CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features www.censornet.com.

Slides:



Advertisements
Similar presentations
UNIVERGE® SV8100 Desktop Suites
Advertisements

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
Miscellaneous Windows 2000 Desktop Features Windows 2000 Intermediate.
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
Managing User Settings with Group Policy
Installation and Deployment in Microsoft Dynamics CRM 4.0
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
1 Module 2 Installing Windows NT. 2  Overview Preparing for Installation Installing Windows NT Performing a Server-based Installation Troubleshooting.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Module 16: Software Maintenance Using Windows Server Update Services.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A.
®® Microsoft Windows 7 for Power Users Tutorial 8 Troubleshooting Windows 7.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
CSI-E Computer Security Investigator – Enterprise.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Managing User Desktops with Group Policy
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
ServerProtect 5.58 for NT Tech Support Dep.. Table of Contents Introduction and Installation Managing ServerProtect Configuring ServerProtect Maintaining.
Microsoft Solution Accelerator for Business Desktop Deployment Microsoft ® Solution Accelerator for Business Desktop Deployment Training for IT Professionals.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 7 Configure User and Computer Environments By Using Group Policy.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Windows 2000 Certificate Authority By Saunders Roesser.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Deploying Software with Group Policy Chapter Twelve.
Administering Microsoft Windows Server 2003 Chapter 2.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Windows SharePoint Services. Overview Windows SharePoint Services (WSS) Information Worker Infrastructure component delivered in Windows Server 2003 Enables.
Windows Server 2003 群組原則設定與管理 林寶森
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Run the on your PC to start the firmware configuration process Run IP Config Tool.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Maintaining and Updating Windows Server 2008 Lesson 8.
Copyright © 2012, SAS Institute Inc. All rights reserved. SAS ENVIRONMENT MANAGER CARMINE VERRELLI - TECHNICAL TRAINING SPECIALIST.
Run the on your PC to start the firmware configuration process Run IP Config Tool.
The Ultimate SharePoint Admin Tool
Managing User Desktops with Group Policy
UC Pro Troubleshooting Guide
2016 Citrix presentation.
Unit 10 NT1330 Client-Server Networking II Date: 8/16/2016
A 5-minute overview of ADAudit Plus
Employee Monitoring Solution
Windows Operating System
IT Management, Simplified
Presentation transcript:

CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features

CensorNet Desktop Surveillance is an enterprise solution intended for controlling the enterprise employees’ or institution students’ work at the computers by means of recording everything that takes place on the monitors of their machines. What is it?

Big Middle-sized Organizations  Corporate Networks  Employees/Students at the computers  Voluminous accounting/office work Who needs it?

Work with confidential information (financial, IP, etc.) Get in touch with prohibited content Incident investigation, detection of involved persons Corporate security Real, practical image of business-processes Monitoring of the new project deployment, organizational experiments efficiency Organization processes efficiency How the working hours are spent (for work and non-work activities, games, chatting, etc.) Outside, non-official work Corporate policy violations Employee/group member work efficiency Application areas

CensorNet Desktop Surveillance is a simple and universal solution to establish exactly and definitely what actions were performed at this machine, just like if a supervisor were standing behind the employee’s shoulder. SimplicityUniversalityDefiniteness Positioning

Easy Installation Reliability Simplicity and Obviousness Active Directory integration Export features Positioning

CensorNet Desktop Surveillance Technical Guide: Components, Features Positioning

Easy integration in corporate network Absence of need in 3 rd part app Absence of need in advanced PC experience Installation

Server + Administrative Panel + Server Tray Viewer (1 or more) Clients Components

Administrator Access to Administrative Panel and Viewer Supervisor Access to Viewer only Roles Management

Common installer Remote installation Local via setup.exe package  Default Clients settings: Capture screen on active windows change; Capture screen on clicking and key pressing. Bit depth: 8 One -click way to install Client locally Package created in Administrative Panel Customized Clients settings  Customized Clients settings  Way to install Client on 1 or several PCs or whole domain per 1 operation  Need in Administrator rights of remote host Client (agent) installation

Triggers Capture screen periodically Picture quality 4 bit depth Sub Department Clients Settings 4 bits: 8 bits: 24 bits: Capture screen on active window change Check changing of names of window Capture screen on clicking and key pressing 8 bit depth (default) 24 bit depth Client settings

 Endless number of Clients can be installed  Monitoring is taken place on licensed on only  License is assigned to Client manually in Administrative Panel  License can be reassigned from one Client to other one Licensing

Time spends on not work/study activity Work with confidential information Compliance of corporate rules Head – hunting/searching for new job Root cause of PC failures You can investigate.. Monitoring

2 search types: quick and parameterized (by diff metadata: user or PC name, application name or window title) Embedded player for viewing session as video Live option for real-time monitoring Export picture, video, report Favorites to save search conditions Viewer

Server database Local storage  Located on Server host  Physically : Firebird 2.5 file and Cache folder with bitmaps  Temporary local storage in case of losing connection with Server  Synchronize with Server database when connection repairs Operation for storage management:  Storage relocation  DB clean up: by date, by period Data Storage

Server Tray application Client Controller  Show warning message in tray if failure of Server appears  Restart Server service after 3 failures then only show warning notification  Restart Client Processes in case of their failure or intentional damage %PROGRAMFILES%\ CensorNet\Desktop Surveillance\Server\ ServerService.log %PROGRAMFILES%\ CensorNet\Desktop Surveillance\Client\ClientService.log [ClientActivity_PID.log] %USERPROFILE%\AppData\Local\CensorNet\Desktop Surveillance\Viewer.log Log files location : Troubleshooting

Server Client Viewer Server and Viewer can be uninstalled: via Common installer package from Start menu from Control Panel %PROGRAMFILES%\CensorNet\Deskt op Surveillance\Uninstall.exe Client can be uninstalled: remotely via Administrative Panel via common installer if network connection problems occur Uninstalling

Features for next version  Alerts system  External tools for reaction on events (Trigger SDK)  Keystroke hooking and recording  Mac Client  Saving the database when removing the server.  Site-licensing Roadmap

Questions?