[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

StatWin Server Enterprise

Product
Developers: SXR Software
Last Release Date: 2013/05/27
Technology: Cybersecurity - Authentication,  Information loss preventions,  the Time recording are cybersecurity

Content

StatWin Server Enterprise is the product intended for total control of the computers of employees united in network.

StatWin Server Enterprise 9.0

The developer company announced on May 27, 2013 a release of the new version of StatWin Server Enterprise 9.0 - monitor programs of activity and actions of the employee on the computer.

Unlike the previous version, in StatWin Server Enterprise 9.0 a number of innovations is implemented:

  • the scanning button providing scanning of range of the IP addresses and the domain for receiving a name list of computers is added
  • in the section "data from clients" are displayed the data sent by the client according to the schedule now.
  • the data obtained from the client manually when viewing the database are displayed.
  • the new intensity parameter will show, the user during certain time frames how actively worked.

The general

Employees it is observed by means of the StatWin-client (a part of the program installed on computers clients of controlled network). A client part of the program provides control in the form of collecting, storage and the analysis of statistics of work of users of the computer.

Provides control of everything that was entered by employees from the keyboard:

  • texts of the messages typed in messengers (IM)
  • texts of the letters typed in e-mail clients
  • texts of documents,
  • passwords,
  • logins and other information.

Control of cliques of a mouse is provided.

Information security - determination of powers of the employee by means of the instrument of administration of the rights. The program includes means of remote control StatWin-clients and databases.

Automatic collecting of the saved-up data on activity of users is conducted with computers clients, the centralized storage on the server.

Is suitable for use at the enterprises, at offices, educational institutions, game clubs.

Tools

For each group of data StatWin contains the Statistics and Reports tools. These tools allow to carry out the analysis of the collected information.

The Control of the Computer tool is intended for collecting and information storage about operation of the computer and users of the computer. The Control of the Computer tool provides different opportunities of setup of observation and control of activity of the user of the computer. For example, an opportunity to automatically create workplace screenshots with a certain interval.

The Viewing Processes tool allows to receive data on the processes executed by the operating system at the moment of time. Besides, there is an opportunity to complete process (or a specific window of process) which further accomplishment is undesirable.

The User administration tool is intended for creation of a certain reaction of the program to implementation by the user of the computer of certain actions. Thus the information security (providing the different rights to different users) is maintained.

The Remote Administration tool is intended for implementation of functions of remote administration of computers on which the Client is set.

The Remote Installation of Clients tool is intended for remote installation of Clients from a server computer on computers clients.

The Viewing Notifications tool from clients serves for display of messages about events and reaction to the events arriving on the server from clients.

Types of control

  • Control of start time of work on the computer, control of time of completion of work on the computer. User names, working on the computer are traced; the number of starts is monitored; the number of hangups of the computer is monitored. The general operating time is counted; average time; the average time of work at start, etc. An opportunity to browse statistics for a certain period (day, week, month, year) is given.

  • Control of processes (applications). The name of process (application) is traced; process window title; start time of work; time of completion of work; general employment duration of process; a user name, starting process.

  • Control of operation of the modem. The name of connection is traced; start time of connection; time of completion of connection; the general employment duration with the modem; the number of the bytes accepted via the modem; the number of the bytes transmitted via the modem; connection speed; a user name, working with the modem; operating time with phone.

  • Control of work about the Internet on servers. All Internet connections are monitored. The IP addresses of servers are traced; names of servers; port on which connection (http is set, to ftp, by pop, smtp...); start time of connection; time of completion of connection; the general operating time with the server; user name.

  • Control of work about the Internet on the websites. All visited websites are traced. The address (URL) of the website is traced; website name; start time of visit; time of completion of visit; general duration of visit; user name.

  • Control of operation of the printer. Operation of local and network printers is monitored. Names of the printed documents are traced; a user name, printing documents; when documents were printed (time); what is the time they were printed; how many pages they contained.

  • Control of activity of users at the computer. The intensity of work of the user with the keyboard and is traced by a mouse. If the user did not show activity during the set interval, then idle time of the computer is fixed. As a result the following statistical data form: general operating time; activity time; a downtime; activity percent; idle time percent; number of clicking of keys; number of clicks by a mouse.

  • Control of activity of users during the work with separate processes (applications). The intensity works of the user with separate processes (applications) is traced. It is traced in what process (application) what user entered information from the keyboard, pressed mouse buttons. The activity percent is traced; percent of idle time of work of the user with process (application).

  • Control of appeals of users to the computer from a local network. Start time of the address is traced; end time; general employment duration; a user name, addressing the computer from network; computer name from which there was an address; time of failure to act (idle) of the network user; a user name, during operation which there were appeals to the computer from network.

  • Control of the appeal of users to the resources (files, printers, folders) of the computer separated (shared) from a local network. Start time of the address is traced; end time; general employment duration; a user name, addressing a resource; a name of a resource which the user addressed; access rights to a resource which the user had; a user name, during operation which there were appeals to shared resources of the computer from network.

  • Control of appeals of users of the computer to resources of a local network. Start time of the address is traced; end time; general employment duration; a user name of the computer addressing a local network; a name of a network resource to which there was an address.

  • Control of the programs installed and deleted with the user. It is traced what program, what user, in what time was set or deleted.

  • Control of USB devices (flash drives, Bluetooth...). The name of the USB device is traced; time of connection of the device; time of shutdown of the device; a user name, working with the device.

  • Control of work with files. The name of the file is traced; way to the file; transaction over the file (removal, adding, change, renaming); time of file access; a user name, working with the file.

  • Control by means of removal of screenshots. The name of process (application) is traced; process window title; start time and ends of removal of a screenshot of work of the user; a user name, starting process.

  • Control of a clipboard. The name of process (application) is traced; process window title; start time and completion of work with a clipboard; a user name, working with a clipboard; clipboard contents.

  • Control of work of the user with the keyboard. It is traced what keys were clicked by what user, in what what window of process (application), in what time were clicked. All information typed from the keyboard is saved.

  • Control of work of the user with a mouse. It is traced what mouse buttons were clicked what user, in what what window of process (application) in what time were clicked. All clicking of all mouse buttons remains and counted.