Click on the module name to view detailed features
Feature Module | Professional | Ultimate | Enterprise | |
---|---|---|---|---|
Collects computer info and restricts system configuration changes.
Records client power, login/logout, and dial-up events.
Logs policy actions including blocks, alerts, and system locks.
Remotely lock, shutdown, restart, log off, and notify clients.
Sets local permissions and supports IP/MAC binding.
Checks antivirus, software, programs, services, patches, screen protection.
Associates user identity with computers for login tracking.
Sends alerts on hardware, software, or network changes.
Displays file, storage, web, messaging, and client activity dashboards.
|
||||
Records all document operations on local, removable, network, and shared drives.
Controls read, modify, and delete permissions for specified documents on disks or network paths.
Logs CD/DVD burning info including computer, user, disc name, file size, source files, copies, and burner details.
Records file transfers via external devices connected in ADB mode.
Backs up documents automatically if content is modified or deleted.
Captures screen snapshots during risky file deletion or copying to removable storage.
Restricts copying documents to network drives, allowing exceptions via request or self-registration.
|
||||
Records all print operations with time, terminal, user, app, pages, printer type, and name; searchable by time, file, or computer.
Captures full print images on all printer types to view original document content.
Controls terminal and application print permissions, restricting access to specific printers or apps.
Customizes print watermarks (text, image, QR, dot-matrix) showing computer name, username, IP, and print time.
Allows temporary print permission requests or watermark removal, or self-registration to authorize printing.
|
||||
Controls usage permissions for various client devices, including storage, communication, USB, network, audio, and virtual drives, and blocks any newly added devices.
Manages mobile and portable device access, including USB drives and phone assistants, with file transfer control.
Prohibits external devices from connecting via ADB mode.
Restricts use of unauthorized burning tools, allowing only dedicated burners; temporary permissions via request or self-registration.
Users under device policy can temporarily enable specific devices via request or self-registration.
|
||||
Automatically collects mobile storage info and logs all document operations.
Registers USB drives for internal network use; unregistered drives are blocked.
Controls read/write permissions and usage scope of mobile storage devices.
Converts regular USB drives into encrypted drives, usable only on internal clients.
Automatically encrypts/decrypts documents on authorized mobile storage; unauthorized access blocked.
Allows users to request mobile storage access or self-register to use devices.
|
||||
Encrypts documents with strong transparent encryption, allowing access only in trusted environments.
Prevents stealing of encrypted content via clipboard, screenshots, or virtual printing.
Supports mandatory encryption, smart encryption, and read-only encryption for different document types.
Assigns documents to security zones and levels, enabling departmental and role-based confidentiality.
Allows user-defined access permissions based on document sensitivity, including read, modify, copy, print, screenshot, and expiry.
Supports secure external sharing via decryption requests, whitelist, or email, with auto re-encryption after a set time.
Grants offline permissions for users outside trusted environments, with configurable software and document rights.
Approval workflow supports single, multi-level, and countersign approvals via console, web, mobile apps with delegation and batch approval.
Mobile devices can receive approval notifications, preview encrypted files, and perform encryption/decryption directly.
Offline USB keys allow secure encryption and temporary elevation of decryption or external sharing rights.
USB encryption client enables access to encrypted files only when inserted; removal blocks access.
Backup servers ensure continuous operation and full plaintext backup of all encrypted documents.
|
||||
Records IM conversations including time, participants, and content.
Controls file sending in IM based on document name and size.
Backs up documents sent via IM for auditing purposes.
Allows users to request IM file sending permissions via approval or self-registration.
|
||||
Records standard, Exchange, web, and Lotus emails with sender, recipient, content, and full attachments.
Controls email sending by sender, recipient, subject, attachment name, and size restrictions.
Requires copying specified recipients before sending emails externally.
Allows users to request email sending permissions via approval or self-registration.
|
||||
Records each computer's visited websites with URL and title, searchable by user.
Provides web browsing statistics in lists and charts by category, details, or per computer.
Controls access to specified websites or URLs within a set time range for clients.
Blocks file uploads via HTTP, HTTPS, FTP, and TCP to prevent data leaks.
Allows users to request file upload permissions when blocked, via approval or self-registration.
|
||||
Restricts network access by application, IP range, domain, direction, and port range.
Detects all internal network computers and flags unauthorized uninstalled clients.
Implements internal network isolation, e.g., finance and marketing computers cannot communicate.
Limits application network access to prevent excessive bandwidth usage, e.g., P2P software.
Controls client communication with external computers.
|
||||
Tracks client network traffic by time, address, protocol, port, and per computer.
Provides traffic statistics in charts to detect bandwidth abuse.
Limits internet traffic to ensure fair bandwidth allocation and prevent disruption.
Restricts traffic by network address, port, and send/receive direction for controlled usage.
|
||||
Records application start, exit, window switches, and title changes with search capability.
Tracks app usage time and percentage, displaying results in lists and charts for efficiency analysis.
Blocks high-risk software like stock, games, or cloud programs to prevent leaks and inefficiency.
Prevents installation of non-work-related software to avoid system issues and copyright risks.
Prohibits uninstalling work-related software to reduce IT workload.
Displays watermarks on screens to deter photographing and leaking sensitive information.
Restricts app installation and uninstallation to whitelist or authorized software only.
Supports screen display of images, text, QR codes, or dot-matrix watermarks to deter leaks.
Limits app usage by time and triggers console alerts for restricted programs.
|
||||
Automatically scans and records detailed hardware and software asset information, including changes and custom attributes.
Scans Microsoft product patch installation status and supports patch distribution.
