- Software Architecture
- Record Activity
- Secure Archiving
- Analyse User Behavior
- Investigate Abuse
- Search Recorded Activity
- Web Filtering
- Advanced Reporting
- Manage With Ease
- System Requirements
With the Spector 360 Dashboard you can perform an investigation of any employee suspected of inappropriate or unethical behavior with the User Explorer Tool. This tool is also perfect for performing spot investigations of anyone in your company.
The User Explorer empowers you to inspect the computer and Internet event data tied to an individual employee, one employee at a time:
The User Explorer Tool (contained within the Dashboard) is ideal for conducting investigations by displaying the event data associated with individual employees. An "Explorer" style window lets you navigate within the recorded events of any employee. You can export your findings for use in other Windows applications or print the information displayed on the screen.
The User Explorer Tool empowers you to navigate events at a high level and then load those events of interest so you can “drill down” and view the associated details. Both a summary and detail view is provided. At any time you can view the actual screen images associated with those events using Spector 360’s Screen Snapshot Viewer with its video-like controls. Documenting infractions for corrective action is a simple process and can be performed with the click of a mouse.
With the User Explorer Tool you can focus on specific elements pertaining to each activity to narrow your investigation.
The following activities can be analysed on an individual basis with the User Explorer Tool:
Event data contains Chat and Instant Messaging conversations captured from AOL, MSN, ICQ, and various other Chat/IM programs.
Example : View individual Chat sessions and see who the employee was chatting with and exactly what was sent and received in each session.
Event data contains files printed or copied to a CDROM drive, Network, Local Drive, Printer, or Removable Media such as a floppy or USB drive.
Example 1 : Quickly identify if the employee is printing out documents that they should not be printing.
Example 2 : Find out if the employee is sending confidential or proprietary information to a USB stick or other media by inspecting the contents of those files.
Event data contains emails captured from POP, SMTP, Web Mail, Outlook and other email programs
Example 1 : Identify those emails sent out with attachments and inspect the contents.
Example 2 : Determine if the employee opened up any SPAM email.
Example 3 : Determine if the employee is sending email to a competitor by inspecting the domain.
Event data contains file downloads and uploads. File Transfer includes Peer-to-Peer, FTP and HTTP methods of communication that allow direct exchange of information between two computers.
Example : Determine if the employee is transferring confidential or proprietary information to an external site without authorisation.
Event data contains key strokes captured from all keyboard activity.
Example : Look at hidden characters that are typically masked by many programs.
Event data contains which applications are connecting to the Internet, when the connections are made, the internet address they connected to, what TCP ports are being used, and the amount of network bandwidth consumed.
Example : Determine if the employee is consuming network bandwidth and reveal the source of the traffic.
Event data contains information regarding program usage.
Example 1 : Reveal the types of programs an employee is using and identify if any are nonwork-related such as computer games.
Example 2 : See which programs the employee is using and how much time they are spending in each.
Event data contains the date and time where users logged in or out of the system and the amount of activity they produced during this period.
Example 1 : Detect if the employee is arriving late or leaving early by monitoring the employee’s activity on the computer.
Example 2 : Reveal if the employee is taking long or frequent breaks.
Event data contains information for all URLs visited by the user.
Example : Investigate the web sites visited and quickly determine if they are work related.
Event data contains information on keyword alerts that have occurred.
Example : Find out what keyword alerts an employee generates as they use the computer; what they were doing to generate the alert, and how many times they caused it.
Event data contains information for all online searches.
Example : Find out what online searches the employee performed to see if they are looking for a job or searching for nonwork-related information (e.g.: “accounting jobs”, “vacations”).
Event data contains screen snapshots (taken as frequently as every 5 seconds) of user activity that can be reviewed through easy to use video-like controls.
Example : See exactly what the employee was doing on the Internet or computer through screen snapshots that reveal exactly what they saw, typed, clicked and more.