Securetower. Client Guide

Securetower. Client Guide

SecureTower. Client Guide Table of Contents 1 Program............................................................................................................................5 overview 2 Getting............................................................................................................................6 started. Connecting to the server 3 Quick tips............................................................................................................................9 for results viewing 4 Search............................................................................................................................13 4.1 Advanced.........................................................................................................................13 search 4.1.1 Full-text search........................................................................................................ conditions 14 4.1.2 Search by data........................................................................................................ type 15 4.1.3 The number........................................................................................................ of shown results 16 4.1.4 General search........................................................................................................ restriction parameters 17 4.1.5 Search parameters........................................................................................................ for different data types 18 ..................................................................................................................................... 4.1.5.1 Mail search parameters 18 ..................................................................................................................................... 4.1.5.2 Messengers search parameters 19 ..................................................................................................................................... 4.1.5.3 Web search parameters 20 ..................................................................................................................................... 4.1.5.4 File search parameters 21 4.2 Quick .........................................................................................................................22serch 4.3 Simple.........................................................................................................................23 search 4.4 Complex.........................................................................................................................24 search 4.4.1 Creating a search........................................................................................................ request 24 4.4.2 Operating with........................................................................................................ search request 37 4.4.3 Favorites ........................................................................................................ 38 5 Viewing............................................................................................................................39 search results 5.1 Search.........................................................................................................................41 results list 5.1.1 Sorting a search........................................................................................................ results list 45 5.2 Viewing.........................................................................................................................46 various data type 5.2.1 Web-traffic ........................................................................................................data (HTTP) viewing 47 5.2.2 Viewing e-mails........................................................................................................ (POP3, IMAP, SMTP, MAPI) 50 5.2.3 Viewing complex........................................................................................................ data formats (attachments, archives, files) 53 5.2.4 Viewing printed........................................................................................................ files 55 2 [email protected] 5.2.5 Viewing conversations........................................................................................................ in IMs (OSCAR, Viber, Jabber, Skype, SIP, Lync) 57 5.2.6 Viewing files........................................................................................................ transferred in IMs (OSCAR, Jabber, Skype, SIP, Viber) 60 5.2.7 Viewing files........................................................................................................ transferred over FTP protocol 60 5.2.8 Viewing files........................................................................................................ copied to a storage device 61 5.2.9 Viewing user........................................................................................................ screenshots 61 5.2.10 Viewing endpoint........................................................................................................ activity statistics 66 5.2.11 Viewing clipboard........................................................................................................ content 71 5.2.12 Viewing files........................................................................................................ transferred to network shares 71 5.2.13 Viewing cloud........................................................................................................ storages files 71 5.2.14 Keylogger viewing........................................................................................................ 71 5.2.15 Viewing device........................................................................................................ audit data 73 5.2.16 Viewing recognized........................................................................................................ text 74 5.2.17 Viewing browser........................................................................................................ activity 76 5.2.18 Viewing results........................................................................................................ of workstation indexing 77 5.3 Identifying.........................................................................................................................77 senders and recipients in search results 6 Monitoring............................................................................................................................79 user network activity 6.1 User list.........................................................................................................................80 6.2 User cards.........................................................................................................................82 6.3 Viewing.........................................................................................................................84 user network activity report 6.3.1 Viewing daily........................................................................................................ network activity of a certain user 84 6.3.2 Viewing different........................................................................................................ types of intercepted data 86 6.3.3 Viewing user’s........................................................................................................ activity statistics 87 6.3.4 Viewing user........................................................................................................ relations with Graph-analyzer 89 7 Security............................................................................................................................96 Center Management 7.1 Configuring.........................................................................................................................97 security notifications delivery 7.2 Assigning.........................................................................................................................99 a security policy 7.2.1 Creating a group........................................................................................................ of security rules 99 7.2.2 Modifying a........................................................................................................ group of security rules 101 7.2.3 Deleting a ........................................................................................................group of security rules 101 7.2.4 Assigning a........................................................................................................ security rule 102 ..................................................................................................................................... 7.2.4.1 General security rule 103 ..................................................................................................................................... 7.2.4.2 Control by thesaurus 105 ..................................................................................................................................... 7.2.4.3 Statistical security rule 107 ..................................................................................................................................... 7.2.4.4 Search rule by digital fingerprints 109 7.2.5 Modifying a.......................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    163 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us