Computer configurations¶
Open Control panel -> Computer configurations. Choose the configuration you want to edit. This section contains descriptions of the main monitoring modules and their configurations.
Configurations serve for enabling/disabling monitoring modules, configuring agents and adding Rules - flexible settings for interception and blocking, that helps to tune up endpoint agents in the most efficient way to solve tasks being set.
Each monitored agent can be assigned a unique configuration.
By default, Default config is assigned to all new agents.
Click the name of a configuration to edit it.
Warning
Attention! When specifying monitoring rules, use only one type - “Allow” or “Dissalow”. In case both types are specified, “Dissalow” type has the priority, and “Allow” type will be ignored.
Main modules:
- Total
 - Users monitoring
 - Application control
 - User’s activity
 - Screenshots
 - Keyboard and clipboard
 - Network connections
 - Internet
 - Email and messengers
 - Files
 - Devices (USB)
 - Printers
 - Webcams
 - Microphones
 - Remote control
 - Desktop video record
 - Inventory of software and hardware
 - Presence in the workplace
 - Log files monitoring
 - Wifi networks
 - Assign agents
 - Data collection
 - Tags and access blocking