Documente Academic
Documente Profesional
Documente Cultură
0
Getting Started
Table of Contents
About .............................................................................................................................. 4
System Requirements ................................................................................................... 5
Program Structure ......................................................................................................... 8
Getting Started ............................................................................................................ 10
Server and Database ................................................................................................... 11
Installing the Server ................................................................................................................11
Database Types Comparison ................................................................................................15
Management Tool ........................................................................................................ 15
Management Tool Installation Prerequisites .......................................................................15
Turning on Internet Information Service (IIS) ..................................................................16
Turning on IIS for Windows 8 and Windows 7 .............................................................16
Turning on IIS for Windows Server 2008 R2 ................................................................17
Turning on IIS for Windows Server 2012 ......................................................................18
Installing .NET Framework .................................................................................................20
Configuring Internet Information Service (IIS) .................................................................20
Using Certificates .................................................................................................................25
Generating Self-Signed Certificate ................................................................................25
Exporting Self-Signed Certificate ...................................................................................26
Importing Trusted Certificate...........................................................................................28
Adding Certificate to Trusted Root Certification Authorities.......................................29
Setting HTTPS Binding for a Default Web-Site ...............................................................36
Installing the Management Tool ............................................................................................38
Adjusting Computer for Remote Access ..............................................................................40
Licensing...................................................................................................................... 43
Activating Serial Keys Online ................................................................................................43
Adding Activated Serial Keys Offline ....................................................................................43
Installing Windows Clients ......................................................................................... 45
Windows Client Installation Prerequisites............................................................................45
Installing Windows Clients Remotely via the Management Tool .....................................46
About ......................................................................................................................................46
Selecting Computers ...........................................................................................................46
Remote Windows Client Installation Process ..................................................................48
Remote Installation from an Existing .INI File..................................................................49
Installing Windows Clients Locally ........................................................................................50
Installing macOS Clients ............................................................................................ 51
About .........................................................................................................................................51
Downloading macOS Client Installation File .......................................................................51
Installing macOS Clients ........................................................................................................51
Installing Linux Clients ............................................................................................... 53
About .........................................................................................................................................53
Downloading Linux Client Installation File ...........................................................................53
Installing Linux Clients ............................................................................................................53
Alerts ............................................................................................................................ 55
Adding Alerts ............................................................................................................................55
Users and Permissions ............................................................................................... 58
About .........................................................................................................................................58
Adding Users ............................................................................................................................58
Permissions ..............................................................................................................................62
Management Tool Log ............................................................................................................62
Viewing Monitoring Results ....................................................................................... 63
Playing Sessions .....................................................................................................................63
Playing Windows Sessions ....................................................................................................64
Viewing Keystrokes..............................................................................................................64
Viewing Clipboard Text Data ..............................................................................................66
Viewing USB Device Info ....................................................................................................67
Viewing URLs .......................................................................................................................67
Playing macOS Sessions .......................................................................................................68
Viewing URLs .......................................................................................................................68
Playing Linux Sessions ...........................................................................................................69
Filtering EXEC Commands .................................................................................................69
Dashboards ..............................................................................................................................69
More Information ......................................................................................................... 69
About
Welcome to Ekran System!
Ekran System is an application that allows you to record the activity of the target computers
with installed Clients and to view the screen captures from these computers in the form of
video.
This guide will help you in managing Ekran components (installing, uninstalling, updating, etc.)
and controlling their interaction.
System Requirements
Ekran System claims different system requirements for each of its components. Make sure your
hardware and software meet the following system requirements to avoid possible component
malfunctions.
Server requirements:
2 GHz or higher CPU
1024 MB or more RAM
Enterprise-level Ethernet card
Minimum 1 Gbit/s network adapter
Windows Server 2016, Windows Server 2012, and Windows Server 2008 R2 (x64
platform)
.Net Framework 4.5.2 or higher
NOTE: If the Server and the Management Tool are to be installed on the same
computer, make sure you turn on the Internet Information Service before the
installation of .Net Framework 4.5.2.
[When using MS SQL Database]: Full edition of MS SQL Server 2008R2 SP1 or higher.
Standard license or higher is required.
NOTE: If you want to deploy the Ekran System in the High Availability mode, enabled
Message Queueing and configured NLB cluster are required. Please refer to the High
Availability Deployment Guide for more information.
