SlideShare a Scribd company logo
Ekran System v. 5.0
Program Overview
Contents
• About the Program
• Ekran Server & Management
Tool
• Database Management
• Licensing
• Client Installation
• Monitoring Parameters
• Client Protection
• Advanced User Authentication
• Notifying Users about Being
Monitored
• User Blocking
• Viewing Sessions
• Alerts
• USB Monitoring
• Dashboards
• Interactive Monitoring
• Reports
Page 2 of 86
About the Program
Page 3 of 86
About the Program
Smart user activity video recording system.
Page 4 of 86
Privileged Identity
Management
•Ekran System allows to
create indexed video records
of all concurrent Windows,
Citrix, and Linux terminal
sessions on your servers and
record remote and local
sessions on workstations.
Employee Work
Control
•Are you interested in your
company's security?
•Do you want to know
what your employees do
during their working hours?
•Do you want to control
sensitive information use?
Cost Saver on the
Market
•Ekran System provides all
popular segment features
while offering much more
beneficial pricing than
ObserveIT or Citrix Smart
Auditor.
About the Program
Ekran System is an affordable user monitoring solution for enhanced
cyber security.
You can record all terminal, remote, and local user sessions and alert
security personnel to suspicious events.
Page 5 of 86
Ekran Management
Tool
GUI part used for
system management &
session viewing
Ekran Server
Main component used
for storing data
obtained from Client
computers
Ekran Clients
Windows/Linux/Citrix
Components installed on
the target computer to
monitor user activity and
send it to the Server
Ekran System Components
Ekran System Structure
Page 6 of 86
High Availability Mode (Enterprise Edition)
Page 7 of 86
The High Availability mode provides a high level of operational
performance and balances the load of sent data, minimizing
downtime and service interruptions.
Ekran Server & Management Tool
User management, permissions,
Management Tool settings
Page 8 of 86
Management Tool
You can manage the whole system via the Management Tool in your
browser.
Page 9 of 86
User Management & Permissions
• Create two types of users: Internal or Active Directory (Windows
domain users/groups).
• Use groups for easier user management.
• Define permissions for users.
Page 10 of 86
Management Tool Log
Page 11 of 86
Audit all user activities performed in the Management Tool via the
Management Tool Log with the detailed information on all changes.
Database Management
Page 12 of 86
Database Configuration
Page 13 of 86
Database Cleanup
Page 14 of 86
One-Time Cleanup Scheduled Cleanup
Database Archiving (Enterprise Edition)
Page 15 of 86
Archive and delete the old monitored data from the Database to not
run out of space on the Server computer and to save the monitored
data in a secure storage.
Database Archiving (Enterprise Edition)
Page 16 of 86
You can view the archived sessions from your archived database in
the Session Viewer and perform searches in them in a usual way at
any time.
SIEM Integration
Page 17 of 86
Ekran System integrates with your SIEM system using log files of the
monitored events.
Advanced SIEM Integration
Page 18 of 86
Create a CEF log file to get access to the Ekran System alert events
and monitored data via the integral ArcSight or Splunk interface.
Licensing
Types of Licenses & Serial Key
Management
Page 19 of 86
Licensing
Page 20 of 86
Ekran System is licensed by the number of Ekran Clients, end-points to be
monitored. All management components, including Server and Management
Tool, are provided for free with any deployment.
Types of Ekran Client licenses:
• Windows workstation license
• Windows server license
• Linux machine license
Serial Key & License Management
Page 21 of 86
Request a trial serial key for 30 days to deploy the system and review
its basic features with a restriction of 5 workstation licenses, 1 server
license, and 3 Linux licenses.
To work with Ekran System for a longer period, license it by activating
the serial keys on the computer with the installed Ekran Server. You
can use either permanent keys, or subscription keys.
Enterprise Key
Page 22 of 86
Activate Enterprise serial key to get exclusive access to a set of
additional, valuable features of Enterprise Edition Ekran System.
Client Installation
Page 23 of 86
Installing Ekran Clients
Page 24 of 86
Convenient Ekran Client installation:
• Local:
o Linux Clients (via tar.gz file)
o Windows Clients
 using installation file with default parameters
 using generated package with customized parameters
• Remote (for Windows Clients)
Remote Installation
Select computers to
install Clients on
Customize installation
parameters
The Clients are
successfully installed!
