Sunteți pe pagina 1din 56

License Agreement - Unistal Systems Pvt.

Ltd
The entire risk of the use or the result of the use of this software and documentation remains with
the user. No part of this documentation may be reproduced in any means, electronic or
mechanical, for any purpose, except as expressed in the Software End User License Agreement.
User license of this software is valid for one year after the Activation.
This software and documentation are copyrighted. All other rights, including ownership of the
software, are reserved to Unistal Systems Pvt. Ltd. Unistal, Unistal 3 in 1 and the Unistal marks
are registered trademarks of Unistal Systems Pvt. Ltd. in India and elsewhere. Microsoft,
Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7, Windows 8, Windows 8.1 and
windows 10 are trademarks or registered trademarks of Microsoft Corporation. All other brand
and product names are trademarks or registered trademarks of the respective owners.

All rights, titles and interest in and to Unistal 3 in 1 and all copyright rights in and to Unistal 3in
1 (including but not limited to any images, photographs, logos, animations, video, audio, music,
text, and "applets" incorporated into Unistal 3 in 1), the accompanying printed materials, and
any copies of Unistal 3 in 1 are owned by Unistal. Unistal 3 in 1 is protected by copyright laws
and international treaty provisions. Therefore, you must treat Unistal 3 in 1 like any other
copyrighted material. You may not copy the printed materials accompanying Unistal 3 in 1. You
must produce and include all copyright notices in their original form for all copies created
irrespective of the media or form in which Unistal 3 in 1 exists.

Copyright
Copyright © 2007-2019. Unistal Systems Pvt. Ltd.
The software that accompanies this license (the "software") is the property of Unistal systems
Pvt. Ltd. or its licensors and is protected by the copyright law.
You may:
 Use one copy of the software on a single computer and you may not transfer this to
 another person or allow another person to use other versions. 
 Copy the software onto the hard disk of the computer and retain the original for archival
purposes. 
You may not:
 Copy the documentation which accompanies the software, 
 Install the software on the network, 
 Sublicense, rent or lease any portion of the software, 

 Reverse engineer, de-compile, disassemble, modify, translate, and attempt to discover the
source code of the software. 

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1


Unistal 3 in 1- End User License Minimum Terms
This End User License Agreement (“EULA”) governs use of software (“Software”) from Unistal
Systems Pvt. Ltd. References to “End User” in this EULA refer to any entity or individual which
has obtained a copy of the Software from Unistal Systems Pvt. Ltd.

Limited License
Subject to all of the terms and conditions of this EULA, Unistal Systems Pvt. Ltd grants to End
User a non-transferable, non-sub licensable, non-exclusive license to use the object code form of
the Software internally, but only in accordance with the technical specification documentation
generally made available with the Software. “Software” shall also include any documentation
and any support and maintenance releases of the same Software provided to End User.

Application Software
You may install and use the Software, on as many computers as necessary with the limitation
imposed by the total number of licensed users. You may make one additional copy for back-up
purpose.

Term of License

The license granted hereunder shall commence on the purchasing date of the Software and shall
expire at the end of the period for which the license is purchased.

Restrictions

End User shall not (and shall not allow any third party to): (a) decompile, disassemble, or
otherwise reverse engineer the Software or attempt to reconstruct or discover any source code,
underlying ideas, algorithms, file formats or programming interfaces of the Software by any
means whatsoever (except and only to the extent that applicable law prohibits or restricts reverse
engineering restrictions, and then only with prior written notice to Unistal Systems Pvt. Ltd); (b)
distribute, sell, sublicense, rent, lease or use the Software (or any portion thereof) for time
sharing, hosting, service provider or like purposes; (c) remove any product identification,
proprietary, copyright or other notices contained in the Software; (d) modify or create a
derivative work of any part of the Software, except to the extent expressly authorized in writing
by Unistal Systems Pvt. Ltd; or (e) publicly disseminate performance information or analysis
(including, without limitation, benchmarks) from any source relating to the Software.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 2


Ownership
Notwithstanding anything to the contrary contained herein, except for the limited license rights
expressly provided herein, Unistal Systems Pvt. Ltd has and will retain all rights, title and
interest (including, without limitation, all patent, copyright, trademark, trade secret and other
intellectual property rights) in and to the Software and all copies, modifications and derivative
works thereof. End User acknowledges that it is obtaining only a limited license right to the
Software and that irrespective of any use of the words “purchase”, “sale” or like terms hereunder
no ownership rights are being conveyed to you under this Agreement or otherwise.