NOTE: When the Client is installed to the terminal server, hardware requirements depend on
the number of active user sessions and may increase drastically. For example, hardware
requirements for the Client deployed on the terminal server hosting 10 active user sessions
will be as follows:
Intel Core i3 or similar AMD CPU
2048 MB RAM
Program Structure
Ekran System is an application specially designed to control user activity remotely.
Ekran System Server (further referred to as Server): It is the main part of the Ekran
System used for storing the screenshots and associated information received from the
Clients. The work of the Server can be started or stopped via Server Tray.
Ekran System Windows Clients (further referred to as Windows Clients): Being hosted
on the remote computers, Windows Clients create screenshots with the defined
frequency and send them to the Server along with metadata information such as user
name, host name, activity time, active window titles, application names, URL addresses,
clipboard text data, keystrokes, etc. Managing the remote Windows Clients
configuration and settings is performed via the Management Tool.
Ekran System macOS Clients (further referred to as macOS Clients): Being hosted on
the remote computers, macOS Clients create screenshots with the defined frequency
and send them to the Server along with metadata information such as user name, host
name, activity time, active window titles, application names, URL addresses, etc.
Managing the remote macOS Clients configuration and settings is performed via the
Management Tool.
Getting Started
The Ekran System installation consists of the following steps:
1. Install the Server.
2. Make sure the Management Tool installation prerequisites are met.
3. Install the Management Tool.
4. Purchase serial keys and activate them online (or add them offline).
5. Set up the network environment on the computers where the Clients will be installed.
6. Install the Windows Clients, macOS, or Linux Clients.
7. Define monitoring settings for Clients.
8. Add Alerts in case needed.
9. Add users to the system and define their permissions.
10. Start monitoring the captured data from the investigated computers.
10
Server and Database
5. On the Choose Install Location page, enter the installation path or click Browse to
navigate to the Server installation folder. Click Next.
11
Server and Database
6. On the Database Type page, select the type of database you want to use for storing
data. Click Next. See the Database Types Comparison chapter, to see the difference
and choose the proper type of the database.
7. If you have selected MS SQL Server, on the MS SQL Server Database Configuration
page, define the connection parameters and then click Next.
Define the MS SQL Server instance name, which is the instance name assigned
to the TCP/IP port.
Define the Database name for the database.
Define the User name and Password of a user account via which the
connection to the Server will be established.
12
Server and Database
NOTE: You have to define either the SA credentials or the credentials of the
user with the dbcreator permission.
8. If you have selected Firebird database, on the Database Location page, enter the
database path or click Browse to navigate to the database installation folder. Click
Next.
9. If you already have a database created during the usage of previous versions of the
program, you will be offered to re-use it. If you want to use the existing database, click
Yes. In other case, click No and the new database will be created.
NOTE: If you click No, the existing database will be deleted.
10. On the Administrator password page, define the password for the administrator (the
default user of Ekran System with login admin and full permissions). Click Next.
13
Server and Database
11. On the Ekran System Client Uninstallation Key page, enter the key that will be used
during the Client local uninstallation and click Next. By default, the Uninstallation key
is allowed. You will be able to change this key via the Management Tool any time
later.
14
Management Tool
Deployment Guide). The backed up certificate might be required for Server recovery
or during updates. Commented [TW1]:
16. If you already have a backed up master certificate and re-using the database, delete
the master certificate and import the backed up one instead of it.
17. In Windows Firewall, you must allow the Server executable to accept TCP connections
via port 9447 and 9449 (for the connection between the Server and the Clients) and
22713 (for the connection between the Server and the Management Tool).
Management Tool
Management Tool Installation Prerequisites
The following prerequisites are necessary for successful installation of the Management Tool.
For Windows 7, it is important that you follow these steps in correct order.
15
Management Tool
16
Management Tool
5. Click OK.
17
Management Tool
To turn on the Internet Information Service for Windows Server 2012 using Windows
PowerShell, do the following:
1. In the Start menu, select Windows PowerShell.
2. Enter the following command and click Enter:
Install-WindowsFeature -Name Web-Server, Web-Mgmt-Tools
To turn on the Internet Information Service for Windows Server 2012, do the following:
1. In the Start menu, select Server Manager.
2. In the navigation pane, select Dashboard, then click Manage > Add roles and features.
18
Management Tool
6. On the Server Selection page, select Select a server from the server pool, select your server
from Server Pool list, and then click Next.
7. On the Server Roles page, select Web Server (IIS), click Next and then click Add Features to
start configuring Web Server (IIS).
