home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World 2000 January
/
PCWorld_2000-01_cd.bin
/
Software
/
TemaCD
/
dsksurvi
/
ods_faq.ht_
/
ods_faq.ht
Wrap
Text File
|
1998-08-23
|
20KB
|
436 lines
<html>
<head>
<title>What is Omniquad Desktop Surveillance 98 </title>
<meta name="GENERATOR" content="Microsoft FrontPage 3.0">
</head>
<body>
<p><font face="Arial"><small>Omniquad Desktop Surveillance 98 - Frequently Asked Questions</small></font></p>
<p> </p>
<p><a href="#What is Omniquad Desktop Surveillance 98 (ODS) ?"><font face="Arial"><small>What
is Omniquad Desktop Surveillance 98 (ODS) ?</small></font></a></p>
<p><font face="Arial" SIZE="2"><a href="#What are the real-life applications for ODS?">What
are the real-life applications for ODS?</a></font></p>
<p><a href="#How does ODS work?"><font face="Arial"><small>How does ODS work?</small></font></a></p>
<p><a href="#Is there a different version for network or home computer?"><font
face="Arial"><small>Is there a different version for network or home computer?</small></font></a></p>
<p><a href="#What visual indicators does ODS display to the user?"><font face="Arial"><small>What
visual indicators does ODS display to the user?</small></font></a></p>
<p><a href="#How much recordings can ODS store?"><font face="Arial"><small>How much
recordings can ODS store?</small></font></a></p>
<p><a href="#What if the computer remains idle while recording is enabled?"><font
face="Arial"><small>What if the computer remains idle while recording is enabled?</small></font></a></p>
<p><a href="#How are the records archived?"><font face="Arial"><small>How are the records
archived?</small></font></a></p>
<p><a href="#What if some users are not supposed to be monitored?"><small><font
face="Arial">What if some users are not supposed to be monitored?</font></small></a></p>
<p><a href="#Can each user or group have unique surveillance settings?"><font face="Arial"
SIZE="2">Can each user or group have unique surveillance settings?</font></a></p>
<font SIZE="2">
<p><a
href="#Can ODS differentiate between different activities taking place on Windows desktop?"><font
face="Arial">Can ODS differentiate between different activities taking place on Windows
desktop?</font></a></p>
<p><a href="#Can ODS detect when adult content is accessed?"><font face="Arial">Can ODS
detect when adult content is accessed?</font></a></p>
<p><a href="#Does ODS use blocking lists for WWW access?"><font face="Arial">Does ODS use
blocking lists for WWW access?</font></a></p>
<p><a href="#What network types are supported by ODS?"><font face="Arial">What network
types are supported by ODS?</font></a></p>
<p><a href="#Can ODS be deployed over a large network?"><font face="Arial">Can ODS be
deployed over a large network?</font></a></p>
<p><a href="#Can ODS be administred centrally?"><font face="Arial">Can ODS be administered
centrally?</font></a></p>
<p><a href="#How do I ensure that surveillance records are not discovered?"><font
face="Arial">How do I ensure that surveillance records are not discovered?</font></a></p>
<p><a href="#Can I monitor any desktop on the network (or the Internet ) in real time?"><font
face="Arial">Can I monitor any desktop on the network (or the Internet ) in real time?</font></a></p>
<p><a href="#Can I monitor a computer to which I have no physical access at all times?"><font
face="Arial">Can I monitor a computer to which I have no physical access at all times?</font></a></p>
<p><a href="#Can I control surveillance settings on other computers remotely?"><font
face="Arial">Can I control surveillance settings on other computers remotely?</font></a></p>
<p><a href="#How can I monitor a very large number of users simultaneously?"><font
face="Arial">How can I monitor a very large number of users simultaneously?</font></a></p>
<p><a href="#Can I be notified when certain events occur on the network?"><font
face="Arial">Can I be notified when certain events occur on the network?</font></a></p>
<p><a href="#How ODS can be used to monitor use of Laptop computers?"><font face="Arial">How
ODS can be used to monitor use of Laptop computers?</font></a></p>
<p><a href="#Does ODS require any server software?"><font face="Arial">Does ODS
require any server software?</font></a></p>
<p><a href="#Does ODS equal censorship?"><font face="Arial">Does ODS equal censorship?</font></a></p>
</font>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p><a name="What is Omniquad Desktop Surveillance 98 (ODS) ?"><font face="Arial"><strong><small>What
is Omniquad Desktop Surveillance 98 (ODS) ?</small></strong></font></a></p>
<p><font face="Arial"><small>For the first time ever, you can monitor not only the usage
of your network resources but actively monitor and assess all activities, giving you full
and exact account of usage of your organization's IT resources.<br>
