Set Up and Registering New Devices on the Family Zone Box

Please note: The Family Zone Box is only available in Australia and New Zealand

Article type: Fundamental steps

The Family Zone Box provides a safe network for family and guests to connect to. Online content is monitored by the Family Zone products. Parents what their children are doing online. Premium Members can add filtering to ensure users are accessing age-appropriate content. 

Parents have the option of adding a family member's device by connecting the device to the network provided by the Family Zone Box or by installing the Family Zone App. 

Upon connecting the device for the first time, the Parents receive an email alerting them to a Guest Device.

See Adding Guests to Your Family Zone Box Home Network (Australia and New Zealand)

Why do I need to register devices?

Registering devices to Family Zone applies the User's age-appropriate monitoring and reporting. Premium Members get additional settings to filter and block inappropriate online content.

What options are available to register devices for Premium Subscriptions?

You can register devices in three ways:

  1. On the new device, use a web browser to go to http://home.tools
  2. For printers, game consoles, and media electronics, login to the Family Zone App as a parent
  3. Install the Family Zone App on mobile devices or Family Zone software on laptops and computers

What device registration is available for Insights Subscriptions?

You can register new devices in two ways:

  1. On the new device, use a web browser to go to http://home.tools
  2. Install the Family Zone App on mobile devices or Family Zone software on laptops and computers

Do I need to install Family Zone on the computers and mobile devices?

No, you do not need to install Family Zone unless the computer or device needs to be monitored when it's connected to networks outside of the home.

Why am I being asked to install a certificate?

The certificate ensures Family Zone can identify secure websites. Often sites containing risky content, malicious downloads, and online stores hide their activity with the same security tools used by legitimate websites.