19
Management Tool
20
Management Tool
Windows 7 Make sure that all the following check boxes are selected in
the Windows Features window and then click OK:
Internet Information Services > Web Management
Tools > IIS Management Console;
21
Management Tool
Windows Server 2008 3. In the Add Roles Wizard window, on the Role Services
page, make sure that the following check boxes are
selected:
Common HTTP Features > Static Content;
Application Development > ASP.NET.
22
Management Tool
Windows Server 2012 1. In the Add Roles and Features Wizard window, on the
Server Roles page, make sure that the Web Server (IIS)
check box is selected and then click Next.
3. Click Next.
4. On the Web Server Role IIS page, click Next.
5. On the Role Services page, select the ASP.NET 4.5 check
box (under Application Development).
23
Management Tool
24
Management Tool
Using Certificates
Generating Self-Signed Certificate
To generate a self-signed certificate on the machine, on which you will install the
Management Tool, do the following:
1. Open the Internet Information Service Manager:
For Windows 8 or Windows 7: Open Computer > Manage > Services and Applications >
Internet Information Services (IIS) Manager.
For Windows Server 2012 or Windows Server 2008: Press Windows+R, enter inetmgr
in the Run window and then press Enter.
NOTE: Using the inetmgr command is a common way of opening the Internet Information
Service Manager for any version of the Windows operating system.
2. Click the main node in the Connections tree-view and then double-click the Server
Certificates item under the IIS category.
25
Management Tool
26
Management Tool
3. The certificate is exported and can be added to the Trusted Root Certification Authorities.
27
Management Tool
5. In the Import Certificate window, click the dots (…) to browse for the file of the purchased
certificate and enter its password in the Password field.
6. Click OK.
28
Management Tool
7. The certificate is imported and displayed on the Server Certificates pane of the Internet
Information Services (IIS) Manager.
To add the certificate to the Trusted Root Certification Authorities, do the following:
1. Press Windows+R, type mmc in the Run text box and press Enter.
2. In the opened User Account Control window, click Yes.
3. In the Console window, select File > Add/Remove Snap-in.
4. In the opened Add or Remove Snap-ins window, select Certificates > Add.
5. In the opened Certificates snap-in window, select Computer account and click Next.
29
Management Tool
6. In the opened Select Computer window, select Local computer: (the computer this console
is running on) and click Finish.
30
Management Tool
10. In the right-click menu of the Trusted Root Certification Authorities node, select All Tasks >
Import.
31
Management Tool
32
Management Tool
14. On the Private key protection page, enter the certificate password and then click Next.
33
Management Tool
34
Management Tool
16. On the last page of the Certificate Import Wizard, click Finish.
17. In the confirmation message, click OK.
18. The certificate is imported and is displayed in the Console window in the Certificates node.
Please note that the Issued To field contains the name of the computer, on which the
Management Tool will be installed in the format that will be used when opening the
Management Tool.
35
Management Tool
36
Management Tool
7. If there is no binding of HTTPS type in the Site Bindings window, click Add.
8. The Edit Site Binding window opens.
9. In the Type box, select https.
37
Management Tool
38
Management Tool
5. On the Choose Install Location page, enter the destination folder in the corresponding
field or click Browse and in the Browse For Folder window, define the destination
folder. Click Install.
6. The process of installation starts. Its progress is displayed on the Installing page.
7. After the end of the installation process, click Close to exit the wizard
8. The Management Tool is displayed as an application of a default web site or any other
site with https connection in the Internet Information Services (IIS) Manager.
39
Management Tool
9. Now you can open the Management Tool via your browser from the same computer
or a remote one.
To adjust Firewall on the computer where the Management Tool is installed, do the
following:
1. In the Control Panel, select System and Security > Windows Firewall.
2. In the Windows Firewall window, click Advanced settings.
3. In the Windows Firewall with Advanced Security window, right click Inbound Rules
and select New rule.
4. The New Inbound Rule Wizard opens.
5. On the Rule Type page, select Predefined and then select Secure World Wide Web
Services (HTTPS) in the list. Click Next.
40
Management Tool
6. On the Predefined Rules page, select the World Wide Web Services (HTTPS Traffic-In)
check box. Click Next.
41
Management Tool
42
Licensing
Licensing
Activating Serial Keys Online
To activate purchased serial keys online, do the following:
1. Make sure you have an active Internet connection on the computer with the installed
Server.
2. Log in to the Management Tool as a user with the administrative Serial keys management
permission.
3. Click the Serial Key Management navigation link on the left.
4. On the Serial Key Management page, click Activate keys online.
5. In the Serial Key Activation window, enter serial keys to be activated separating them with
semicolons or paragraphs and click Activate.