Desktop Surveillance redefines the concept of network monitoring (or stand-alone
computer)by allowing you to take full advantage of a system similar to a real CCTV camera
operating across your network, but without need for any hardware! Surveillance profiles
can easily reflect your company's usage policy and be adapted for virtually any situation
that can occur on your network - be it looking at confidential documents, working with the
payroll, playing games, accessing illicit material, checking the lottery results, or
anything else that you are concerned about (or in fact anything else that you don't know
but now are able to find out).<br>
</small></font></p>
<p> </p>
<p><a name="What are the real-life applications for ODS?"><font face="Arial"><strong><small>What
are the real-life applications for ODS?</small></strong></font></a>
<ul>
<li><font face="Arial" SIZE="2">save jobs and money by defining and assessing the company
usage policy, not limited to the Internet but extending to and addressing all issues
related to IT revolution in the workplace</font></li>
<li><font face="Arial"><font SIZE="2">performance </font><small>assessment and recording
computer usage</small></font></li>
<li><font face="Arial" SIZE="2">end any aspect of misuse of the companys computer
systems</font></li>
<li><font face="Arial" SIZE="2">protect companys information and trade secrets
when companies security is compromised, in most of the cases the perpetrator is
operating from inside</font></li>
<li><font face="Arial" SIZE="2">combat company fraud - 84% of the worst fraud is committed
by the companys own employees (*source: Ernst &Young International Fraud Group,
May 1998)</font></li>
<li><font face="Arial" SIZE="2">criminal investigations</font></li>
<li><font face="Arial" SIZE="2">document rapid changes made to companys systems - many
UK companies today rapidly adjust their systems as the Millennium approaches, but 4 of 5
surveyed did not consider opportunistic fraud possibility that arises as a result of
multitude of changes made to the companys IT systems</font></li>
<li><font face="Arial" SIZE="2">monitor and document work done by external contractors</font></li>
<li><font face="Arial" SIZE="2">set end to flame e-mails and other undesired
activities leading to legal actions</font></li>
<li><font face="Arial"><font SIZE="2">comprehensive content</font><font size="3"> </font><font
SIZE="2">monitoring without blocking lists</font></font></li>
<li><font face="Arial"><small>ODS can be a valuable tool for systems support, as users can
initiate visual recordings in order to aid troubleshooting</small></font></li>
</ul>
<p><font face="Arial"><strong><small> </small></strong></font></p>
<p><a name="How does ODS work?"><font face="Arial"><strong><small>How does ODS work?</small></strong></font></a></p>
<p><font face="Arial"><small>ODS records users' activities in several ways:</small></font></p>
<p><font face="Arial"><small>- visual recordings: ODS generates visual video-like records
documenting the computer usage. The surveillance records can be inspected at leisure
in a manner similar to watching a security videotape. This can be also compared to leaving
an invisible video recorder pointed at the Windows desktop.</small></font></p>
<p><font face="Arial"><small>- activity logs: time summary of all activities is logged,
this includes all applications, games, documents, WWW sites, newsgroups and IRC channels
and file folders accessed by the user. The activity log information can be
stored in a standard text file and a database - the activity log can be stored in any ODBC
data source MS Access sample database is also supplied. </small></font></p>
<p><font face="Arial"><small>- keystroke capture: all keystrokes are captured to a
standard text file for later assessment.</small></font></p>
<p><font face="Arial"><small>Any combination of the the recording methods above can be
utilized simultaneously, and a host of networking features: remote monitoring, remote
surveillance control, E-mail and FTP support allow you to take maximum advantage of the
system in networked environment</small></font></p>
<p> </p>
<p> </p>
<p><a name="Is there a different version for network or home computer?"><font
face="Arial"><strong><small>Is there a different version for network or home
computer?</small></strong></font></a></p>
<p><font face="Arial"><small>The same version is a universal product which will work
equally well on a stand-alone computer or a large network.</small></font></p>
<p> </p>
<p> </p>
<p><a name="What visual indicators does ODS display to the user?"><font face="Arial"><strong><small>What
visual indicators does ODS display to the user?</small></strong></font></a></p>
<p><font face="Arial"><small>ODS supports two modes of operations, which will reflect