If requested, End User shall certify in writing that End User is using the Software for the number
of servers, with the number of copies, on the system configuration and at the site agreed upon by
the parties (as applicable). End User agrees that no more than once annually its use of the
Software may be audited by Unistal Systems Pvt. Ltd (or an independent auditor work on such
party’s behalf) during normal business hours upon reasonable advance written notice for the
purpose of verifying End User’s compliance with this EULA.

Confidentiality

End User acknowledges that, it may obtain information relating to the Software or Unistal
Systems Pvt. Ltd, including, but not limited to, any code, technology, know-how, ideas,
algorithms, testing procedures, structure, interfaces, specifications, documentation, bugs,
problem reports, analysis and performance information, and other technical, business, product,
and data (“Confidential Information”). End User shall not disclose Confidential Information to
any third party or use Confidential Information for any purpose other than the use of the
Software as licensed under the EULA.

Warranty Disclaimer

EXCEPT FOR ANY EXPRESS LIMITED WARRANTY OFFERED BY UNISTAL SYSTEM


PVT LTD FOR WHICH END USER’S REMEDY IS LIMITED TO REPAIR,
REPLACEMENT OR REFUND BY UNISTAL SYSTEM PVT LTD, THE SOFTWARE IS
PROVIDED “AS IS” AND UNISTAL SYSTEM PVT LTD MAKES NO WARRANTIES TO
ANY PERSON OR ENTITY WITH RESPECT TO THE
SOFTWARE OR ANY SERVICES AND DISCLAMISALLIMPLIED WARRRANTIES
INCLUDING WITHOUT LIMITATION WARRANTIES OF TITLE NON-
INFERINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 3


Limitation of Damages and Remedies

IN NO EVENT SHALL UNISTAL SYSTEM PVT LTD BE LIABLE UNDER CONTRACT,


TORT, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY
INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE SOFTWARE. NOTWITHSTANDING ANYTHING HEREIN TO
THE CONTRARY, THE TOTAL LIABILITY OF UNISTAL SYSTEM PVT LTD TO END
USER, INCLUDING BUT NOT LIMITED TO DAMAGES OR LIABILITY ARISING OUT
OF CONTRACT, TORT, BREACH OF WARRANTY, INFRINGEMENT OR OTHERWISE,
SHALL NOT IN ANY EVENT EXCEED THE FEES PAID BY END USER WITH RESPECT
TO THE SOFTWARE. UNISTAL SYSTEM PVT LTD SHALL NOT BE LIABLE FOR LOSS
OR INACCURACY OF DATA, COST OF PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES, SYSTEM DOWNTIME, FAILURE OF SECURITY MECHANISMS,
GOODWILL, PROFITS OR OTHER BUSINESS LOSS, REGARDLESS OF LEGAL
THEORY, EVEN IF UNISTAL SYSTEM PVT LTD HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.

THE PARTIES AGREE THAT THE LIMITATIONS OF THIS SECTION ARE ESSENTIAL
AND THAT UNISTAL SYSTEM PVT LTD WOULD NOT PERMIT END USER TO USE
THE SOFTWARE ABSENT THE TERMS OF THIS SECTION. THIS SECTION SHALL
SURVIVE AND APPLY EVEN IF ANY REMEDY SPECIFIED IN THIS EULA SHALL BE
FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.

THIS SOFTWARE IS NOT FAULT-TOLERANT AND IS NOT DESIGNED OR INTENDED


FOR USE IN ANY HAZARDOUS ENVIRONMENT REQUIRING FAIL-SAFE
PERFORMANCE OR OPERATION. THIS SOFTWARE IS NOT FOR USE IN THE
OPERATION OF AIRCRAFT NAVIGATION, NUCLEAR FACILITIES, OR
COMMUNICATION SYSTEMS, WEAPONS SYSTEMS, DIRECT OR INDIRECT LIFE-
SUPPORT SYSTEMS, AIR TRAFFIC CONTROL, OR ANY APPLICATION OR
INSTALLATION WHERE FAILURE COULD RESULT IN DEATH, SEVERE PHYSICAL
INJURY OR PROPERTY DAMAGE.