6. The activated keys will appear on the Serial Key Management page
7. The number of available licenses and the update & support period end date change.
43
Licensing
44
Installing Windows Clients
In Windows Firewall on the Server side, allow the Server executable to accept TCP connections
via ports 9447 and 9449 (for the connection between the Server and the Clients).
NOTE: These rules will be added to Windows Firewall automatically, if Windows Firewall is
enabled during the Server installation.
Make sure the conditions mentioned above are met to avoid possible problems with Client
remote installation.
45
Installing Windows Clients
Selecting Computers
To select the computers for Client installation, do the following:
1. Log in to the Management Tool as a user with the Client installation and management
permission.
2. Click the Client Management navigation link on the left.
3. On the Clients page, click Install Clients.
4. The Computers without Clients page opens. On this page, you can see the computers, for
which the previous installations failed.
5. Select how you would like to search for computers where the Windows Clients will be
installed:
To select computers from the list of all computers in your network, Deploy via
network scan.
To select computers by IP range (IPv4 or IPv6 addresses), click Deploy via IP range.
46
Installing Windows Clients
7. If you have selected the Deploy via IP range option, the Computers Scan page opens. In the
From Address and To Address boxes, enter the IP range (either IPv4 or IPv6), for which the
network should be scanned. To find only one computer, enter the same IP address in both
boxes. Click Scan.
8. If you have selected the Deploy on specific computers option, the Adding Computers page
opens. Enter the names of computers on which Windows Clients must be installed in the
box Name and click Scan. Use semicolon to separate computer names.
Please note that you should enter the full name of the computer.
9. The scanning process starts. The list of found computers will be updated automatically. If it
is not updated, click Refresh. To stop the scanning process, click Stop.
10. When the scanning process finishes, select check boxes next to the computers that you
want to install the Clients on. Click Next.
47
Installing Windows Clients
11. The selected computers are added to the list on the Computers without Clients page.
12. If you want to delete some computers from this list, click Remove from list next to the
selected computer.
48
Installing Windows Clients
If the computers are in a domain, enter the domain name and domain administrator
account credentials.
If the computers are in workgroup, enter the credentials of a local administrator for
target computers.
If you leave the Domain box empty, the entered credentials will be used as the credentials
of a local user of a target computer and the Client will be installed under the <target PC
name>\<user name> account.
NOTE: All workgroup computers must have the same administrator account credentials.
Otherwise use installation via installation package method to deploy Ekran System
Clients.
4. The installation process starts. The progress of installation will be updated automatically on
the Client installation page. If it is not updated, click Refresh.
5. After the end of the installation, the installed Clients will appear on the Clients page in All
Clients group. If the installation of some Clients fails, these computers will remain in the
Computers without Clients list and you can click Retry to start the installation again.
49
Installing Windows Clients
1. On the Computers without Clients page, click Install using existing .ini file.
2. On the INI file selection page, click Choose file to select the .ini file that will be used for
configuration of new Clients.
Please note, if any parameter except RemoteHost is absent or not valid, its value will be set
to default. The RemoteHost parameter is ignored, in this type of installation. The Client will
connect to the Server to which the Management Tool is connected.
3. Once the .ini file is chosen, click Next and continue the installation the same way as when
installing the Clients remotely in a common way.
50
Installing macOS Clients
To install the macOS Client on the target computer with a macOS operating system from the
command line:
1. Make sure that you log out of all active users except the current one.
2. Copy the installation package to any folder.
3. Run the Terminal.
4. Navigate to the folder with the installation package by entering the following command:
cd path/to/folder
5. Unpack the installation package using the following command:
tar xvfz <installation package name>
51
Installing macOS Clients
The EkranClient folder contains the install.sh script used to install the Client.
7. Run the macOS Client installation script specifying the Server name or Server IP address
and the port used for connection to the Server (9447 is recommended):
./install.sh <server_name/IP> <Agent_port>.
8. After the end of the installation, macOS Client will appear in the list on the Clients page in
the Management Tool.
52
Installing Linux Clients
53
Installing Linux Clients
8. After the Client is installed, it starts monitoring the new terminal sessions. If you want
to monitor the older terminal sessions, restart them.
9. The installed Linux Client appears in the list on the Client Management page in the
Management Tool.
54
Alerts
Alerts
Adding Alerts
To add an alert, do the following:
1. Log in to the Management Tool as a user with the administrative Client installation
and management permission.
