What’s New¶
Version 5.6 includes security updates and management improvements.
We’ve improved activity and productivity reports for clearer insights, expanded OS support, and added new features to simplify policy management in distributed environments. The update includes incident deletion protection and watermarking for data tracking.
Watermarks on User Screens
The Windows agent now displays watermarks on the monitor when users open specified websites and applications.
Watermarks prevent data leaks through screenshots or screen photography
It shows the login, PC name, and timestamp
You can customize display conditions, position, and transparency
Offline Screenshot Replay Player
In the latest version, you can now download a player to view screen recordings saved by the agent.
Allows you to view recordings locally without access to the server
Available for Windows, Linux, and macOS
Incident-Related Event Protection and File Deletion
We’ve added a new feature that protects events and files related to incidents from being deleted.
Keeps data safe for investigation
Prevents both accidental and intentional deletions
Stops data from being lost during database cleanup
Risk Thresholds and User Alerts
Now you can set a risk limit so that the system generates reports and sends alerts for users whose risk level exceeds this value.
Focus on users with the most significant risks
Monitor sudden or sustained changes in risk levels
Get daily reports automatically sent to stakeholders
Scanning Old Document Formats in the Crawler
We’ve added support for scanning older document formats:
Outdated office formats: .doc, .xls, .ppt
Plain text formats: .csv, .txt, .rtf
Available for Windows and Linux agents.
Active Time Report by Department
The activity report now includes an option to display activity by department.
“Other” Category in Productivity Report
The Productivity Time by Department report now includes an Other category.
Accounts for activities that don’t fall under productive, neutral, or unproductive policies
Helps you spot uncategorized user actions and adjust policies as needed
New ISO Image
The latest version includes an additional ISO image with Ubuntu 22 and PostgreSQL 15.
It comes with the latest OS and DBMS versions, no extra configuration required
Enhances system stability and security
File Checksum Verification
A new tool monitors the integrity of system files by comparing the current versions with the originals installed or updated on the system. If the files don’t match and there haven’t been any updates, it could mean someone has tampered with the system.
Works on both the server and the agent
Detects changes made manually or by malicious software
Helps verify the integrity of software
Automatic Log Collection
The agent now continuously collects system logs and sends them to the server.
Users or the OS can’t stop log collection
You can access the logs through a button in the web interface
No extra setup required
Excluding Policies from Sync
You can now exclude policies from syncing to subordinate servers.
Gives more control over policy management
Helps reduce server load
Adapts to infrastructure differences
Archive Database on a Separate Host
You can now to archive a database from a remote DB using a script.
Useful in distributed systems
Keeps archive and primary DBs separate
Master Port Configuration
Set the master server port in the settings.
Fixes issues with non-standard ports
Saves settings properly
Support for PostgreSQL 15 and Ubuntu 22
Cluster servers can now be deployed or migrated to these versions.
Better performance
Modern infrastructure support
Windows Agent
Outlook Message Capture (On-Prem)
Added message interception:
Captures from local Outlook with custom Exchange domain
Configurable in agent settings
Note
Exchange Server is a Microsoft’s enterprise mail server. When deployed on-prem, it gives organizations full control over their email system.
PowerShell Command Capture
Captures both terminal input and output in the Terminal Input event.
Linux Agent
Monitoring Non-Standard Ports
Agent monitors activity on all ports listed in the allowed list.
Allows you to record network activity even through non-standard ports
Detects traffic blocked by antivirus software
POST Request Interception
Agent is able now to capture POST data, including logins and passwords.
POP3 Monitoring Support
Since version 5.6, the Linux agent intercept data on the POP3 protocol.
It makes the email interception more complete
Monitors POP3 traffic from desktop clients
External Device File Listing
Logs file lists from connected drives.
Triggers File Operation events
Supports shadow copies