Termination and Survival

Upon any termination of this EULA, End User shall immediately cease use of the Software and
remove all Software from its systems. The terms set forth in the sections entitled Restrictions,
Ownership, Confidentiality, Warranty Disclaimer, Limitation of Damages and Remedies shall
survive any termination of this EULA.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 4


Table of Contents

1. Introduction .............................................................................................................................................. 7
2. System Requirements ............................................................................................................................... 7
3. How To Install............................................................................................................................................ 8
3.1 Preparing to Install Unistal 3 in 1 ....................................................................................................... 9
3.2 Installation Path ................................................................................................................................ 10
3.3 Finish ................................................................................................................................................. 10
4. Product Registration ............................................................................................................................... 11
4.1. When PC is connected to the internet............................................................................................. 11
5. Getting Started ........................................................................................................................................ 14
From Desktop .......................................................................................................................................... 14
From Start Menu ................................................................................................................................. 14
6. Unistal 3 in 1 Working Guide............................................................................................................ 16
6.1.Activity Reporter ............................................................................................................................... 17
6.1.1. Features .................................................................................................................................... 17
6.1.2. Activity Reporter Startup .......................................................................................................... 17
6.2. SysBoost (System Tuneup Software) ............................................................................................... 30
6.2.1. Features.................................................................................................................................... 30
6.2.2. Sys Boost Startup ..................................................................................................................... 31
6.2.3. Sys Boost – Select and Wipe .................................................................................................... 31
6.2.4. Sys Boost– Select Extensions ................................................................................................... 32
6.2.5. Sys Boost- Defrag drive ............................................................................................................ 32
6.2.6. Sys Boost – Internet Wipe ........................................................... Error! Bookmark not defined.
6.2.7. Sys Boost – Registry Clean ....................................................................................................... 34
6.2.8. Sys Boost – Registry Restore .................................................................................................... 35
6.3 Port Locker & Data Leakage Prevention .............................................. Error! Bookmark not defined.
6.3.1. Features.................................................................................................................................... 36
6.3.2. Port Locker Startup ..................................................................... Error! Bookmark not defined.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 5


7. COMPANY OVERVIEW ............................................................................................................................. 52
8. FAQ’S ....................................................................................................................................................... 53

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 6


1. Introduction

In recent scenario, Unistal 3 in 1 is the elite priority from the broader aspect for the entire
individual and corporate world which includes protection from Data Theft, Data Loss and
protection from unethical activity like Laptop Theft.

Unistal 3 in 1 has 3-tier protection. It includes following software components:


 Sysboost
 Activity Reporter
 Port locker & Data Leakage Prevention

2. System Requirements

You may install only on computers running the following operating systems
 Windows XP with Service Pack 2 
 Windows Vista with Service Pack 1 
 Windows 7 
 Windows 8 
 Windows 8.1 
 Windows 10

Before installation, make sure that your computer meets the minimum system
requirements.

Note: To find out the Windows operating system your computers is running and
hardware information, right-click My Computer on the desktop and then select
Properties from the menu.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 7


Minimum System Requirements

 Operating System: 
Windows XP (Service Pack 3)
Vista (Service Pack 1)
Windows 7
Windows 8
Windows 8.1
Windows 10
  CPU: 450 MHZ 
 RAM: 512 MB 
 HDD: 100 MB

3. How To Install
For installing Unistal 3 in 1 either we have the installation disk or the product folder
downloaded from the internet. The installation process starts with double clicking the
Setup.exe file. This will start a setup wizard, which will guide you in installing. Before
running setup make sure, your system is covering minimum system requirements.

First checkpoint in installation is License Agreement. The license agreement needs to be


read properly and then accepted for continuing the installation process.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 8


The second step is to select the additional task as:
 Create a desktop icon. 
 Create a Quick Launch icon. 



