User Activity Monitoring

Spector360.com >>> Product Overview >>> Analyze User Behavior

Analyze User Behavior

The focal point for employee monitoring and filtering in Spector 360 is the Dashboard, a powerful yet easy-to-use Windows-based application that can reside on one or more PCs on your network. Just like the dashboard of a sports car, the Spector 360 Dashboard provides you with literally dozens of controls and views that enable you to navigate and quickly access the information most important to you. With the Dashboard, you can centrally monitor all of the computers on your network from one location.

Over time, as event data is collected from employee computers and stored into the Spector 360 SQL Database, trends and patterns start to form that the Dashboard can display. You can analyze this information by using any of more than 50 built-in graphical charts and reports provided, or you can customize these views to suit your specific needs. You can change the view of time for all recorded events, enabling you to focus on the events recorded today, yesterday, last week, a specific month or over an entire year. You can also focus on the activities that occur during specific times of the day. You can focus on one employee, a department, or all of the employees in your entire company. You can also focus on specific computers or smartphones. For example, in an environment where many users are sharing computer resources such as in a school or library, the monitoring of specific computers may be advantageous.

Analyze User Behavior - Spector 360 Event Data Chart

When you observe the event data across one or more employees in your organization, you can quickly detect performance problems including inappropriate and unethical activity. Spector 360 excels at analyzing these activities and how they are affecting your company, allowing you to react accordingly.

With the Spector 360 security features, you can empower a front line manager to monitor those in his group while restricting his Dashboard view so he can analyze only the data collected for them and no one else.

The Dashboard offers the following tools for performing analysis of your recorded event data:

Quick View Tool
Access dozens of predefined charts and grids showing Top "N" and other comparative data from recorded user, program, file, email, chat, and network activity. Adjust the built-in charts and create your own.

Data Explorer Tool
Explore recorded events by activity. An "Explorer" style window lets you navigate across the activities of your employees with access to the associated event detail. You can export your findings for use in other Windows applications or print the information displayed on the screen.

Quick View Tool

The Quick View Tool enables you to search, filter, and consolidate recorded activities to produce charts and data tables describing trends and patterns of computer usage. With the Dashboard, you can visualize these trends, make comparisons at a glance, and at any time access the underlying details. The Dashboard presents the data collected from the computers residing in your network with productivity, security, compliance, and return on investment in mind. Spector 360 empowers you to monitor your employees with both a high degree of granularity and flexibility, across devices.

One of the most powerful features in the Quick View Tool is the ability to view predefined charts and data tables showing exactly how devices and the Internet are being used within your organization through "Top N" and other comparative data. Spector 360 provides literally dozens of these built-in intuitive graphical charts.

You can adjust the predefined charts to customize the environment for your specific needs or create entirely new charts. Click on any data element in a chart to display the details associated with that event.

From this perspective, you can quickly determine when suspicious activity is taking place and find out all of the details associated with the event on demand. At any time you can “drill down” and inspect the associated data with pinpoint accuracy. Focus on one or more employees suspected of inappropriate, illegal, or unapproved conduct or scope out the activities of an entire department or company.

At any time you can invoke the Spector 360 Screen Snapshot Viewer, with its video-like controls, to replay the screen snapshots associated with any computer-based event just as if you were standing over the shoulder of your employee with a camera when he typed on his keyboard. You can also generate professional looking usage reports suitable for management review. Alternately, you can access the various parameters associated with each event and filter and sort them based on the criteria that is most important to you.

Additionally, the Quick View Tool empowers you to generate reports on demand from any of the displayed charts or data tables.

By leveraging off of the many features of the Spector 360 Dashboard you can achieve all your employee monitoring objectives.

 

With the Spector 360 Dashboard you can perform a quick analysis of how your employees are using
Company devices by answering the following questions categorized by event type:

Chat & Instant Message Usage

  • What Chat services are being used most frequently?
  • Who are the Employees spending the most time chatting?
View Screen Snapshot

Web Site Usage

  • What are the Web Sites visited most frequently?
  • What are the Web Sites where Employees are spending the most time?
  • Who are the Employees visiting the most Web Sites?
  • Who are the Employees spending the most time on Web Sites?
  • Is the amount of time employees are spending on Web Sites increasing, or decreasing?
  • What Web Sites are blocked most frequently?
  • Which employees are trying to reach blocked Web Sites?
View Screen Snapshot

Email Usage

  • Who are the Employees sending and/or receiving the most email?
  • Who are the Employees sending the most email with attachments?
  • What are the Domains involved in the most sent and/or received email?
  • What email services are used most frequently?
  • What is the total email sent versus received?
View Screen Snapshot

Webmail Usage

  • Who are the Employees frequenting Webmail?
  • What are the Domains involved in the most Webmail?
  • Who are the Employees sending the most Webmail?
 

