macOS Agent Features

Overview

Feature

Description

Customization

Allows you to change the build name and icon with support assistance

Installation

Simplifies installation and updates:

  • Universal installer for Intel, M1, and M2 chips

  • Remote agent updates via the server

  • Configures a backup server for reliability

User Monitoring

Enables authentication monitoring:

  • Logs remote and local logins/logouts

  • Tracks session locks and unlocks

  • Uses black-and-white lists to filter users

Application Control

Controls and blocks application launches based on black-and-white lists

Activity Monitoring

Monitors user activity:

  • Tracks time spent in apps

  • Logs website activity via network monitoring

  • Captures browser history for analysis

Screenshots

Captures screenshots:

  • At specified intervals

  • When switching windows or changing titles

  • Compresses for space-saving

Keyboard & Clipboard

Intercepts information:

  • Keystrokes (keylogger)

  • System keys

  • Text, images, and files from the clipboard

Internet

Tracks network activity:

  • Monitors search engine queries

  • Logs website visits

Mail & Messengers

Monitors messages and downloads based on:

  • User activity

  • Screenshots

  • Keystrokes

Intercepts messages from:

  • Messengers: WhatsApp, MS Teams, Telegram, VK Teams, Bitrix 24

  • Webmail and mail apps: Outlook, Gmail, Yandex Mail, VK Mail, etc.

Files

Tracks file activity:

  • Monitors user files

  • Records website visits

  • Tracks file operations in background apps

Controls files:

  • Shadow copies of file:

    • copied to USB or network shares

    • downloaded from browsers

    • sent and received through messengers and mail

    • printed documents

  • Uses black-and-white lists for files

Devices

Monitors removable storage devices:

  • Tracks USB connections

  • Blocks USB devices

  • Provides read-only access to connected devices

Printers

Capture printing for the standard macOS printing system (CUPS):

  • Tracks the printing details

  • Saves shadow copies of the printed documents

  • Records copies of the document’s content

  • Takes a screenshot at the time of printing

Remote Control

Blocks the computer upon administrator request

File Scanner

Scans files in home directories based on content type:

  • Sends file measurements and content

  • Offers flexible content type settings

  • Runs scans on a scheduled basis

  • Uses black-and-white lists for files

Backup Server

Lets you set up backup servers to guarantee continuous operation

Intercepting Browser File Downloads

Starting with version 5.3, macOS agents can intercept files downloaded through browsers.

To enable file interception:

  1. In the Control PanelComputer Configurations, select your configuration.

  2. In the Files section, enable File Activity and set File Size for Shadow Copying.

  3. In Internet section, enable Browser History .

  4. Done!

After activation:

  • If the browser was installed before the agent, a reboot is required to start intercepting downloads.

  • If the browser was installed after the agent, the agent will create shadow copies of all files from the browser download history.

Note

The agent only intercepts files recorded in the browser’s download history. Files downloaded through other methods won’t be shadow-copied.

Website Activity Tracking

The agent allows you to track website visits and search queries.

Website Visits

With version 5.5 and later, the agent can track website visits and search queries by monitoring network connections.

To enable website visit monitoring:

  1. In the Control Panel, go to Computer Configurations and select your configuration.

  2. In the sidebar, select Internet and enable Web Traffic.

Once activated, the agent will log Website Visit events, including:

  • username,

  • activity time,

  • browser name,

  • website address, including URL, domain, and full domain.

To view website visits in the activity report:

  1. In the Builder, select Event TypeActivity Time.

  2. In the top-left panel, set the time period.

  3. On the right, click ReportDetailed Activity Report.

The Event Lens will display a detailed list of Website Visit events.

Tracking Search Queries

Search queries are recorded through browser history.

The agent tracks user activity across the following browsers:

  • Safari,

  • Google Chrome,

  • Yandex Browser,

  • Mozilla Firefox,

  • Opera,

  • Vivaldi.

