Computer configurations¶
Open Control panel -> Computer configurations. Choose the configuration you want to edit. This section contains descriptions of the main monitoring modules and their configurations.
Configurations serve for enabling/disabling monitoring modules, configuring agents and adding Rules - flexible settings for interception and blocking, that helps to tune up endpoint agents in the most efficient way to solve tasks being set.
Each monitored agent can be assigned a unique configuration.
By default, Default config is assigned to all new agents.
Click the name of a configuration to edit it.
Warning
Attention! When specifying monitoring rules, use only one type - “Allow” or “Dissalow”. In case both types are specified, “Dissalow” type has the priority, and “Allow” type will be ignored.
Main modules:
- Total
- Users monitoring
- Application control
- User’s activity
- Screenshots
- Screenshots Batch
- Keyboard and clipboard
- Network connections
- Internet
- Email and messengers
- Files
- Devices (USB)
- Printers
- Webcams
- Microphones
- Remote control
- Desktop video record
- Inventory of software and hardware
- Presence in the workplace
- Log files monitoring
- Wifi networks
- Assign agents
- Data collection
- Tags and access blocking
- File scanner
- Bulk files copying
- Agent protection