Event types

All types of intercepted events are listed in Constructor

../_images/events_types.png

File operation

File operations performed by applications (file managers, browsers, other software).

../_images/events_types_1.png

Screenshot

Displays screenshots of user screen, the frequency of screenshots and their quality is configured in the agent configuration.

../_images/events_types_2.png

User activity

Contains the activity time of a user in applications and on web sites, it is used in reports. The “User’s activity” module must be enabled.

../_images/events_types_3.png

Web

Websites visited by an employee. The “Web traffic” and “Network monitoring” modules must be enabled.

../_images/events_types_4.png

Keyboard

Displays keystrokes and their combinations in various applications, alsdisplays intercepted passwords when logging into Windows, the “Keyboard”“Low-level keylogger” modules must be enabled.

../_images/events_types_5.png

Software registry

It contains information on the software installed on the PC, it is collected when the configuration is updated and the agent is restarted.

It contains information on the software installed on the PC, it is collected when the configuration is updated and the agent is restarted.

../_images/events_types_7.png

Instant message

Skype, ICQ, other messengers. For this to work, you need to enable the Instant messengers and Network monitoring modules.

../_images/events_types_8.png

Mail

E-mail correspondence. For this to work it is necessary to enable modules “E-mail”, “Webmail”, “E-mail (MAPI/Exchange)” depending on what type of mail is of interest.

The “Network monitoring” module must be enabled.

../_images/events_types_9.png

Desktop video

The “Play” button allows you to view all the activities of the specified employee for the desired period of time.

For this to work, you need to configure the “Screenshots” and “Desktop video” in the “Computer configuration”.

../_images/events_types_10.png

Form data

Displays details of intercepted web-forms from Internet browsers in the tabular form. It is used to intercept passwords entered in the browser, which can be viewed in the “Triggered filters” - “Interception of passwords in the browser”.

../_images/events_types_24.png

FTP

Displays information on all connections to FTP servers.

../_images/events_types_26.png

Devices inventory

A list of all the devices on the computer with their identifiers.

../_images/events_types_11.png

Network connection

Allows you to identify which IP addresses and ports were used for the connection. The “Network monitoring” module must be enabled.

../_images/events_types_12.png

Intercepted file

You can access shadow copies of files sent by e-mail, Internet messengers, downloaded via browsers, file storage, etc.

The “Shadow copying” and “File system activity” modules must be enabled.

../_images/events_types_13.png

Sound recording

It’s possible to record sound from available microphones. For this to work, you need to enable the “Microphone recording” module and configure the recording parameters of the microphone.

../_images/events_types_14.png

Clipboard

Intercepts the text content of the clipboard. The “Clipboard” module must be enabled

../_images/events_types_15.png

System log

This information is usually used to analyze the problems that have arisen with the agent or server. The “Debug Mode” must be enabled.

../_images/events_types_16.png

Search query

Displays the queries entered by the user in the popular search engines. The “Web search queries” module must be enabled.

../_images/events_types_17.png

User logon/logoff

Facts of system login/logoff

../_images/events_types_18.png

Device

List of devices connected to the PC.

../_images/events_types_19.png

Web-cam snapshots

Web-cam snapshots. For this to work, you need to configure the settings of snapshots from the webcam and enable the “Webcam snapshots” module.

../_images/events_types_20.png

Printing

Printed documents. The “Printing” module must be enabled.

../_images/events_types_21.png

Installation

List of installed applications.

../_images/events_types_22.png

Disk drive

Connected external drives

../_images/events_types_23.png

WiFi connection

Data on connections to wireless networks

../_images/events_types_6.png

Alert

Alerts sent by system policies

../_images/events_types_25.png