Omniquad Desktop Surveillace 98 http://www.omniquad.com 1) What is desktop surveillance? 2) What's new in this version 3) Disclaimer and Licensing 4) Frequently asked questions 1) Omniquad Desktop Surveillance - a versatile tool for peace of mind Omniquad Desktop Surveillance offers a unique approach to the problem of access control, prevention of, or investigation into, use/misuse of computer equipment and software. Instead of merely obstructing the user's actions, one of the oldest prevention methods known - the prospect of being watched and 'found out' - is applied. The program is the software equivalent of a surveillance camera and works by recording desktop activity. Yet it may operate in two modes; either by displaying warning signs in order to discourage misuse, or as secretly monitoring activity. While the application can store days of recordings, the settings can be tailored virtually for any situation. For example, recording can be activated at certain chosen times only, when running specified applications or on log-on to the Internet. This program is the only tool available to address not only the issues of web browsing but also newsgroups and IRC at the same time. The program recording can be activated as soon as you visit certain WWW sites or specific IRC channels. Desktop Surveillance can also be remotely controlled, either via local network or the Internet, and in both cases it is possible to remotely observe activity on the local desktop in real time. The program can be applied in a manifold of situations - for example to discourage employees in your office from visiting certain WWW sites, doing anything else they are not supposed to do, or maybe to secretly find out what your PC is being used for in your absence. 2) Version History 2.51c FTP records will be stored even if user-specifified folder does not exist updated FTP connection frequency new step-by-step quide to sample run, remote sureillance and administration 2.51b added summary reports for the database template added application breakdown to the keystroke capture facility 2.51 added facility to capture keystrokes added FAQ HTML document updated mechanism for detecting network disk space 2.5h added network slide support with customized change intervals added auto-save list for commonly monitored workstations added option for user-initiated recordings when user clicks on the System Tray icon changed the animated taskbar tray 'eye' icon to the (less intrusive) application icon updated socket connections mechanism for mutliple-connections the recording folders will be automatically recreated if deleted by user and recording will resume 2.5g added Activity Monitor, allowing for monitoring a large number of users from one desktop added Remote Activity Log option added automatic detection of inappropiate Internet content updated recording folder naming convention udpated sockets connections mechanism fixed problem with removing users on WindowNT workstation removed the need for comdlg32.ocx installed on the end system 2.5e added network deployment tools added option to totally hide from the task list added continous image stream option to the remote view section udpated forced shut-down procedure updated reserve disk space option for UNC pathnames updated application's help file 2.5d profile form now shows the user name as the window caption added remote surveillance permission option, where the user can reject surveillance request updated tips in odshid.txt - instructions on how to better disguise the software 2.5c (DB) Added support for database logging. Every subseqent version with (DB) suffix features database support. 2.5c updated the startup mode configuration fixed problem with login names containind dots and spaces 2.5b added Password feature to access the program's user interface added 'Save As' option to the playback control the 'Print' function in the playback control now works correctly upated the REFRESH calculation in the profile section. The new value deducts the reserved disk space correctlly fixed activity log enabling 2.5a (Desktop Surveillance 98 release) new user interface new user profile management E-mail recording forwarding FTP recording forwarding The program can now skip similar frames during recording new activity log - supports document tracking 2.2b fixed problem with trigger list not saving changes fixed problem with browsing fot new recording folder 2.2 added support for user profiles task-list termination option has been changed 2.16 updated trigger list updated remote monitor extra info on how to use advanced settings 2.15 improved compression engine allowing much longer recordings (real-time scaling down to 16col and B&W color mode) playback control can now be moved on the desktop fixed Windows NT playback problem 2.14 Added activity log monitor Updated the trigger list (it is no longer case-sensitive) Updated Remote Surveillance option (now shows a status bar) 3) Disclaimer and Licensing OMNIQUAD PRODUCTS END-USER LICENSE AGREEMENT OMNIQUAD DESKTOP SURVEILLANCE This Omniquad product end-user license is a legal agreement between the end-user, as an individual or as a single entity, and Omniquad Ltd. for the Omniquad software identified above. By installing, copying or otherwise using this software, the end-user agrees to be bound by the terms of this license. If the end-user do not agree to these terms, do not in any way install or use this software. Software Product License This software is protected by international copyright laws. The software is licensed not sold. The end-user may install and use the software on a number of computers identical (or smaller) in number than the number of user licenses purchased. A single license for the software product may not be shared on several computers. Limited Warranty The warranty for this software is 90 days from the date of receipt. Omniquad