After selecting the additional task, welcome to installation wizard of Unistal 3 in 1 will come
into frame. Click next to start the installation of Unistal 3 in 1.

3.1 Preparing to Install Unistal 3 in 1


Now in order to select the products, the dialog box display as “Welcome to install Wizard
of Unistal 3 in 1”. Please select the products you want to install.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 9


3.2 Installation Path

By default, Unistal 3 in 1 will be installed in “C:\Program Files\Unistal3in1LL”.

Click Next to start the installation.

3.3 Finish
Once installation is done, it will proceed to display all the components that has been
installed and marked as done in the dialogue box.

After finishing the Unistal 3 in 1, a set password dialogue box will display in order to set
the password. This password in used for further authentication process of Unistal 3 in 1.
User needs to enter a password with the given requirements and then confirm the same.

The requirements for the password are:


 Password length should be minimum 6
characters. 
 Special characters are not allowed.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 10


4. Product Registration

4.1. When PC is connected to the internet

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 11


While registering the product, it will ask for the key number.

Fill all the user details and click Register button


.

On clicking register button, you get acknowledgment for registration (Registration is


successfully done) and below screen will pop up.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 12


On clicking ok, below window will get open.

Click on ‘License Info’ below screen will get open.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 13


5. Getting Started

From Desktop

User can run the Unistal 3 in 1from the desktop through Unistal 3 in 1icon.

From Start Menu


Click on Start → All Programs → Unistal 3 in 1

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 14


Now to run the Unistal 3 in 1, user need to enter the password

On clicking Ok, below screen appears.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 15


6. Unistal 3 in 1 Working Guide

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 16


6.1. Activity Monitoring and Reporting

The Protegent enhances the complete security and monitoring all the information with respect to
any activity that already done in your computer. Each and every keystroke placed in the network
can also be monitored and updates all the details related to any activity time to time to the
administrator regarding this. The information can be customized as per the desired requirement
related to the user. It is defined for monitoring and reporting the activities for a definite URLs
that need to be accessed or not in an organization which enhances the business to achieve the
productivity secure at higher rate and to deliver the better client services that makes the business
fruitful.
6.1.1. Features

 Clipboard Monitoring Report


 File Transfer Monitoring Report
  Internet Downloads Report
 Folder Monitoring Report
 Internet Usage Report
 User Time Monitoring Report
 App Monitoring Report
 Apptime Spent Monitoring Report
  Keystroke Logger Monitoring Report
 Visited Website Monitoring Report
 Desktop Image Capture Report
 Chat Monitoring Report
 Outlook Email Monitoring Report

6.1.2. Activity Reporter Startup


 Activity Reporter icon gets created in task bar. 



Visited Website Reporting

Captures all Internet activity with features of Blacklist and White list as follows:

Blacklist- The additive internet (web sites) activities in this list are monitored and
 Alerts can be visualized. 
White list- The additive internet (web sites) activities in this list are ignored and
Alerts cannot be visualized.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 17


Monitor Screenshots

At a certain time Interval or on every mouse click captures the screenshot.

Monitor Keystrokes

Monitor keystrokes intercept DOS-box and Java–chat Key strokes and


captures all the key strokes.

Monitor Application Activity


Monitor Application Activity enhances to cap list and Blacklist as follows:

White list- Additive list with respect to all the application activities are
 Ignored and not visualize in alerts.

 Blacklist- Additive list with respect to all the application
activities will get captured and visualized in alerts. 

User Time reporting

User Time displays the User Time status which has been spend by the user on a system.

Folder Monitoring Reporting

Folder Monitoring displays the selected folder activity status which have been made by the user
on the folder

Monitor Chat Activity

Monitor Chat Activity captures ICQ, Miranda, Skype, Google Talk, MSN,
AIM, AOL, Yahoo, and QIP Chats.

Monitor Clipboard Activity

The activities involving cut, copy, paste are monitored

Monitor App time Activity

Display the Apptime spent by the user on application.

Internet Usage Reporting


Internet Usage displays internet applications time that was used by the user at a given
point of time.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 18


File Transfer Reporting
File Transfer displays the Copy/Cut the file from drive/folder and paste in other drive/folder.