Target Computers for Remote Installation
Page 25 of 86
• Scan your local computer network
• Define a range of IP addresses to search the target computers
• Simply enter target computer names
Monitoring Parameters
Page 26 of 86
Client Monitoring
Page 27 of 86
The data the Client sends is stored in the form of deltas (differences
between a newer screen capture and an older one) to minimize
storage space.
Recorded information is saved in an easy-to-review and easy-to-
search form:
• The name of the launched application
• The title of the active window
• Entered URL
• Text entered via user’s keyboard (keystrokes)
• Commands executed in Linux (both from user input & by running
the scripts)
• The information on plugged-in USB devices
Screen Capturing
Page 28 of 86
Ekran Client screen capture creation is event-triggered by default.
You can configure the Client to capture active window only.
URL Monitoring
Page 29 of 86
Ekran Client monitors URLs entered in web browsers.
You can configure the Client to monitor full URLs or domains of top
and second level only.
Keystroke Logging
Page 30 of 86
Ekran Client captures all text entered through the user’s keyboard
and adjusts it for better comprehension.
Use a special Viewing keystrokes permission to limit user access to
this sensitive data.
Keyword-Triggered Monitoring
Page 31 of 86
You can configure Ekran Client to start monitoring and creating
screen captures only after detecting the defined keywords entered
by the user.
Application Filtering
Page 32 of 86
Ekran System allows you to define the filtering rules for
websites/applications to adjust the amount of monitored data and
exclude the areas where private information can be observed to
comply with corporate policy rules and country regulations related to
user privacy.
Privileged User Monitoring
Page 33 of 86
Monitor the activity of users logging in under privileged user
accounts.
Client Group Settings
Page 34 of 86
You can define the settings for a Client Group and then apply them to
the Client to save your time.
Client Protection
Page 35 of 86
Protected Mode
Page 36 of 86
Ekran System allows you to protect the Client and its data by
enabling the Protected Mode.
The usage of Protected Mode has the following advantages:
• Prevention of Client uninstallation.
• Prevention of stopping Client processes.
• Prevention of editing Client system files and logs.
• Prevention of editing Client settings in the registry of the Client
computer.
• Prevention of modification, removal, and renaming of Client files.
Client Uninstallation
Page 37 of 86
Users, including privileged ones, are unable to stop the Client
working on their machines, as well as remove the Client locally
without the Administrator assistance.
Only Ekran System Administrator knows the uninstallation key
defined prior to Client installation and necessary for local removal.
Advanced User Authentication
Page 38 of 86
Advanced User Authentication
Page 39 of 86
Advanced user authentication allows you to achieve two goals:
• Monitor users’ activity on the computer when multiple users use
the same credentials to log in.
• Improve your security by limiting the access to the specific users
who know secondary authentication credentials.
Advanced User Authentication
Page 40 of 86
The Ekran System Client requests entering credentials before
allowing a user to work with Windows Server.
One-Time Password
Page 41 of 86
Enterprise Edition Ekran System provides the administrator with a
unique ability to generate a one-time password for a user to login to
the Client computer with Windows Server OS.
One-Time Password
Page 42 of 86
The user can request a one-time password directly from the
secondary authentication window displayed on login to Windows
Server.
Notifying Users about
Being Monitored
Page 43 of 86
Notifying Users about Being Monitored
Page 44 of 86
To follow the security policy of your company or your country regulations,
you can:
• Enable displaying an additional message on user logging in to notify the
user that his or her work is being monitored.
• Display a Client tray icon with the notification about monitoring to the
user.
Notifying Users about Being Monitored
Page 45 of 86
• Require the users to enter the comments to the additional
message displayed on their login to the Client computers.
User Blocking
Page 46 of 86
User Blocking Overview
Page 47 of 86
Ekran System allows you to block users performing potentially
harmful and forbidden actions on computers with Windows Server
operating system with Ekran Clients installed on them.
Users can be blocked from both Live and Finished sessions.
User Blocking Overview
Page 48 of 86
The user desktop is blocked, and after the defined time interval the
user is forcedly logged out.
If the blocked user tries to log in to the Client computer, the system
does not allow him/her to do so.
Viewing Blocked User List
Page 49 of 86
The Blocked User List contains information on who, where, and when
was blocked.
