Spector Pro is a powerful tool for monitoring, recording, and reporting everything that’s taking place on a monitored Mac, providing detailed information, including time-lapse video of everything anyone might be doing on the computer where Spector Pro is installed. I was able to easily capture user IDs and passwords for secure sites using a combination of Spector Pro keylogging and screenshots, so, if you choose to use the application you want to make sure that you’re keeping the recorded data secure. Since the program literally captures everything taking place on a monitored computer it’s important to keep in mind that you may be putting secure information at risk. When installed this way Spector Pro will not record anything taking place on the Viewer Only computer but will allow you to view the data being recorded on any monitored computer.Īs with eBlaster, Spector Pro can raise several security issues. To do that you need to install Spector Pro in Viewer Only mode on another Mac. While Spector Pro is designed for you to review recorded activity while sitting at the monitored computer, it’s also possible for you to view these same reports remotely as long as you have network access to the monitored computer and a valid user account on the monitored computer. Second, Spector Pro makes it possible to customize what you’re tracking based upon which user is logged in at the computer, giving you fine-grained access to what’s being monitored. The information produced by the system could be invaluable in detecting computer misuse and security issues, but the detailed activity reports should also help to make more efficient use of resources.The application offers several useful customization tools, First, if there’s a website that someone’s visiting that you don’t want them to have access to anymore, Spector Pro offers you the option of blocking that site, although it will not block any page set as the user’s default Home Page. However, the system can go beyond simply providing static screenshots and offers a replay option as well, showing the exact sequence of events. A URL may be just a string of characters, but a screenshot is unambiguous. This last feature is available for all the recorded activities and eliminates any chance of misinterpreting an activity. The system can report a user’s activity down to the keystroke level, providing details of what apps were involved, and also supplying screenshots taken at the time the activity was logged. The system provides the evidence to distinguish between the two by providing a complete transaction list of everything a user did in a particular activity in a given time frame. Analysing the website activity could indicate which sites need to be blocked, but could also indicate a resource that employees find essential for their work, which could be replaced with an in-house product. These may be indicators of a productive employee, but they can just as easily show an employee who spends a lot of time watching online videos and chatting to mates.Īll this information can be put to a variety of uses. The Productivity display reveals which users visit which websites, who spends most time doing internet searches, who uses the most bandwidth, who sends the most email and which apps are used the most. All these activities are potential security risks. More useful from a security perspective is the Security Favourites display, showing which users have been most active in areas such as file transfers to removable media, file downloading, printing documents, sending email with attachments and using webmail. From here, the administrator can see user timesheets, application usage, website visits and keyboard activity in graphical form, showing a snapshot in a given time frame. The Dashboard display is where it all happens. Monitoring software must be installed on each system, which will then record all activity that takes place, feeding it back to the central server systems that store the data for later analysis and display. The software is easy to install and, although the system has a number of components that can be distributed across several systems, all the server and control software can be installed on one system.
0 Comments
Leave a Reply. |