computer usage policy in your organization: in the Prevention Mode, ODS will display a
startup warning and a visual indicator in the System Tray area. In Stealth mode, the
user will not know that the system is active.</small></font></p>
<p> </p>
<p><a name="How much recordings can ODS store?"><font face="Arial"><strong><small>How much
recordings can ODS store?</small></strong></font></a></p>
<p><font face="Arial"><small>The exact requirements for system storage will depend
different recording features utilized. Activity logs can take as little as 100 KB
for 24 hours of computer usage, visual records will consume more disk space since
graphical information is stored. ODS facilitates an option to calculate how much
disk space will be used with sample surveillance settings.</small></font></p>
<p> </p>
<p><a name="What if the computer remains idle while recording is enabled?"><font
face="Arial"><strong><small>What if the computer remains idle while recording is
enabled?</small></strong></font></a></p>
<p><font face="Arial"><small>'Skip Similar Frames' option will instruct ODS to suspend
recording when the computer is idle. This option greatly decreases the disk space
requirements</small></font></p>
<p> </p>
<p> </p>
<p><a name="How are the records archived?"><font face="Arial"><strong><small>How are the
records archived?</small></strong></font></a></p>
<p><font face="Arial"><small>The records are stored on local or network disk and are
automatically archived in folders, sorted by user names and log-on times on different
machines - this allows for easy information retrieval and backup</small></font></p>
<p> </p>
<p> </p>
<p><a name="What if some users are not supposed to be monitored?"><font face="Arial"><strong><small>What
if some users are not supposed to be monitored?</small></strong></font></a></p>
<p><font face="Arial"><small>When the surveillance profile for any user is disabled, ODS
will automatically unload itself from system memory.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can each user or group have unique surveillance settings?"><font face="Arial"><strong><small>Can
each user or group have unique surveillance settings?</small></strong></font></a></p>
<p><font face="Arial"><small>Each user or group of users can have a unique surveillance
profile which will be activated when they log-on. In a networked environment,
surveillance profiles will follow users to any computers they log-on. ODS supports
unlimited number of users and groups.</small></font></p>
<p> </p>
<p> </p>
<p><a
name="Can ODS differentiate between different activities taking place on Windows desktop?"><font
face="Arial"><strong><small>Can ODS differentiate between different activities taking
place on Windows desktop?</small></strong></font></a></p>
<p><font face="Arial"><small>The trigger list functionality allows for the recording to be
activated upon virtually any activity that can take place on Windows desktop - working
with confidential documents, playing games, accessing illicit material, checking the
lottery results or anything else that you are concerned about (or in fact anything else
that you do not know but now are able to find out)</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can ODS detect when adult content is accessed?"><font face="Arial"><strong><small>Can
ODS detect when adult content is accessed?</small></strong></font></a></p>
<p><font face="Arial"><small>Yes, ODS is capable of detecting when adult content is
accessed. Depending from the surveillance profile of the user accessing such
content, recording can be triggered or the network administrator can be notified.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Does ODS use blocking lists for WWW access?"><font face="Arial"><strong><small>Does
ODS use blocking lists for WWW access?</small></strong></font></a></p>
<p><font face="Arial"><small>ODS does not use any blocking lists: this is because when
illicit material is accessed on the Internet, it does not not have to be on a web
site. The keyword capture engine in ODS provides universal solution for any source
of illicit material. The other benefit of this is that since there is no blocking
lists, no information needs to be constantly updated.</small></font></p>
<p> </p>
<p> </p>
<p><a name="What network types are supported by ODS?"><font face="Arial"><strong><small>What
network types are supported by ODS?</small></strong></font></a></p>
<p><font face="Arial"><small>The network user profiles and recording to network server
will operate on any network platform that supports file sharing. Some network
features (such as real-time monitoring or remote surveillance control) require TCP
support.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can ODS be deployed over a large network?"><font face="Arial"><strong><small>Can