To allow the users access to the Client Computer, remove them from
the list.
Viewing Sessions
Page 50 of 86
Searching Data in Session List
Page 51 of 86
Ekran Management Tool allows searching in the recorded sessions.
Search is performed by different parameters:
• For Windows Clients: active window title, application name, user
name, Client name, visited URL, entered keystrokes, user’s
comment to the additional message, USB device information.
• For Linux Clients: commands and command parameters.
Viewing Live Session
Page 52 of 86
Ekran System allows you to perform monitoring of user activity in
real time.
You can connect to a Live session and observe the activities a user is
performing at the given moment.
Magnifying Glass
Page 53 of 86
You can enlarge certain parts of the video in the Session Player by
using the Magnifying Glass.
Forensic Export
Page 54 of 86
With Ekran System Forensic Export, you can:
• Export a monitored session or its part to a securely encrypted file.
• Investigate the recorded user activity in the in-built offline
session viewer.
• Present evidence in forensic format to the third parties.
Alerts
Page 55 of 86
Setting Up Alerts
Page 56 of 86
Ekran System allows you to enable quick incident response using
alert notifications:
• Set up alerts about suspicious user activity on the Client
computers.
• Specify individuals to receive instant alert notifications via email
or in the Tray Notifications application.
Default Alerts
Page 57 of 86
Ekran System contains a set of default alerts prepared by the vendor
security experts. They will alarm you about data leakage, potentially
fraudulent, illicit, or work-unrelated activities.
Alerts in Session Player
Page 58 of 86
Monitored data associated with alert events is highlighted in
different colors in the Session Player according to alert risk level.
Alerts in Alert Viewer
Page 59 of 86
You can view detailed information on all alert events as well as
screen captures associated with them in a special viewer.
Receiving Alerts
Page 60 of 86
Receive alert notifications in real time, review them in the Ekran
System Tray Notifications journal, and open the session with the
alert-related data in the Session Player.
USB Monitoring
Page 61 of 86
USB Monitoring Overview
Page 62 of 86
Ekran System provides two types of monitoring USB devices plugged
into the Client computer:
• USB-based storage monitoring, to view information on the
devices detected by Windows as mass storage and receive alert
notifications.
• Kernel-level USB monitoring, for an in-depth analysis of plugged-
in devices and their blocking.
Setting Up Kernel-level USB Rules
Page 63 of 86
Ekran System can detect USB devices connected to a computer, alert you on
device plugging in, and block their usage (either all devices of a certain class
or all except the allowed devices) on a Client computer.
USB-Based Storage Monitoring
Page 64 of 86
USB-based storages are automatically detected on being plugged in.
Kernel-Level USB Monitoring
Page 65 of 86
Screen captures created on USB devices being plugged in or blocked
are highlighted in the Session Viewer.
Dashboards
Page 66 of 86
Dashboards Overview
Page 67 of 86
The dashboards offer a convenient real-time view of the most useful
data grouped in one place.
Customize the dashboards on the Management Tool Home page by
adjusting their look and settings.
Dashboard Types
Page 68 of 86
There are three main types of Ekran System dashboards:
• System State Dashboards
o Licenses
o Clients
o Database Storage Usage
• Monitoring Dashboards
o Recent Alerts
o Latest Live Sessions
• Threat Detection Dashboards
o Sessions out of Work Hours
o Rarely Used Computers
o Rarely Used Logins
System State Dashboards
Page 69 of 86
Clients Database Storage Usage
Licenses
Monitoring Dashboards
Page 70 of 86
Recent Alerts
Latest Live Sessions
Threat Detection Dashboards
Page 71 of 86
Rarely Used Computers Rarely Used Logins
Sessions out of Work Hours
Interactive Monitoring
Page 72 of 86
Interactive Monitoring Overview
Page 73 of 86
You can filter out data by three parameters:
• Who: filter by a specific user logged into the Client computer.
• Where: filter by a specific Client.
• When: filter by the time period.
Additionally, you can set the order of bars being displayed, using the
Applications and URLs filters.
Data is displayed in the form of two column charts (Application Monitoring
chart and URL Monitoring chart).
To see the list of application/website entries, click on the column with the
application/website name.
Application Monitoring Chart
Page 74 of 86
This chart provides information on the application usage frequency.