Keystrokes

  • Who are the Employees typing the most keystrokes?
  • What are the programs receiving the most keystrokes typed?
View Screen Snapshot

Application Usage

  • What are the Applications used most often to print documents?
  • What are the Applications launched most frequently?
  • What are the Applications Employees are spending the most time with?
  • Who are the Employees running the most applications?
  • Who are the Employees spending the most time within applications?
View Screen Snapshot

File Transfer Activity

  • Who are the Employees transferring the most files?
  • What are the total files uploaded vs. downloaded?
  • Who are the Employees downloading the most files?
  • What are the most popular file transfer protocols?
  • Who are the Employees uploading the most files?
View Screen Snapshot

Document Tracking

  • Who are the Employees transferring files to removable media?
  • What is the distribution of recorded document activity?
  • Who are the Employees printing the most documents?
View Screen Snapshot

User Activity

  • When is an Employee active and logged in indicating that they are working?
  • When are they taking breaks and how long do they last?
  • When do they come into work and when do they leave?
  • How long are they taking for lunch?
 

Network Activity

  • Who are the Employees consuming the most Internet bandwidth?
  • What are the Applications consuming the most Internet bandwidth?
  • What are the Domains using the most Internet bandwidth?
View Screen Snapshot

Keyword Alert Usage

  • What are the most frequently issued Keyword Alerts?
  • Who are the top Employees violating the Keyword Alert policy?
 

Online Search Usage

  • What do Employees search the most?
  • Where do Employees go for their online searches?
  • Who are the Employees searching the web most frequently?
 

Call Activity

  • Who is using the most cell minutes?
  • Who has been calling/receiving calls from a specific number?
 

 

Data Explorer Tool

The Data Explorer Tool is used to access the granular details of all recorded events categorized by activity. An "Explorer" style window lets you focus on the recorded events across a specific grouping of employees or computers.

With the Data Explorer Tool you can focus on specific elements pertaining to each activity. Refer to the Event Criteria Checklist for the complete list of focus options for the Data Explorer. The Data Explorer also allows you to export your findings for use in other Windows applications or you can print the information displayed on the screen. You can also access the associated screen snapshots surrounding the event on demand with the Spector 360 Screen Snapshot Viewer.

The events monitored by the Data Explorer Tool are as follows:

 


Data Explorer Overview

Activity/Event

Description

Examples of Use


Chat/IM

Event data contains Chat and Instant Messaging conversations captured from AOL, MSN, ICQ, and various other Chat/IM programs.

Display the event detail of the employees using unauthorized chat interfaces to communicate with outsiders.


Document Tracking

Event data contains files printed or copied to a CDROM drive, Network, Local Drive, Printer, or Removable Media such as a floppy or USB drive.

Display the event detail of the employees copying files to removable media.


Email

Event data contains emails captured from POP, SMTP, Web Mail, Outlook and other email programs

Display the event detail of the employees sending email to any one of a group of domains that represent the competition.


File Transfer

Event data contains file downloads and uploads. File Transfer includes Peer-to-Peer, FTP and HTTP methods of communication that allow direct exchange of information between two computers.

Display the event detail of the employees using unauthorized protocols to download files such as music and video.


Keystroke

Event data contains keystrokes captured from all keyboard activity.

Display the event detail of the employees who are the most productive represented by the amount of keystrokes they generate in a particular program.


Network

Event data contains keystrokes captured from all keyboard activity. Display the event detail of the employees who generate the most HTTPS network traffic used frequently for online purchases or personal banking.


Program

Event data contains information regarding program usage.

Display the event detail of the employees who spend the most time using specific applications (e.g.: PC video games).


User Activity

Event data contains the date and time where users logged in or out of the system and the amount of activity they produced during this period.

Reveal when they arrive and leave the office and detect frequent and lengthy breaks.


Web Sites

Event data contains information for all URLs visited by the user.

Display the event detail of the employees who are actively typing, dragging, scrolling, etc., when accessing a web site (known as Active time).


Keyword Alert

Event data contains information on keyword alerts that have occurred.

Display the event detail of the employees who generate the most keyword alerts when visiting web sites.


Online Searching

Event data contains information for all online searches.

Display the event detail of the employees conducting online searches using Google.