2. Click the Alert Management navigation link to the left and click Add Alert.
3. On the Add Alert page, on the Alert Properties tab, define the following alert
properties and then click Next:
Enter a unique name for an alert.
Optionally, enter the alert description.
Select the Enabled option to enable an alert.
Select the alert risk level. It can be Critical, Normal, or High.
4. On the Alert Rules tab, define the rules to be applied and then click Next:
Select the Parameter of the rule.
Select the Comparison operator.
Enter the Value to which Parameter will be compared.
Click Add Rule to create one more rule.
To delete a rule, clear its Value box or click Delete.
55
Alerts
5. On the Assigned Clients tab, select the Clients/Client Groups to which the alert will be
assigned and click Next. To find specific Clients/Client Groups, enter their names in the
search box.
6. On the Actions tab, select how you would like to receive the alert notifications:
Select the Send emails to option and then enter the email address to which the
notifications will be sent. You can enter several email addresses separating them with
semicolon.
NOTE: To receive email notifications correctly, make sure that Email Sending
Settings contain correct parameters for email sending.
Select the Show warnings in Tray Notifications application option to activate the tray
notifications. The alert notifications will then pop up from the tray.
Select the Show warning message to user option if you want a warning message to be
displayed when the alert is triggered.
In the Additional actions box, select the Block user on all computers option if you want to
block the user from the session, or the Kill application option if you want to forcedly stop
the corresponding application.
56
Alerts
57
Users and Permissions
Adding Users
To add a new user, do the following:
1. Log in to the Management Tool as a user with the administrative User management
permission.
2. Click the User Management navigation link on the left.
3. On the Users page, click Add User.
4. On the User Type tab, select the type of user you want to add:
Click Add an Internal user to create an internal application user.
Click Add an Active Directory user/user group to add an existing Windows user/user
group.
58
Users and Permissions
On the User Details tab, do one of the following and click Next:
For an internal user, define user credentials and additional information about the
user.
NOTE: Login and password are required. The password must be at least 6 characters
long. The maximum length of the first name, last name and description is 200
characters.
For an Active Directory user/user group, select the domain in the Domain list and then
enter at least two characters into the User/User group box to search for the required
user/user group.
59
Users and Permissions
NOTE: The Active Directory user/user group cannot be added if there is no LDAP target added
for the required domain on the Configuration page or if the connection with the domain is
lost (the domain is unavailable).
5. On the User Groups tab, select the user groups to which the user will belong. To find a
specific group, enter its name in the Contains box and click Apply Filters. Click Next.
NOTE: The user is automatically added to the default All Users group and can’t be
removed from it.
6. On the Administrative Permissions tab, select administrative permissions that will be given
to the user. Click Next.
NOTE: If the user has inherited some permissions from user groups, you can only add new
permissions. To remove permissions inherited from user groups, you need to remove the
user from these groups.
60
Users and Permissions
7. On the Client Permissions tab, define permissions on user work with Clients/Client Groups:
To find a specific Client/Client Group, enter its name in the Contains box and click
Apply Filters.
Click Edit Permissions and then, in the Client Permissions/Client Group Permissions
window, define the client permissions which will be given to a user for the
corresponding Client/Client Group.
When the permissions are defined, click Save to close the Client Permissions/Client
Group Permissions window.
8. Click Finish.
9. The user is added and displayed on the Users page.
61
Users and Permissions
NOTE: For an Active Directory user, the first name and last name properties will be
automatically filled after the user’s first login to the system.
Permissions
The permissions allow you to define which functions a user will be able to perform with the
system and Clients. There are two types of permissions: administrative permissions and Client
permissions.
Administrative permissions define actions that a user can perform with the whole system.
Client permissions define actions that a user can perform with selected Clients.
The permissions can be defined during user and user group adding/editing.
If you define permissions for the group, any user belonging to this group inherits these
permissions. To remove permissions inherited by the user from a group, you need to remove
the user from a group. Apart from permissions inherited from the group, you can assign a user
his/her own permissions.
62
Viewing Monitoring Results
Playing Sessions
The Session Viewer is a part of the Management Tool that provides the possibility to view
monitored data within one selected session.
To open the Session Viewer, select one of the sessions in the Sessions grid on the Monitoring
Results page and click on it.