You can also use this chart to analyze information on the most rarely
used applications and detect any threats and suspicious activity on
investigated computers.
URL Monitoring Chart
Page 75 of 86
This chart provides information on the website visiting frequency.
You can also use this chart to analyze information on the most and
least visited websites and detect potentially harmful activity on
investigated computers.
Reports
Page 76 of 86
Reports & Statistics
Page 77 of 86
Ekran System Reports provide the full overview of the time spent in
applications and on websites visited on the user’s machine.
Generate a highly customizable report ad-hoc or schedule sending reports to
your email on a daily, weekly, or monthly basis.
The reported activity can include alerts, launched applications, visited web-
sites, plugged-in/blocked USB devices, and executed Linux commands.
Scheduled Reports
Reports & Statistics
Page 78 of 86
The reports can be generated manually at any time for any time period.
Manual Report Generation
Report Types
Page 79 of 86
Activity summary report Activity pie chart report
Activity chart report
Report Types
Page 80 of 86
User statistics report
Report Types
Page 81 of 86
Session grid report
Report Types
Page 82 of 86
Alert grid report
Keystroke grid report
Report Types
Page 83 of 86
URL pie chart reportURL summary report
URL chart report
Report Types
Page 84 of 86
USB storage grid report
Kernel-level USB storage grid report
Report Types
Page 85 of 86
In the Linux grid report, you can view all exec* and sudo commands
executed on Linux Client computers.
Linux grid report
Visit us online:
www.ekransystem.com
Page 86 of 86

More Related Content

PPTX
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
PPTX
Installation & Initial Configuration
PPTX
System Client Details
PPTX
Security
PPTX
The trusted computing architecture
PDF
3 windowssecurity
PPTX
Remote Management
PDF
State of Nevada gaming control board minimal internal control standards_mics_...
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Installation & Initial Configuration
System Client Details
Security
The trusted computing architecture
3 windowssecurity
Remote Management
State of Nevada gaming control board minimal internal control standards_mics_...

What's hot (11)

PDF
LogMeIn Rescue: Getting Started Guide
PPTX
Operating system security
PDF
Strengthen Password Security for IBM i With Multi-Factor Authentication
PPT
Radmin - efficient solution for business processes optimization
DOC
Attachment 3 measures for managing and applying for licenses
PDF
Owny IT Desktop Monitoring Featurelist
PPTX
SCEP 2012 inside SCCM 2012
PDF
Remote Monitoring & Management Administrator Guide - Comodo One
PDF
NIST Security Bulletin for October 2014
DOC
Windows xp blue screen of death stop codes
PDF
Merged document
LogMeIn Rescue: Getting Started Guide
Operating system security
Strengthen Password Security for IBM i With Multi-Factor Authentication
Radmin - efficient solution for business processes optimization
Attachment 3 measures for managing and applying for licenses
Owny IT Desktop Monitoring Featurelist
SCEP 2012 inside SCCM 2012
Remote Monitoring & Management Administrator Guide - Comodo One
NIST Security Bulletin for October 2014
Windows xp blue screen of death stop codes
Merged document
Ad

Viewers also liked (17)

PDF
Monitoring Server Temperature with Opsview
PPTX
Control your deployments with Capistrano
PPTX
Connecting Field Operations and the Corporate Office - FME Server as a Near R...
PDF
40166
PDF
D.BELL Certificates (3)
PPT
Jasper van der Lingen, Director, Sheppard & Rout Architects Ltd - presentatio...
PPTX
La meta cognición y regulación del aprendizaje
PPTX
Prezentacja studia II stopnia - ING UJ
PDF
Podstawy typografii dla internetu
PPTX
SeeTestAutomation - Mobile Test Automation Tool by Experitest
PDF
Doit apac-2010-1.0
PDF
Server Monitoring (Scaling while bootstrapped)
PPTX
Training Webinar: Detect Performance Bottlenecks of Applications
PPTX
Training Webinar: Effective Platform Server Monitoring
PDF
Oracle WebLogic Server: Remote Monitoring and Management
PPTX
Real time human health monitoring and alert automation system
Monitoring Server Temperature with Opsview
Control your deployments with Capistrano
Connecting Field Operations and the Corporate Office - FME Server as a Near R...