Ltd. warrants that the software will perform substantially for this period. Where applicable according to the state/jurisdiction, any implied warranties on this software are limited to 90 days. Omniquad Ltd.'s complete liability and the end-user's exclusive remedy shall be either repair or replacement or return of the price paid of the software that does not meet Omniquad's Limited Warranty. The faulty software must be returned to Omniquad Ltd. with a copy of receipt of purchase for the end-user's to be remedied. This Limited Warranty is void if the software failure has resulted from accident, abuse or misapplication. Any replacement software will have a warranty valid for the remainder of the original warranty period or 30 days, whichever is longer. Omniquad Ltd. disclaims all other warranties, to the maximum extent permitted by applicable law, either express or implied, including but not limited to implied warranties, of merchantability and fitness for a particular purpose, with respect to the software and the written accompanying material. This warranty gives the end-user special legal rights. The end-user may have others, which vary from state/jurisdiction to state/jurisdiction. To the maximum extent permitted by applicable law, in no event shall Omniquad Ltd. or any of its suppliers, distributors or OEM Integrators be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information/data, or other pecuniary loss) arising out of the use of or inability to use this software, even if Omniquad Ltd. or any of its suppliers, distributors or OEM Integrators have been advised of the possibility of such damages. In any case, Omniquad Ltd.'s complete liability under any provision of this agreement shall be limited to the amount actually paid by the end-user for the software. The above limitation may not apply to end-users in states/jurisdictions that do not allow the exclusion or limitation of liability for consequential or incidental damages. Storage/Network The end-user may store or install a copy of the software on a storage device, such as a network server, used only to install or run the software on other computers over an internal network; however, a license must be acquired and dedicated for each separate computer on which the software is installed or run from the storage device. Limitations on Reverse Engineering, Decompilation and Disassembly The end-user may not reverse engineer, decompile or disassemble this software. Re-selling, Rental The end-user may not (unless authorised by Omniquad Ltd.) re-sell, rent, lease or lend this software. The author, Omniquad Ltd., reserves any rights that are not stated in this document. 4) Frequently asked questions What is Omniquad Desktop Surveillance 98 (ODS) ? For the first time ever, you can monitor not only the usage of your network resources but actively monitor and assess all activities, giving you full and exact account of usage of your organization's IT resources. Desktop Surveillance redefines the concept of network monitoring (or stand-alone computer)by allowing you to take full advantage of a system similar to a real CCTV camera operating across your network, but without need for any hardware! Surveillance profiles can easily reflect your company's usage policy and be adapted for virtually any situation that can occur on your network - be it looking at confidential documents, working with the payroll, playing games, accessing illicit material, checking the lottery results, or anything else that you are concerned about (or in fact anything else that you don't know but now are able to find out). How does ODS work? ODS records users' activities in several ways: - visual recordings: ODS generates visual video-like records documenting the computer usage. The surveillance records can be inspected at leisure in a manner similar to watching a security videotape. This can be also compared to leaving an invisible video recorder pointed at the Windows desktop. - activity logs: time summary of all activities is logged, this includes all applications, games, documents, WWW sites, newsgroups and IRC channels and file folders accessed by the user. The activity log information can be stored in a standard text file and a database - the activity log can be stored in any ODBC data source MS Access sample database is also supplied. - keystroke capture: all keystrokes are captured to a standard text file for later assessment. Any combination of the the recording methods above can be utilized simultaneously, and a host of networking features: remote monitoring, remote surveillance control, E-mail and FTP support allow you to take maximum advantage of the system in networked environment Is there a different version for network or home computer? The same version is a universal product which will work equally well on a stand-alone computer or a large network. What visual indicators does ODS display to the user? ODS supports two modes of operations, which will reflect computer usage policy in your organization: in the Prevention Mode, ODS will display a startup warning and a visual indicator in the System Tray area. In Stealth mode, the user will not know that the system is active. How much recordings can ODS store? The exact requirements for system storage will depend different recording features utilized. Activity logs can take as little as 100 KB for 24 hours of computer usage, visual records will consume more disk space since graphical information is stored. ODS facilitates an option to calculate how much disk space will be used with sample surveillance settings. What if the computer remains idle while recording is enabled? 