To enable search queries tracking:

  1. In the Control Panel, go to Computer Configurations and select your configuration.

  2. In the sidebar, select the Activity Tracking section and enable Application Activity to track application activity.

  3. In the Internet section, enable Browser History to capture website addresses.

Generate a Search Query Report:

  1. In Constructor, select Event TypeActivity Time.

  2. Set your desired time period in the top-left panel.

  3. On the right, click ReportDetailed Activity Report.

  4. The Event Lens will display a detailed report of Activity Time events, including website visits.

../../_images/mac_13.png

Each Activity Time event contains:

  • username,

  • activity time,

  • browser name,

  • website address, including URL, Domain, and Full domain.

Email and Messenger Monitoring

You can track email and messenger activity using screenshots, keylogging, and activity tracking. These features give you a full view of user interactions and help you spot any suspicious behavior.

How to Enable Monitoring:

  1. Go to Control PanelComputer Configurations and select your configuration.

  2. In the sidebar, select Screenshots.

  1. Next, select Keyboard and Clipboard in the sidebar.

  1. Finally, select Activity Tracking from the sidebar.

Once everything is set up, you’ll see the relevant events in the Event Lens.

Analyze the events:

Activity Time — Review how much time was spent in email or messaging apps, and check for other events that happened simultaneously. Screenshots — View screenshots to see to monitor app activity, open windows, and spot unusual behavior. Keylogger — Look through keylogger records to capture everything typed by the user, focusing on messages in email clients and messaging platforms.This way, you can track unauthorized actions in email applications and messaging platforms.

With these tools, you can effectively monitor and track any unauthorized actions within email and messaging apps.

Computer Locking

Introduced in version 5.4.

This feature allows you to lock a user’s session. Once locked, any login attempts will be automatically rejected.

How to Lock a Computer:

  1. Go to Control PanelComputers.

  2. Check the box next to the computer you want to lock.

  3. In the Perform Action tab, select the Lock PC option.

../../_images/mac_12.png
  1. Done!

After the lock is activated, the user will be logged out, and the login window will appear on the computer screen.

How to Unlock a Computer:

  1. In Control PanelComputers, check the box next to the locked computer.

  2. Go to the Perform Actions tab.

  3. Click Unlock PC.

Controlling USB Devices

Starting from version 5.4, Staffcop allows you manage and control USB device usage.

When the feature is enabled, the agent tracks events related to USB devices:

../../_images/mac_10.png
  • File Operations — When files are copied, modified, deleted, or otherwise manipulated on USB devices

../../_images/mac_9.png
  • Intercepted File — When files are copied to a USB device

../../_images/mac_11.png

Note

To enable shadow copying of intercepted files, activate :ref:Shadow Copying <file> in Computer ConfigurationFiles.

How to Enable USB Control:

  1. Go to AdminComputer Configurations.

  2. Select Devices.

  3. Toggle the USB Devices switch to enable control.

To block all USB devices or allow read-only access, enable the corresponding switches:

../../_images/mac_8.png

USB storage device access control can be further customized using :doc:black and white lists <../../../cases/USB_control>.

Note

Black and white lists block only USB storage devices.

To view events related to a device:

  1. In Constructor, select the Device dimension.

  2. Select HWID.

  3. Select the device to display events.

../../_images/mac_7.png

Document Interception during Printing

Starting with version 5.5, the agent can capture documents sent to the printer.

Note

This feature only works with CUPS (Common Unix Printing System), the default printing system for macOS.

How to enable document interception:

  1. Go to Admin → Computer Configurations.

  2. In the sidebar, click Files and turn on Shadow Copying.

  3. Next, select Printers and enable Print to Printer.

Once these options are enabled, the agent will create two events when a print job is intercepted:

  • Intercepted File – This event includes:

  • print job details

  • a shadow copy of the document

  • a copy of the file containing printed content

  • a screenshot at the moment of printing

  • Document Printing – This event captures:

  • agent

  • user

  • application

  • file

  • number of pages

  • content