40166
D.BELL Certificates (3)
Jasper van der Lingen, Director, Sheppard & Rout Architects Ltd - presentatio...
La meta cognición y regulación del aprendizaje
Prezentacja studia II stopnia - ING UJ
Podstawy typografii dla internetu
SeeTestAutomation - Mobile Test Automation Tool by Experitest
Doit apac-2010-1.0
Server Monitoring (Scaling while bootstrapped)
Training Webinar: Detect Performance Bottlenecks of Applications
Training Webinar: Effective Platform Server Monitoring
Oracle WebLogic Server: Remote Monitoring and Management
Real time human health monitoring and alert automation system
Ad

Similar to Ekran system functions v. 5.0 (11)

PPTX
Ekran System - Employee Activity Monitoring Tool
DOCX
Manual user ful desktop
PPTX
Webhawk as-software
PPTX
Remote administration
PPTX
Lecture 12 monitoring the network
PDF
RES Software Online Seminar 10 mei 2011
PPTX
Kaseya Connect 2012 - THE ABC'S OF MONITORING
PDF
Power Admin Server Monitor™
PPTX
Ekran 4.1
PPT
Network Implementation and Support Lesson 10 Server Administration - Eric V...
PPT
Remote Login
Ekran System - Employee Activity Monitoring Tool
Manual user ful desktop
Webhawk as-software
Remote administration
Lecture 12 monitoring the network
RES Software Online Seminar 10 mei 2011
Kaseya Connect 2012 - THE ABC'S OF MONITORING
Power Admin Server Monitor™
Ekran 4.1
Network Implementation and Support Lesson 10 Server Administration - Eric V...
Remote Login

More from Ekran System Polska (6)

PDF
PREZENTACJA - Funkcje Ekran System
PPTX
Ekran System - prezentacja techniczna
PDF
Ekran system - prezentacja
PPTX
Ekran System 5.0 Nowe Funkcje (Release Notes)
PDF
Ekran System - Monitoring Aktywności Użytkowników - broszura
PPTX
Ekran System Polska 3.2
PREZENTACJA - Funkcje Ekran System
Ekran System - prezentacja techniczna
Ekran system - prezentacja
Ekran System 5.0 Nowe Funkcje (Release Notes)
Ekran System - Monitoring Aktywności Użytkowników - broszura
Ekran System Polska 3.2

Recently uploaded (20)

PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
top salesforce developer skills in 2025.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Cost to Outsource Software Development in 2025
PDF
Digital Systems & Binary Numbers (comprehensive )
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Introduction to Artificial Intelligence
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Nekopoi APK 2025 free lastest update
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
System and Network Administration Chapter 2
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
top salesforce developer skills in 2025.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Computer Software and OS of computer science of grade 11.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Cost to Outsource Software Development in 2025
Digital Systems & Binary Numbers (comprehensive )
Why Generative AI is the Future of Content, Code & Creativity?
Which alternative to Crystal Reports is best for small or large businesses.pdf
Reimagine Home Health with the Power of Agentic AI​
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms I-SECS-1021-03
Introduction to Artificial Intelligence
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Nekopoi APK 2025 free lastest update
Wondershare Filmora 15 Crack With Activation Key [2025
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Softaken Excel to vCard Converter Software.pdf
System and Network Administration Chapter 2
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises

Ekran system functions v. 5.0

  • 1. Ekran System v. 5.0 Program Overview
  • 2. Contents • About the Program • Ekran Server & Management Tool • Database Management • Licensing • Client Installation • Monitoring Parameters • Client Protection • Advanced User Authentication • Notifying Users about Being Monitored • User Blocking • Viewing Sessions • Alerts • USB Monitoring • Dashboards • Interactive Monitoring • Reports Page 2 of 86
  • 4. About the Program Smart user activity video recording system. Page 4 of 86 Privileged Identity Management •Ekran System allows to create indexed video records of all concurrent Windows, Citrix, and Linux terminal sessions on your servers and record remote and local sessions on workstations. Employee Work Control •Are you interested in your company's security? •Do you want to know what your employees do during their working hours? •Do you want to control sensitive information use? Cost Saver on the Market •Ekran System provides all popular segment features while offering much more beneficial pricing than ObserveIT or Citrix Smart Auditor.
