System filters¶
When you first enter admin interface after installing the server, you can see the preset filters in Filters tab. This tree of filters consists of three main sections: Efficiency, Security and Policies. The filters contained in each of these sections have their relevance in the display of data and the settings for calculation of performance reports (for example, in Time tracking. These filters were created on the basis of average demand among users of DLP-systems to collect user data on a PC. Below there are descriptions of the purpose of each filter from the System filters tree by category.
Efficiency¶
Efficiency category contains pre-installed filters for displaying employee productivity. It consists of the following subcategories:
Reports and timesheets:
System Filter name |
Description |
---|---|
General report on work time |
Statistics on productivity of all employees |
Consolidated report on productivity |
Statistics on productivity of all employees |
Lateness report |
Statistics on lateness of employees |
Statistics for specified period |
Statistics for the entire period of work of employees with e-mail, instant messengers, printing events and intercepted files |
Statistics by day |
Displays statistics for each working day of employees with e-mail, Internet pagers, printing on printers and intercepted files |
Printer usage sheet |
Monthly printer usage statistics as a calendar |
Timeheet |
Statistics on the total hours worked per month as a calendar |
Productivity
System Filter name |
Description |
---|---|
Productive activities |
Consists of a chain of filters displaying the statistics of top user data in a pie chart, a linear chart for users, statistics of user productivity in a pie chart on productive activities |
Unproductive activities |
Consists of a chain of filters displaying statistics of top user data in a pie chart, a graphical graph for users, statistics of unproductive users in a pie chart for unproductive activities. |
Security¶
“Security” category contains filters to control the leakage of data in correspondence, usage of bank card numbers, copying files to external storages and mentioning unacceptable words in business communication.
Contains the following subcategories:
Events:
System Filter name |
Description |
---|---|
Screenshots |
Consists of a chain of filters displaying screenshots of the user’s desktop in the form of a table, list and tiles |
Webcam snapshots |
Consists of a chain of filters displaying images from users’ webcams in the form of a table, list and tiles |
Internet pagers |
“Messages” section contains statistical reports on correspondence in the form of relation graphs, reports on incoming and outgoing messages in Internet pagers. In “Attachments” section, there are statistical reports on intercepted files in correspondence in the form of relation graphs, reports on incoming and outgoing messages, and a list of all files on documents and images intercepted in internet pagers |
In “Mail” section, there are email filters of correspondence in e-mail clients (for example: Outlook), event reports, statistical pie charts and relation graphs. In “Attachments” section there are filters of intercepted files in mail correspondence, such as event reports, statisticalpie charts and relation graphs . In section “Web-mail” there are filters of correspondence in browsers (for example: Google Chrome) events, statistical pie charts and relation graphs. |
|
Microphone recording |
Contains reports in the form of a Heatmap, which show how many records were made for a certain time interval and in the form of an Event type where you can download all records as a single archive. |
Clipboard |
Statistics of clipboard interception in the form of a pie chart and analytical table |
External data storages |
Consists of a chain of filters displaying data on work with external storage devices in the form of an analytical table, heatmap, statistics in pie charts, and event filters. |
Incidents:
System Filter name |
Description |
---|---|
Violation dynamic |
Incident statistics in the form of a bar chart |
Violators |
Incident statistics in the form of a bar chart |
Violators by department |
Statistics of violators in departments by incident in the form of a pie chart |
Violators by company position |
Statistics of office violators by incidents in the form of a pie chart |
Violations |
Consists of a chain of filters displaying statistical pie charts for reports “Credit Cards”, “Drug addict vocabulary” , “Curse words vocabulary”, “Prohibited web sites”. |
Policies¶
In “Properties” tab of policies you can find the following options: “Policy is enabled”, “Apply to new events” or “Apply to all events” that starts recalculation of all the events processed by this policy.
Let’s consider in more details the subcategories of “Policies” tree.
Productivity policies:
System Filter name |
Description |
---|---|
Application categories |
Filters for applications launched by users. Each filter has different categories of productivity, depending on the thematic category of filters. To set productivity category, open filter settings -> “Productivity”. |
Web resource categories |
Filters for sites visited by users. Each filter has different categories of productivity, depending on the thematic category of filters. To set productivity category, open filter settings -> “Productivity”. |
Security policies:
System Filter name |
Description |
---|---|
Credit cards |
Collects statistics on entering credit card numbers. By default, the policy is excluded from the statistics. To make it active, you must put a “check box” on “Policy is enabled.” In the open list of values, you can see a description of the numbers of credit cards on the regular expressions of POSTFIX syntax. |
Curse words vocabulary |
Pre-defined dictionary of profanity. Events get into “Triggered filters -> Incident.”. For this to work, the policy is required to be enabled. |
Messages to yourself |
It marks all events of sending mails to the very e-mail address it was sent from as incident. To disable it, unmark the checkbox “Policy is enabled”. |
Screenshots (captured files) |
Collects captured screenshot files. Events get into the “Triggered Filters”. To disable it, unmark the checkbox “Policy is enabled”. |
Staffcop process search |
Collects statistics on search for the StaffCop agent. Events get into the “Triggered Filters”. To disable it, unmark the checkbox “Policy is enabled”. |
Files in encrypted archives |
Intercepts password-protected archives. Events get into the “Triggered Filters”. To disable it, unmark the checkbox “Policy is enabled”. |
Passwords from browsers |
Intercepts passwords entered in browser forms. Events get into the “Triggered Filters”. To disable it, unmark the checkbox “Policy is enabled”. |
System policies:
System Filter name |
Description |
---|---|
Auto cleanup |
This policy contains settings for autoclean of the hard disk on StaffCop Server. It can be edited only in Filters and policies in Admin menu. Method: - action perfomed on reaching space threshold. Hdd alarm percentage: - when this threshold is reached on disk drive you will get notification. The backup path: - the path to the folder where database backups will be saved if the threshold is reached and “Move” method is chosen. Default method is “Delete”. Database alarm percentage: when this threshold is reached on disk drive you will get notification. |
Content parser |
When searching for keywords in “Search - Keywords”, output will contain not only events containing keywords, but also events containing intercepted text format files with found keywords. |
OCR |
This system policy is meant for recognizing text in PDF and image files. For this policy the embedded OCR is used by default, although you can use ABBYY OCR SDK <https://ocrsdk.com/> account. Enter you Cloud OCR AppID and password to use the policy. |
Archives scanner |
This system policy starts automatic unpacking of all archives, each file can be downloaded from admin interface |
Report generator |
This system policy is meant for starting filter counting processes in enabled policies. |
Contact parser |
This policy is used for associating mail and messengers accounts with user accounts. |
Syslog connector |
This policy is used for automatic exporting of chosen event types to Syslog of the server. It’s used for integration with SIEM system. |
Dimension cards¶
Dimension card - a summary report displaying characteristics of an object or set of objects and events associated with them in a view most convenient for a given type.
These filters allow you to tune acutely the output of the dimension cards.
System Filter name |
Description |
---|---|
Computer card |
Consolidated information on events bound to a specific computer |
Account card |
Consolidated information on events bound to a specific account |
Application card |
Consolidated information on events bound to a specific application |
Site |
Consolidated information on events bound to a specific site/domain |
Network connection card |
Information on events bound to a specific network activity |
File card |
Consolidated information on events bound to a specific file |
Device car |
Consolidated information on events bound to a specific device, device type, device ID, and so on. |
Conversation card |
Consolidated information on events bound to a specific dialog, direction, chat, sender domain or recipient domain. |
Installation card |
Consolidated information on events bound to application installation events |