ODS be deployed over a large network?</small></strong></font></a></p>
<p><font face="Arial"><small>ODS includes network administrator kit and rapid network
deployment tools, allowing for easy distribution across the enterprise.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can ODS be administred centrally?"><font face="Arial"><strong><small>Can ODS
be administered centrally?</small></strong></font></a></p>
<p><font face="Arial"><small>In a networked installation of ODS, the entire surveillance
network can be managed from any node.</small></font></p>
<p> </p>
<p> </p>
<p><a name="How do I ensure that surveillance records are not discovered?"><font
face="Arial"><strong><small>How do I ensure that surveillance records are not discovered?</small></strong></font></a></p>
<p><font face="Arial"><small>In a networked environment, the records can be stored in a
hidden network share ($). You can also enable E-mail or FTP forwarding to ensure
that the records are no longer stored on accessible disk drives.Instructions in file
ODSHIDE.TXT include additional information on how to hide records on a stand-alone
computer.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can I monitor any desktop on the network (or the Internet ) in real time?"><font
face="Arial"><strong><small>Can I monitor any desktop on the network (or the Internet ) in
real time?</small></strong></font></a></p>
<p><font face="Arial"><small>Any computer running Desktop Surveillance can be monitored in
real time (local network or the Internet). To close a possible security hole, the
surveillance profile of the user logged on the remote computer at that time must permit
for remote surveillance operations.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can I monitor a computer to which I have no physical access at all times?"><font
face="Arial"><strong><small>Can I monitor a computer to which I have no physical access at
all times?</small></strong></font></a></p>
<p><font face="Arial"><small>Yes, although you need to have a physical
access/administrative privileges to install ODS on that computer in the first place.
After this, visual surveillance records can be forwarded by e-mail.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can I control surveillance settings on other computers remotely?"><font
face="Arial"><strong><small>Can I control surveillance settings on other computers
remotely?</small></strong></font></a></p>
<p><font face="Arial"><small>Recording can be remotely activated/deactivated on any
computer running ODS. To close a possible security hole, the surveillance profile of
the user logged on the remote computer at that time must permit for remote surveillance
operations.</small></font></p>
<p> </p>
<p> </p>
<p><a name="How can I monitor a very large number of users simultaneously?"><font
face="Arial"><strong><small>How can I monitor a very large number of users simultaneously?</small></strong></font></a></p>
<p><font face="Arial"><small>ODS Activity Monitor allows for monitoring a large
number of users at the same time</small></font></p>
<p> </p>
<p> </p>
<p><a name="Can I be notified when certain events occur on the network?"><font
face="Arial"><strong><small>Can I be notified when certain events occur on the network?</small></strong></font></a></p>
<p><font face="Arial"><small>Yes, when recording is triggered due to specified parameters,
a message can be additionally displayed on the instance of Activity Monitor, running on
the administrator's desktop</small></font></p>
<p> </p>
<p><a name="How ODS can be used to monitor use of Laptop computers?"><font face="Arial"><strong><small>How
ODS can be used to monitor use of Laptop computers?</small></strong></font></a></p>
<p><font face="Arial"><small>In order to monitor Laptop usage, ODS can be activated on it
at the time when it leaves the office and records retrieved when it is handled back.
If there is a need to continuously monitor activity, the records can be forwarded by
e-mail when the Laptop user logs on to the Internet or the company LAN.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Does ODS require any server software?"><font face="Arial"><strong><small>Does
ODS require any server software?</small></strong></font></a></p>
<p><font face="Arial"><small>ODS does not require any server software (although
workstations can store records on the network server for easy access and administration).
Network surveillance operations can be performed in any network setup.</small></font></p>
<p> </p>
<p> </p>
<p><a name="Does ODS equal censorship?"><font face="Arial"><strong><small>Does ODS equal
censorship?</small></strong></font></a></p>
<p><font face="Arial"><small>ODS does not censor nor block user actions</small></font></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
</body>
</html>