Securetower. Client Guide
Total Page:16
File Type:pdf, Size:1020Kb
SecureTower. Client Guide Table of Contents 1 Program............................................................................................................................5 overview 2 Getting............................................................................................................................6 started. Connecting to the server 3 Quick tips............................................................................................................................9 for results viewing 4 Search............................................................................................................................13 4.1 Advanced.........................................................................................................................13 search 4.1.1 Full-text search........................................................................................................ conditions 14 4.1.2 Search by data........................................................................................................ type 15 4.1.3 The number........................................................................................................ of shown results 16 4.1.4 General search........................................................................................................ restriction parameters 17 4.1.5 Search parameters........................................................................................................ for different data types 18 ..................................................................................................................................... 4.1.5.1 Mail search parameters 18 ..................................................................................................................................... 4.1.5.2 Messengers search parameters 19 ..................................................................................................................................... 4.1.5.3 Web search parameters 20 ..................................................................................................................................... 4.1.5.4 File search parameters 21 4.2 Quick .........................................................................................................................22serch 4.3 Simple.........................................................................................................................23 search 4.4 Complex.........................................................................................................................24 search 4.4.1 Creating a search........................................................................................................ request 24 4.4.2 Operating with........................................................................................................ search request 37 4.4.3 Favorites ........................................................................................................ 38 5 Viewing............................................................................................................................39 search results 5.1 Search.........................................................................................................................41 results list 5.1.1 Sorting a search........................................................................................................ results list 45 5.2 Viewing.........................................................................................................................46 various data type 5.2.1 Web-traffic ........................................................................................................data (HTTP) viewing 47 5.2.2 Viewing e-mails........................................................................................................ (POP3, IMAP, SMTP, MAPI) 50 5.2.3 Viewing complex........................................................................................................ data formats (attachments, archives, files) 53 5.2.4 Viewing printed........................................................................................................ files 55 2 [email protected] 5.2.5 Viewing conversations........................................................................................................ in IMs (OSCAR, Viber, Jabber, Skype, SIP, Lync) 57 5.2.6 Viewing files........................................................................................................ transferred in IMs (OSCAR, Jabber, Skype, SIP, Viber) 60 5.2.7 Viewing files........................................................................................................ transferred over FTP protocol 60 5.2.8 Viewing files........................................................................................................ copied to a storage device 61 5.2.9 Viewing user........................................................................................................ screenshots 61 5.2.10 Viewing endpoint........................................................................................................ activity statistics 66 5.2.11 Viewing clipboard........................................................................................................ content 71 5.2.12 Viewing files........................................................................................................ transferred to network shares 71 5.2.13 Viewing cloud........................................................................................................ storages files 71 5.2.14 Keylogger viewing........................................................................................................ 71 5.2.15 Viewing device........................................................................................................ audit data 73 5.2.16 Viewing recognized........................................................................................................ text 74 5.2.17 Viewing browser........................................................................................................ activity 76 5.2.18 Viewing results........................................................................................................ of workstation indexing 77 5.3 Identifying.........................................................................................................................77 senders and recipients in search results 6 Monitoring............................................................................................................................79 user network activity 6.1 User list.........................................................................................................................80 6.2 User cards.........................................................................................................................82 6.3 Viewing.........................................................................................................................84 user network activity report 6.3.1 Viewing daily........................................................................................................ network activity of a certain user 84 6.3.2 Viewing different........................................................................................................ types of intercepted data 86 6.3.3 Viewing user’s........................................................................................................ activity statistics 87 6.3.4 Viewing user........................................................................................................ relations with Graph-analyzer 89 7 Security............................................................................................................................96 Center Management 7.1 Configuring.........................................................................................................................97 security notifications delivery 7.2 Assigning.........................................................................................................................99 a security policy 7.2.1 Creating a group........................................................................................................ of security rules 99 7.2.2 Modifying a........................................................................................................ group of security rules 101 7.2.3 Deleting a ........................................................................................................group of security rules 101 7.2.4 Assigning a........................................................................................................ security rule 102 ..................................................................................................................................... 7.2.4.1 General security rule 103 ..................................................................................................................................... 7.2.4.2 Control by thesaurus 105 ..................................................................................................................................... 7.2.4.3 Statistical security rule 107 ..................................................................................................................................... 7.2.4.4 Search rule by digital fingerprints 109 7.2.5 Modifying a.......................................................................................................