User Activity Monitoring

Spector360.com >>> Product Overview >>> Investigate Abuse

Investigate Abuse

With the Spector 360 Dashboard you can perform an investigation of any employee suspected of inappropriate or unethical behavior with the User Explorer Tool. This tool is also perfect for performing spot investigations of anyone in your company.

The User Explorer empowers you to inspect the computer and Internet event data tied to an individual employee, one employee at a time:


User Explorer – a Spector 360 “Investigation” Tool

The User Explorer Tool (contained within the Dashboard) is ideal for conducting investigations by displaying the event data associated with individual employees. An "Explorer" style window lets you navigate within the recorded events of any employee. You can export your findings for use in other Windows applications or print the information displayed on the screen.

The User Explorer Tool empowers you to navigate events at a high level and then load those events of interest so you can “drill down” and view the associated details. Both a summary and detail view is provided. At any time you can view the actual screen images associated with those events using Spector 360’s Screen Snapshot Viewer with its video-like controls. Documenting infractions for corrective action is a simple process and can be performed with the click of a mouse.

With the User Explorer Tool you can focus on specific elements pertaining to each activity to narrow your investigation. Refer to the Event Criteria Checklist for the complete list of focus options for the User Explorer.

The following activities can be analyzed on an individual basis with the User Explorer Tool:




Next Steps
Free Download
Test Drive 360
What is Spector 360?
Components/Architecture
Record Pc & Internet Activity
Secure Archiving
Analyze User Behavior
Investigate Abuse
Search Recorded Activity
Web Filtering
Advanced Reporting
Manage With Ease
System Requirements
Benefits
Solutions
FAQ
Resources
Data Sheets
Online Demos
White Papers
Success Stories
Awards/PressMentions
ROI Calculator
Have A Question? Call Us Anytime: 1.888.598.2788 or 1.772.770.5670


User Explorer Overview

View Screen Snapshot
Activity/Event Description Examples of Use


Chat/IM

Event data contains Chat and Instant Messaging conversations captured from AOL, MSN, ICQ, and various other Chat/IM programs.

View individual Chat sessions and see who the employee was chatting with and exactly what was sent and received in each session.


Document Tracking

Event data contains files printed or copied to a CDROM drive, Network, Local Drive, Printer, or Removable Media such as a floppy or USB drive.

Quickly identify if the employee is printing out documents that they should not be printing.

Find out if the employee is sending confidential or proprietary information to a USB stick or other media by inspecting the contents of those files.


Email

Event data contains emails captured from POP, SMTP, Web Mail, Outlook and other email programs.

Identify those emails sent out with attachments and inspect the contents.

Determine if the employee opened up any SPAM email.

Determine if the employee is sending email to a competitor by inspecting the domain.


File Transfer

Event data contains file downloads and uploads. File Transfer includes Peer-to-Peer, FTP and HTTP methods of communication that allow direct exchange of information between two computers.

Determine if the employee is transferring confidential or proprietary information to an external site without authorization.


Keystroke

Event data contains key strokes captured from all keyboard activity.

Look at hidden characters that are typically masked by many programs.


Network

Event data contains which applications are connecting to the Internet, when the connections are made, the internet address they connected to, what TCP ports are being used, and the amount of network bandwidth consumed. Determine if the employee is consuming network bandwidth and reveal the source of the traffic.


Program

Event data contains information regarding program usage.

Reveal the types of programs an employee is using and identify if any are nonwork-related such as computer games.

See which programs the employee is using and how much time they are spending in each.


User Activity

Event data contains the date and time where users logged in or out of the system and the amount of activity they produced during this period.

Detect if the employee is arriving late or leaving early by monitoring the employee’s activity on the computer.

Reveal if the employee is taking long or frequent breaks.


Web Sites

Event data contains information for all URLs visited by the user.

Investigate the web sites visited and quickly determine if they are work related.


Keyword Alert

Event data contains information on keyword alerts that have occurred.

Find out what keyword alerts an employee generates as they use the computer; what they were doing to generate the alert, and how many times they caused it.


Online Searching

Event data contains information for all online searches.

Find out what online searches the employee performed to see if they are looking for a job or searching for nonwork-related information (e.g.: “accounting jobs”,  “vacations”).


Screen Snapshots

Event data contains screen snapshots (taken as frequently as every 5 seconds) of user activity that can be reviewed through easy to use video-like controls.

See exactly what the employee was doing on the Internet or computer through screen snapshots that reveal exactly what they saw, typed, clicked and more.