CTIRU list. These protections should not be turned off or removed, including by system administrators.
Key Takeaway: Filtering and monitoring are no longer just “do we have a filter?” Schools need to know what is blocked, monitored, or reviewed; what can be bypassed; and whether the right people can act on the information.
KCSiE filtering and monitoring is often evaluated from a compliance perspective, and yes, schools and colleges need to meet statutory guidance, DfE standards and safeguarding expectations. But the real issue is confidence.
And the stakes are rising. Writing in Schools Week, a partner at Payne Hicks Beach warned UK schools that inadequate filtering and monitoring could expose themto litigation, pointing to live legal cases in the US where schools faced claims over harmful content accessed on school-issued devices.
Can your school say harmful content is being blocked where it should be? Can you review DSL monitoring reports without drowning in noise? Can IT investigate concerns with clear safeguarding input? Can leaders explain how online safety risks are managed? Can governors and trustees seek assurance from evidence?
That is what good filtering and monitoring systems should support.
Not just a tick box. Not just a policy. Not just a filter quietly sitting in the background until something goes wrong.
A working approach to KCSiE filtering and monitoring brings the safeguarding and technical teams together. It helps your school manage risk without creating unreasonable restrictions. It gives DSLs useful information, not just more noise. It gives IT the data to investigate and improve. It gives leaders and trustees evidence that systems are effective.
Because keeping children safe online is not just about blocking the worst of the web.
It is about seeing enough, understanding enough, and acting early enough to make a difference.
Download Fastvue Reporter and try it free for 14 days, or schedule a demo and we'll show you how it works.

