inDefend Advanced Use Cases Windows
Updated for inDefend version 6.28
Browser Activity
• Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails etc.
• Monitor usage or time spent on different websites/URL like Social Networking sites, Jobs & Career, Shopping portals, personal emails.
• Blocking browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails etc.
• Blocking sensitive browser form submissions based on content
Web Blocking Web Logging
Application Network Activity
• Monitoring of applications and network activities i.e. download accelerators, Gaming applications, FTP, P2P applications etc.
• Selectively allow or block any kind of internet applications
• Bypass network applications
• Monitor usage or time spent on different applications like proxy & tunneling applications, download accelerators, torrents, Gaming
applications, FTP, P2P applications etc.
Application Monitoring Whitelisting Sandboxing
Email Activity
• Monitor all SMTP based emails that are sent through email clients like Outlook, Thunderbird, Outlook express, etc.
• Shadow logging of the entire content of the SMTP email along with attachments.
• Control all SMTP based emails that are sent through email clients like Outlook, Thunderbird, Outlook express, etc.
• Monitor all Gmail webmail activity along with complete shadow log of the outbound and draft emails.
• Control all the outbound Gmail webmail-based email activity.
• Control outbound OWA webmail-based file attachment activity.
Monitor SMTP Attachments Shadow Logging Gmail OWA
File Access Monitoring
• Monitor file access logs by file extension type i.e. doc., docx., pdf., jpg etc.
• File access monitoring report in csv format- agent wise & user wise
• Monitor file upload activity, file sharing activity & file transfer activity.
• Shadow logging of file access activity.
• capability to monitor any file transfer activity performed during RDP session
• Capability to add or modify list of applications for which file access activity needs to be monitored.
Shadow Logging Extension Specific Customize App Lists RDP
File Upload Activity
• Monitor file uploads to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo etc.
• Shadow log of files uploaded to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo etc.
• Control file uploads completely by limiting them on the basis of the file types or the destination where they are being uploaded etc.
• Control file transfer over Skype and Windows Live Messenger
• Track the destination server to which the files have been uploaded through browser.
Web Uploads Shadow Logging Extension Filtering Domain Filtering
Device Activity
• Control removable storage device media usage
• Access-based policies on each Registered USB device for different endpoints
• Set specific policies on CD/DVD access
• Blocking of MTP/Local and Network Printers
• Blocking Bluetooth activity
• Monitoring of all files being copied from computer to USB drive
• Shadow log of files transferred from endpoint to external USB storage device using enforced encryption.
• USB control and restriction based on file content
• Internal access restriction on USB storage devices
USB Printer Bluetooth Shadow Logging
Search Engine Activity
• Monitoring and logging of the web search engine activity
Content Filtering
• Content filter-based alerts for email based on defined sensitive keywords, phrases, patterns (visa card, Pan card,
contact numbers, etc.) and file type
• Content filter-based alerts for file upload based on defined sensitive keywords, phrases, patterns (visa card, Pan card,
contact numbers, etc.) and file type
• Content filter-based blocking for email and file upload based on defined sensitive keywords, phrases, patterns (visa
card, Pan card, contact numbers, etc.) and file type Filtering
Email Attachment File Upload Printer
Strong Analytics & Incident Reporting
• Graphical representation of activities via Ranking graphs and pie charts.
• Augmentation of analytics section to show incident counts
• Advanced Reporting and Analytics Framework for all kinds of device and network activities
• Graphical representation of productivity of the users.
• Analytics for top trending applications and websites being accessed in the organization
• Real-time incident alert notification on dashboard
• Near Real-time incident alert notification on Email
• Detailed incident forensics report
Graphs Productivity Trends Email Alert Forensic Report
Other Valued Added Features
• Periodic screenshot to monitor detailed employee activity.
• Print activity monitoring
• Event-triggered screenshot for sensitive application activity and sensitive window title-based activity.
• Audit Logs for admin activity
• User first and last activity monitoring
• Stealth mode to silently monitor activities
• Offline monitoring & Controlling of end user activities
• Temporary Policies for uplifting the user privileges for a defined duration
• Customized reports download as per admin requirement
• Password-protected uninstallation
• Tamper Proof
• Restrict dashboard access based on IP addresses
• Bulk installation on end user computers using Remote Deployment
• Easy extraction of analytics and logs via PDF Reports feature
• Admin activity Monitoring and Group Based Administration
• Central management of agent version upgrades via server dashboard
• Capability to detect sensitive content in images using OCR
• Data at rest scanning for files stored on endpoint will act as audit tool in identifying sensitive documents
Screenshots Print Monitor Login Activity Data at Rest scan Tamper-Proof Image Analysis
Used cases covered by API Integration
• API integration supported for productivity analytics
• API integration supported for incident reporting