'Skip Similar Frames' option will instruct ODS to suspend recording when the computer is idle. This option greatly decreases the disk space requirements How are the records archived? The records are stored on local or network disk and are automatically archived in folders, sorted by user names and log-on times on different machines - this allows for easy information retrieval and backup What if some users are not supposed to be monitored? When the surveillance profile for any user is disabled, ODS will automatically unload itself from system memory. Can each user or group have unique surveillance settings? Each user or group of users can have a unique surveillance profile which will be activated when they log-on. In a networked environment, surveillance profiles will follow users to any computers they log-on. ODS supports unlimited number of users and groups. Can ODS differentiate between different activities taking place on Windows desktop? The trigger list functionality allows for the recording to be activated upon virtually any activity that can take place on Windows desktop - working with confidential documents, playing games, accessing illicit material, checking the lottery results or anything else that you are concerned about (or in fact anything else that you do not know but now are able to find out) Can ODS detect when adult content is accessed? Yes, ODS is capable of detecting when adult content is accessed. Depending from the surveillance profile of the user accessing such content, recording can be triggered or the network administrator can be notified. Does ODS use blocking lists for WWW access? ODS does not use any blocking lists: this is because when illicit material is accessed on the Internet, it does not not have to be on a web site. The keyword capture engine in ODS provides universal solution for any source of illicit material. The other benefit of this is that since there is no blocking lists, no information needs to be constantly updated. What network types are supported by ODS? The network user profiles and recording to network server will operate on any network platform that supports file sharing. Some network features (such as real-time monitoring or remote surveillance control) require TCP support. Can ODS be deployed over a large network? ODS includes network administrator kit and rapid network deployment tools, allowing for easy distribution across the enterprise. Can ODS be administred centrally? In a networked installation of ODS, the entire surveillance network can be managed from any node. How do I ensure that surveillance records are not discovered? In a networked environment, the records can be stored in a hidden network share ($). You can also enable E-mail or FTP forwarding to ensure that the records are no longer stored on accessible disk drives.Instructions in file ODSHIDE.TXT include additional information on how to hide records on a stand-alone computer. Can I monitor any desktop on the network (or the Internet ) in real time? Any computer running Desktop Surveillance can be monitored in real time (local network or the Internet). To close a possible security hole, the surveillance profile of the user logged on the remote computer at that time must permit for remote surveillance operations. Can I monitor a computer to which I have no physical access at all times? Yes, although you need to have a physical access/administrative privileges to install ODS on that computer in the first place. After this, visual surveillance records can be forwarded by e-mail. Can I control surveillance settings on other computers remotely? Recording can be remotely activated/deactivated on any computer running ODS. To close a possible security hole, the surveillance profile of the user logged on the remote computer at that time must permit for remote surveillance operations. How can I monitor a very large number of users simultaneously? ODS Activity Monitor allows for monitoring a large number of users at the same time Can I be notified when certain events occur on the network? Yes, when recording is triggered due to specified parameters, a message can be additionally displayed on the instance of Activity Monitor, running on the administrator's desktop How ODS can be used to monitor use of Laptop computers? In order to monitor Laptop usage, ODS can be activated on it at the time when it leaves the office and records retrieved when it is handled back. If there is a need to continuously monitor activity, the records can be forwarded by e-mail when the Laptop user logs on to the Internet or the company LAN. Does ODS require any server software? ODS does not require any server software (although workstations can store records on the network server for easy access and administration). Network surveillance operations can be performed in any network setup. Does ODS equal censorship? ODS does not censor nor block user actions What are the real-life applications for ODS? save jobs and money by defining and assessing the company usage policy, not limited to the Internet but extending to and addressing all issues related to IT revolution in the workplace performance assessment end any aspect of misuse of the company’s computer systems protect company’s information and trade secrets when companies’ security is compromised, in most of the cases the perpetrator is operating from inside combat company fraud - 84% of the worst fraud is committed by the company’s own employees (*source: Ernst &Young International Fraud Group, May 1998) criminal investigations document rapid changes made to company’s systems - many UK companies today rapidly adjust their systems as the Millennium approaches, but 4 of 5 surveyed did not consider opportunistic fraud possibility that arises as a result of multitude of changes made to the company’s IT systems monitor and document work done by external contractors set end to ‘flame’ e-mails and other undesired activities leading to legal actions comprehensive content monitoring without blocking lists ODS can be a valuable tool for systems support, as users can initiate visual recordings in order to aid troubleshooting