63
Viewing Monitoring Results
Viewing Keystrokes
The captured keystrokes are displayed in the Text data column in the Metadata grid. When you
select a row in the Metadata grid, the keystrokes associated with it are displayed in the Details
pane below the Player pane. By default, only text characters are displayed. You can enable
displaying all keystrokes logged (e.g., navigation keys, functions keys, etc.) by clearing the Show
only text characters check box. Then any other keys and key combinations will be displayed in
square brackets. If a key was pressed repeatedly, it will be displayed with an "x" sign and the
number of reiterations (e.g., [F12 x 24]).
If the user types the text, using arrows (left/right) and Backspace or Delete keys, these keys are
processed by the system to edit the logged keystrokes. When the keystrokes are edited, only
the end result of text that was meant to be typed by the user is displayed in the Details pane.
To see this result, you must select Show only text characters.
For example:
If the user types “Helo” and then uses the left arrow to go back and correct the word by typing
another “l”, the word “Hello” will be displayed in the Details pane, with “Helol”.
Presentation of keystrokes with the selected Show only text characters check box.
64
Viewing Monitoring Results
Presentation of keystrokes with the unselected Show only text characters check box.
Please note that if the SmoothMode parameter (user activity recording on each event without
timeout) is enabled for the Client, the keystrokes are not edited.
If the user corrects the word using a mouse, the keystrokes are not edited.
For example:
If the user types “Fried” and then uses the mouse to go back and correct the word by typing
letter “n”, the word “Friedn” will be displayed in the Details pane, instead of “Friend”.
If the user types the text in different applications, the logged keystrokes are split according to
screenshots.
For example:
If the user types “Hello” in Skype and then opens Word and types “Ok”, the word “Hello” will be
displayed next to the screenshot associated with Skype, and the word “Ok” will be displayed
next to the screenshot associated with Word, instead of “HelloOk”.
NOTE: If the Enter key was pressed during input, the log will be split in metadata grid. Though
to maintain text integrity, in the keystrokes box, the keystrokes lines having the same Title-
Application pair will be put together.
65
Viewing Monitoring Results
If you are using rules for kernel-level USB monitoring according to which the devices are
detected or blocked, each time the alert event occurs, a screen capture is created. In the
Metadata grid, this is indicated by highlighting the activity in the grid.
NOTE: If the screenshot creation is not enabled on the Windows Client, sessions of this Client
will contain no screenshots.
When you select a USB-device-related screen capture or a row in the Metadata grid, the USB
device info associated with it is displayed in the Details pane below the Player pane.
If the device was blocked, it is marked as BLOCKED in the parentheses.
Viewing URLs
67
Viewing Monitoring Results
If the URL monitoring option is enabled for the Windows Client, then each time the screen
capture is created while the user is working in the browser, the URL address is saved and
displayed in the URL column in the Metadata grid. If there are several screenshots created
while the user is viewing one page on a certain website, then all of them contain the same URL
information.
NOTE: If the screenshot creation is not enabled on the Windows Client, sessions of this Client
will contain no screenshots.
The URL column contains only top and second-level domain names even if the parameter is not
selected in the URL monitoring settings for the Windows Client. The full URL address is
displayed in the Details pane.
NOTE: As getting a URL address to be monitored may take about 600 milliseconds, there is a
possibility that the screen capture and its activity title along with URL address may be not
properly synchronized in the Session Viewer (e.g., the user may see a screen capture with a
URL address that belongs to the previous one).
Viewing URLs
If the URL monitoring option is enabled for the macOS Client, then each time the user activity is
captured while the user is working in the browser, the URL address is saved and displayed in
the URL column in the Metadata grid. If there are several records made while the user is
viewing one page on a certain website, then all of them contain the same URL information.
The URL column contains only top and second-level domain names even if the parameter is not
selected in the URL monitoring settings for the Windows Client. The full URL address is
displayed in the Details pane.
NOTE: As getting a URL address to be monitored may take about 600 milliseconds, there
is a possibility that the screenshot and its activity title along with URL address may be
68
More Information
not properly synchronized in the Session Viewer (e.g., the user may see a screenshot
with a URL address that belongs to the previous one).
Dashboards
Ekran System allows viewing certain types of information using dashboards displayed on the
Home page. Dashboards provide you with convenient real-time view of the most important
data. The following dashboards are available:
Licenses
Clients
Database Storage Usage
Recent Alerts
Latest Live Sessions
Sessions out of Work Hours
Rarely Used Computers
Rarely Used Logins
You can choose which dashboards to display, rearrange the dashboards on the screen, add
several dashboards of the same type to see the same data in different variations, and more.
More Information
For more detailed information, please see the Ekran System Help.
69