Detects security vulnerabilities, provides explanations and solutions, and enforces system password policies.
Deploys and installs software, executes programs, or distributes documents with breakpoint resume, background/interactive install, and privilege escalation.
Supports batch uninstallation of unauthorized software.
|
||||
Uploads software packages to the center for review and publishing; admins can remove software when needed.
Allows users to search, install, and upgrade programs via the software center safely.
Restricts copyrighted software installation to authorized employees, preventing license misuse.
Supports fast software distribution via P2P, ideal for large or bandwidth-limited networks.
Admins control employee permissions to prevent installation of unrelated software.
Users can install or uninstall software directly through the software center interface.
Users can upgrade software automatically after admins update versions in the center.
Allows elevating normal users to admin rights for installing specific software.
Supports HTTP and P2P distribution for faster software downloads.
Admins can customize the software center logo and name without special modifications.
Audit logs track all admin actions, including time, type, user, IP, and details.
|
||||
Defines sensitive information via keywords, regex, file name, type, attributes, or size.
Scans locally or remotely for sensitive files and supports full-disk backup of matched files.
Automatically tags and classifies new or modified documents containing sensitive content.
Alerts users when decrypting files containing sensitive information.
Monitors clipboard in real-time and logs sensitive content usage.
Blocks transmission of sensitive files via IM, email, web upload, network drives, or storage devices.
Allows users to request approval or self-registration to transmit sensitive files when blocked.
Applies encryption or watermarks to sensitive files during creation, modification, download, or receipt.
Real-time auditing, alerting, and warning for sensitive files during creation, modification, download, or external transmission.
Monitors IM messages in real-time and logs sensitive chat content with context.
Records detailed sensitive file operations: type, time, computer/group, user/group, source file, size, path, and storage type.
|
||||
Real-time backup of documents during creation, modification, renaming, copy, or move operations.
Schedules regular backups with configurable dates and time periods.
Supports full-disk backup tasks with options for file type, size, and scanning schedule.
Allows configuration of backup types, exclusions, file size, interval, traffic, and date/time conditions.
Supports retention of multiple historical backup versions.
Detects duplicate documents by content and size to reduce bandwidth and storage usage.
Displays backup files in folder structure with name, type, size, and modification time.
Search backups by user, computer, modification time range, and file size.
Role-based permissions control backup viewing, downloading, and deletion.
Alerts and stops backups when disk space is low, with automatic cleanup of old versions.
Logs backup details: type, time, computer/group, user/group, file name, and size.
Records admin actions including login, logout, computer access, download, delete, settings changes, and detailed info.
|
||||
Supports adding tags to documents, e.g., technical, contract, financial, department, year.
Supports assigning confidentiality levels: public, internal, secret, confidential, top secret.
Automatically tags or classifies documents based on content or type.
Users can view and manually set document confidentiality levels.
Applies audit, backup, alert, warning, recording, or block measures for external sharing based on tags and levels.
Supports encryption protection for documents with tags and confidentiality levels.
Displays confidentiality or custom watermark info in Office/WPS to remind users of document importance.
Records operation logs for documents with tags or confidentiality levels.
|
||||
Supports adding text, image, QR, dot-matrix, and tracking watermarks to Office, PDF, and image files.
Supports invisible digital watermarks in images, extractable via tools.
Users can manually add or remove document watermarks.
Users can remove watermarks via approval request or self-registration.
Supports watermark-free external sharing via approval or self-registration, with backup of shared files.
Adds watermarks or tracking info when copying to removable drives, network drives, IM, email, or web upload.
Adds watermarks or tracking info when documents are decrypted or saved locally.
Adds watermarks when printing documents (text, image, QR, dot-matrix).
Displays watermarks on screens, applications, or websites to deter photographing and leaks.
Records logs and backups of watermark and tracking info operations.
|
||||
Real-time viewing and tracking of client screen snapshots.
Monitors multiple users simultaneously, supporting multi-monitor setups and group viewing.
Records historical screens with frequency based on applications, linked to logs for context.
Exports historical screen recordings as standard video files for playback.
|
||||
Uses AI and webcam to detect abnormal user behaviors, locking PC, alerting, and logging when triggered.
Automatically detects camera obstruction, locking PC, alerting, and logging the event.
Monitors and blocks external monitor use, showing prompts and logging attempts.
Displays customizable desktop notifications when camera is active to inform users and protect privacy.
Supports multiple unlock methods: facial recognition, button click, automatic unlock, request, or admin override.
Logs user actions including privacy policy review, desktop access, phone photo use, camera obstruction, unlock attempts, and camera usage.
|
||||
Real-time monitoring of client runtime information, including apps, processes, and services, with remote analysis of issues.
Admins can request remote desktop access; users approve for remote assistance or demonstrations.
Remotely open client folders, transfer files, and collect error samples for troubleshooting.
|
||||
Summarizes total risk events and risky users, categorized by high, medium, and low risk.
Tracks predefined security events and displays risk events from the user perspective.
Provides detailed risk event logs including computer/group, event type, risk score, and file details.
Configurable alert rules for events, user behavior, file category, and period with thresholds for high, medium, and low alerts.
Monitors document exfiltration: total files, sizes, users, channels, applications, and types.
Tracks file derivation: counts, operations (download, rename, copy, move, upload, etc.), and generates derivation trajectory charts.
Supports file tracking and traceability by name, showing involved computers, derivation details, and trajectory charts.
Statistics of software usage and licensing, highlighting installation, usage, idle software, and license compliance.
Software library management: built-in and custom categories, adding new software, and querying unclassified or mobile software.
|