  • 5. About the Program Ekran System is an affordable user monitoring solution for enhanced cyber security. You can record all terminal, remote, and local user sessions and alert security personnel to suspicious events. Page 5 of 86 Ekran Management Tool GUI part used for system management & session viewing Ekran Server Main component used for storing data obtained from Client computers Ekran Clients Windows/Linux/Citrix Components installed on the target computer to monitor user activity and send it to the Server Ekran System Components
  • 7. High Availability Mode (Enterprise Edition) Page 7 of 86 The High Availability mode provides a high level of operational performance and balances the load of sent data, minimizing downtime and service interruptions.
  • 8. Ekran Server & Management Tool User management, permissions, Management Tool settings Page 8 of 86
  • 9. Management Tool You can manage the whole system via the Management Tool in your browser. Page 9 of 86
  • 10. User Management & Permissions • Create two types of users: Internal or Active Directory (Windows domain users/groups). • Use groups for easier user management. • Define permissions for users. Page 10 of 86
  • 11. Management Tool Log Page 11 of 86 Audit all user activities performed in the Management Tool via the Management Tool Log with the detailed information on all changes.
  • 14. Database Cleanup Page 14 of 86 One-Time Cleanup Scheduled Cleanup
  • 15. Database Archiving (Enterprise Edition) Page 15 of 86 Archive and delete the old monitored data from the Database to not run out of space on the Server computer and to save the monitored data in a secure storage.
  • 16. Database Archiving (Enterprise Edition) Page 16 of 86 You can view the archived sessions from your archived database in the Session Viewer and perform searches in them in a usual way at any time.
  • 17. SIEM Integration Page 17 of 86 Ekran System integrates with your SIEM system using log files of the monitored events.
  • 18. Advanced SIEM Integration Page 18 of 86 Create a CEF log file to get access to the Ekran System alert events and monitored data via the integral ArcSight or Splunk interface.
  • 19. Licensing Types of Licenses & Serial Key Management Page 19 of 86
  • 20. Licensing Page 20 of 86 Ekran System is licensed by the number of Ekran Clients, end-points to be monitored. All management components, including Server and Management Tool, are provided for free with any deployment. Types of Ekran Client licenses: • Windows workstation license • Windows server license • Linux machine license
  • 21. Serial Key & License Management Page 21 of 86 Request a trial serial key for 30 days to deploy the system and review its basic features with a restriction of 5 workstation licenses, 1 server license, and 3 Linux licenses. To work with Ekran System for a longer period, license it by activating the serial keys on the computer with the installed Ekran Server. You can use either permanent keys, or subscription keys.
  • 22. Enterprise Key Page 22 of 86 Activate Enterprise serial key to get exclusive access to a set of additional, valuable features of Enterprise Edition Ekran System.
  • 24. Installing Ekran Clients Page 24 of 86 Convenient Ekran Client installation: • Local: o Linux Clients (via tar.gz file) o Windows Clients  using installation file with default parameters  using generated package with customized parameters • Remote (for Windows Clients) Remote Installation Select computers to install Clients on Customize installation parameters The Clients are successfully installed!
  • 25. Target Computers for Remote Installation Page 25 of 86 • Scan your local computer network • Define a range of IP addresses to search the target computers • Simply enter target computer names
  • 27. Client Monitoring Page 27 of 86 The data the Client sends is stored in the form of deltas (differences between a newer screen capture and an older one) to minimize storage space. Recorded information is saved in an easy-to-review and easy-to- search form: • The name of the launched application • The title of the active window • Entered URL • Text entered via user’s keyboard (keystrokes) • Commands executed in Linux (both from user input & by running the scripts) • The information on plugged-in USB devices
  • 28. Screen Capturing Page 28 of 86 Ekran Client screen capture creation is event-triggered by default. You can configure the Client to capture active window only.
  • 29. URL Monitoring Page 29 of 86 Ekran Client monitors URLs entered in web browsers. You can configure the Client to monitor full URLs or domains of top and second level only.
  • 30. Keystroke Logging Page 30 of 86 Ekran Client captures all text entered through the user’s keyboard and adjusts it for better comprehension. Use a special Viewing keystrokes permission to limit user access to this sensitive data.
