Configuration of the eAuditor on-premise system

Basic functionalities

IT inventory

  • Computers and laptops
  • Servers
  • Hyper-V, VMWare, Proxmox virtual environments (APIs)
  • Users
  • Devices – networked, hard drives, USB, imported.
  • Operating systems
  • Software and licenses
  • Files and multimedia
  • Finance
  • Consumables (IT Warehouse)
  • Documents, attachments, minutes
  • Notes, services, maintenance contracts
  • Dashboard, My Dashboard
  • Barcodes
  • CMDB
  • Data importer

Remote management

  • Computer Management (RDP,
  • VNC, Intel vPro)
  • Firewall management
  • Access to the editor of registers/services/system processes
  • Task server integrated with AI (CMD and PowerShell).
  • Software installation/uninstallation (msi, exe)
  • Message server (quick message, alert)
  • Report Builder (Stimulsoft)
  • Open API (based on restAPI)
  • Automation server
  • Configuring the eAgent service

Monitoring

  • Computers
  • Users (WorkTime Manager)
  • Network (network scanner, network maps, Network Dashboard)
  • Network printers (SNMP)
  • ACL permissions (local, shared)
  • Connected devices (USB)
  • Outgoing mail (Outlook desktop API)
  • Sessions (RDP, VNC, Intel AMT)
  • Websites
  • Processes
  • Network transfer
  • Performance
  • Services
  • Event logs
  • Sensors
  • Websites
  • Hosts and virtualization machines Hyper-V, VMWare, Proxmox (API)
  • Working Time – monitoring working time

Security

  • Vulnerability scanner (CVE/EUVDID).
  • Firewall
  • ACL permissions (local, shared)
  • Security Dashboard
  • Splash Screen – message that pops up after logging in
  • Security Dashboard
  • eLearning
  • Employee panel (basic version)
  • Artificial intelligence (classifier of websites, processes, applications
  • Reports
  • Administrative notifications
  • Control of administrative powers
  • Logs

Optional functionalities

Patch management

  • Identification of uninstalled patches
  • Central implementation of amendments
  • Withdrawing amendments
  • Installation automation
  • Reporting

Remote Installation / Application Kiosk

  • Remote installation using WMI
  • Remote installation using eAgent
  • Remote installation via kiosk
  • Autoinstallation
  • Public repository
  • Private repository

RTC

  • Real-time communication
  • Remote connection to other computers on the local network and behind NAT
  • Access to the actual monitor image
  • Management of computer resources

Bitlocker encryption

  • Integration with Microsoft BitLocker API
  • Disk encryption
  • Flash drive encryption
  • Access to encryption keys
  • Temporary shutdowns of the annexes
  • Encryption rules

Helpdesk

  • Application form (from the employee panel)
  • Records of notifications
  • Handling requests
  • Application history
  • Categories, subcategories of applications
  • Application statuses
  • Prioritization of applications
  • Notifications
  • Support groups

LMS Training

  • Film library
  • Video diagrams
  • Verification of the training process
  • Verification surveys
  • Certificates

DLP optional functionalities

Control and protection of equipment (KU)

DEVICE
Block access to selected types of devices from the hardware side.

REMOVABLE DEVICE
Block access to devices. USB

WEB
WEB channel management.

WLAN
Wireless access management.

WORKING TIME
Notification of exceeding the defined working time.

COMPUTER LOCK
Remote disconnection of the disk drive station.

Data Protection in Use (DU)

PROCESS
Monitor and block running processes.

CLIPBOARD
Monitor and lock clipboard, lock copy.

PRINT SCREEN
Monitor and block the taking of screenshots.

SCREEN MONITORING
Capture screenshots of users’ computers.

Data protection on the move (DR)

E-MAIL
Monitor and block messages sent via e-mail (desktop).

CLOUD STORAGE
Monitor and block data transfers to cloud applications (20 supported types).

FILE MOVE COPY
Monitor and block file operations: create, copy*, open, delete, rename.

*Functionality only includes monitoring of file copy operation. Blocking this operation is not available.

Document Classification (KD)

FINGERPRINT
Document classifier. Allows you to mark documents with an invisible marker.

SCHEDULED TAGGING
Schedule scanning and tagging of documents located in shared repositories (documents at rest).

Additional actions under DLP policies (performed upon violation):

  • Recording of violations (event logs)
  • User notification (pop-up)
  • Administrator notification (e-mail)
  • Executing a system command (CMD / PowerShell)
  • Taking a screenshot
  • User screen monitoring (retention up to 30 days)
  • Screen recording (BETA feature)

Available actions depend on the selected DLP policy – the range of functionality may vary depending on the type of policy.