  • 31. Keyword-Triggered Monitoring Page 31 of 86 You can configure Ekran Client to start monitoring and creating screen captures only after detecting the defined keywords entered by the user.
  • 32. Application Filtering Page 32 of 86 Ekran System allows you to define the filtering rules for websites/applications to adjust the amount of monitored data and exclude the areas where private information can be observed to comply with corporate policy rules and country regulations related to user privacy.
  • 33. Privileged User Monitoring Page 33 of 86 Monitor the activity of users logging in under privileged user accounts.
  • 34. Client Group Settings Page 34 of 86 You can define the settings for a Client Group and then apply them to the Client to save your time.
  • 36. Protected Mode Page 36 of 86 Ekran System allows you to protect the Client and its data by enabling the Protected Mode. The usage of Protected Mode has the following advantages: • Prevention of Client uninstallation. • Prevention of stopping Client processes. • Prevention of editing Client system files and logs. • Prevention of editing Client settings in the registry of the Client computer. • Prevention of modification, removal, and renaming of Client files.
  • 37. Client Uninstallation Page 37 of 86 Users, including privileged ones, are unable to stop the Client working on their machines, as well as remove the Client locally without the Administrator assistance. Only Ekran System Administrator knows the uninstallation key defined prior to Client installation and necessary for local removal.
  • 39. Advanced User Authentication Page 39 of 86 Advanced user authentication allows you to achieve two goals: • Monitor users’ activity on the computer when multiple users use the same credentials to log in. • Improve your security by limiting the access to the specific users who know secondary authentication credentials.
  • 40. Advanced User Authentication Page 40 of 86 The Ekran System Client requests entering credentials before allowing a user to work with Windows Server.
  • 41. One-Time Password Page 41 of 86 Enterprise Edition Ekran System provides the administrator with a unique ability to generate a one-time password for a user to login to the Client computer with Windows Server OS.
  • 42. One-Time Password Page 42 of 86 The user can request a one-time password directly from the secondary authentication window displayed on login to Windows Server.
  • 43. Notifying Users about Being Monitored Page 43 of 86
  • 44. Notifying Users about Being Monitored Page 44 of 86 To follow the security policy of your company or your country regulations, you can: • Enable displaying an additional message on user logging in to notify the user that his or her work is being monitored. • Display a Client tray icon with the notification about monitoring to the user.
  • 45. Notifying Users about Being Monitored Page 45 of 86 • Require the users to enter the comments to the additional message displayed on their login to the Client computers.
  • 47. User Blocking Overview Page 47 of 86 Ekran System allows you to block users performing potentially harmful and forbidden actions on computers with Windows Server operating system with Ekran Clients installed on them. Users can be blocked from both Live and Finished sessions.
  • 48. User Blocking Overview Page 48 of 86 The user desktop is blocked, and after the defined time interval the user is forcedly logged out. If the blocked user tries to log in to the Client computer, the system does not allow him/her to do so.
  • 49. Viewing Blocked User List Page 49 of 86 The Blocked User List contains information on who, where, and when was blocked. To allow the users access to the Client Computer, remove them from the list.
  • 51. Searching Data in Session List Page 51 of 86 Ekran Management Tool allows searching in the recorded sessions. Search is performed by different parameters: • For Windows Clients: active window title, application name, user name, Client name, visited URL, entered keystrokes, user’s comment to the additional message, USB device information. • For Linux Clients: commands and command parameters.
  • 52. Viewing Live Session Page 52 of 86 Ekran System allows you to perform monitoring of user activity in real time. You can connect to a Live session and observe the activities a user is performing at the given moment.
  • 53. Magnifying Glass Page 53 of 86 You can enlarge certain parts of the video in the Session Player by using the Magnifying Glass.
  • 54. Forensic Export Page 54 of 86 With Ekran System Forensic Export, you can: • Export a monitored session or its part to a securely encrypted file. • Investigate the recorded user activity in the in-built offline session viewer. • Present evidence in forensic format to the third parties.
  • 56. Setting Up Alerts Page 56 of 86 Ekran System allows you to enable quick incident response using alert notifications: • Set up alerts about suspicious user activity on the Client computers. • Specify individuals to receive instant alert notifications via email or in the Tray Notifications application.
  • 57. Default Alerts Page 57 of 86 Ekran System contains a set of default alerts prepared by the vendor security experts. They will alarm you about data leakage, potentially fraudulent, illicit, or work-unrelated activities.
  • 58. Alerts in Session Player Page 58 of 86 Monitored data associated with alert events is highlighted in different colors in the Session Player according to alert risk level.
  • 59. Alerts in Alert Viewer Page 59 of 86 You can view detailed information on all alert events as well as screen captures associated with them in a special viewer.
  • 60. Receiving Alerts Page 60 of 86 Receive alert notifications in real time, review them in the Ekran System Tray Notifications journal, and open the session with the alert-related data in the Session Player.
  • 62. USB Monitoring Overview Page 62 of 86 Ekran System provides two types of monitoring USB devices plugged into the Client computer: • USB-based storage monitoring, to view information on the devices detected by Windows as mass storage and receive alert notifications. • Kernel-level USB monitoring, for an in-depth analysis of plugged- in devices and their blocking.
  • 63. Setting Up Kernel-level USB Rules Page 63 of 86 Ekran System can detect USB devices connected to a computer, alert you on device plugging in, and block their usage (either all devices of a certain class or all except the allowed devices) on a Client computer.
  • 64. USB-Based Storage Monitoring Page 64 of 86 USB-based storages are automatically detected on being plugged in.
  • 65. Kernel-Level USB Monitoring Page 65 of 86 Screen captures created on USB devices being plugged in or blocked are highlighted in the Session Viewer.
  • 67. Dashboards Overview Page 67 of 86 The dashboards offer a convenient real-time view of the most useful data grouped in one place. Customize the dashboards on the Management Tool Home page by adjusting their look and settings.
  • 68. Dashboard Types Page 68 of 86 There are three main types of Ekran System dashboards: • System State Dashboards o Licenses o Clients o Database Storage Usage • Monitoring Dashboards o Recent Alerts o Latest Live Sessions • Threat Detection Dashboards o Sessions out of Work Hours o Rarely Used Computers o Rarely Used Logins
  • 69. System State Dashboards Page 69 of 86 Clients Database Storage Usage Licenses
  • 70. Monitoring Dashboards Page 70 of 86 Recent Alerts Latest Live Sessions
  • 71. Threat Detection Dashboards Page 71 of 86 Rarely Used Computers Rarely Used Logins Sessions out of Work Hours
  • 73. Interactive Monitoring Overview Page 73 of 86 You can filter out data by three parameters: • Who: filter by a specific user logged into the Client computer. • Where: filter by a specific Client. • When: filter by the time period. Additionally, you can set the order of bars being displayed, using the Applications and URLs filters. Data is displayed in the form of two column charts (Application Monitoring chart and URL Monitoring chart). To see the list of application/website entries, click on the column with the application/website name.
  • 74. Application Monitoring Chart Page 74 of 86 This chart provides information on the application usage frequency. You can also use this chart to analyze information on the most rarely used applications and detect any threats and suspicious activity on investigated computers.
  • 75. URL Monitoring Chart Page 75 of 86 This chart provides information on the website visiting frequency. You can also use this chart to analyze information on the most and least visited websites and detect potentially harmful activity on investigated computers.
  • 77. Reports & Statistics Page 77 of 86 Ekran System Reports provide the full overview of the time spent in applications and on websites visited on the user’s machine. Generate a highly customizable report ad-hoc or schedule sending reports to your email on a daily, weekly, or monthly basis. The reported activity can include alerts, launched applications, visited web- sites, plugged-in/blocked USB devices, and executed Linux commands. Scheduled Reports
  • 78. Reports & Statistics Page 78 of 86 The reports can be generated manually at any time for any time period. Manual Report Generation
  • 79. Report Types Page 79 of 86 Activity summary report Activity pie chart report Activity chart report
  • 80. Report Types Page 80 of 86 User statistics report
  • 81. Report Types Page 81 of 86 Session grid report
  • 82. Report Types Page 82 of 86 Alert grid report Keystroke grid report
  • 83. Report Types Page 83 of 86 URL pie chart reportURL summary report URL chart report
  • 84. Report Types Page 84 of 86 USB storage grid report Kernel-level USB storage grid report
  • 85. Report Types Page 85 of 86 In the Linux grid report, you can view all exec* and sudo commands executed on Linux Client computers. Linux grid report