Outlook Reporting
Outlook Emails displays all the emails which was send and received by the user on Outlook

Internet Downloads Reporting

Internet Downloads displays the different internet downloads which have been made by the user
on the Internet

ACTIVITY REPORTER STARTUP

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 19


Activity Reporter –Reporting: ----
All alerts and logs can be viewed here.

Activity Reporter - Report


Users can see the reports of different modules in this section.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 20


Report - Clipboard:
Clipboard displays the text which has been copied or cut from a particular application.

Report – File Transfer


File Transfer displays the Copy/Cut the file from drive/folder and paste in other drive/folder.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 21


Report –Internet Downloads
Internet Downloads displays the different internet downloads which have been made by the user
on the Internet

Configuration - Internet Downloads

Click on Checkboxes->Click on Apply button

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 22


Report –Folder Monitoring
Folder Monitoring displays the selected folder activity status which have been made by the user
on the folder

Configuration – Folder Monitoring

Click on Browse-> window open->select the folder->Click on OK->Click on Apply

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 23


Report –Internet Usage
Internet Usage displays internet applications time that was used by the user at a given
point of time.

Report –User Time


User Time displays the User Time status which has been spend by the user on a system.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 24


Report –Application Monitoring

Application Activity Alert displays all the application that was used by the user at a given point
of time.

Configuration –Application Monitoring Alerts

Click on Add Alert->Enter name of exe->click on Add Button->Click on Apply

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 25


Report –Apptime Spent Monitoring

Apptime spent monitoring displays all the application spent time that was used by the user at a
given point of time.

Report - Keystrokes
Keystrokes display the different keystrokes which have been made by the user on the keyboard.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 26


Report – Visited Website Alerts
Visited Website displays the different website alerts that were used by the user at a given point
of time.

Configuration - Visited Website Alerts

Click on Add Alert->Enter name of website->click on Add Button->Click on Apply button

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 27


Report-Desktop Image
Desktop Image displays the screens taken by the software while the user is working or idle

Report-Chat Monitoring

Chat Monitoring displays the chat report which was done by the user on a chat application.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 28


Report-Outlook Emails
Outlook Emails displays all the emails which was send and received by the user on Outlook

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 29


6.2. SysBoost (System Tune up Software)
Sysboost is system tune up software which is easy to use and developed for Microsoft
Windows which helps to manage, maintain, and optimize a computer system. It
improves boost up time and overall performance by cleaning junk registry, junk files
and folders, temporary internet files and by performing defragmentation of drives.

This software - analyses the registry and brings out the unwanted registries to clean.
Backup of wiping folders can also be taken and can be restored for future usage.
Registries which are deleted can be restored easily if you want.
6.2.1. Features

 Wiping of folders 
 Defragmentation of drive 
 Internet wipe 
 Registry cleaning 
 Registry restoring 

Wiping of folders
It deletes the selected folder permanently

Defragmentation of drive
It analyses and defrags the selected drive.

Internet wipe
It wipes all the temporary internet files, internet history and internet cookies permanently.

Registry cleaning
It identifies and deletes those unwanted registries to improve the performance of the
computer system.

Registry restoring
It restores cleaned registries easily if needed.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 30


6.2.2. SysBoost Startup

6.2.3. SysBoost – Select and Wipe


Select and Wipe is used to wipe particular file(s)/folder(s). Click on
Select and Wipe tab. Here you can select file(s)/folder(s); you want to
wipe using check marks against each file and folder. Check the option
"REMOVELINKS FROMRECENTFOLDER" for removing links from recent
folder, containing the links of recently opened file

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 31


6.2.4. SysBoost– Select Extensions
Sometimes we want to delete some particular files from a folder. In this feature we
can select folder and can mention the extensions of the file (doc, xlsx, txt etc) we
want to delete. If we delete a file deleted from our system; it still remains as it is on
In this feature we can select a folder and mention all the extension files
Which you want to wipe permanently so that it can’t be removed.

6.2.5. SysBoost- Defrag drive


Defragmentation of drive can be performed using this feature. Due to excessive usage
of files and folders fragmentation occurs in the drives. Fragmentation can hinder
overall throughput of the system. Due to fragmentation there can be loss of files results
in performance loss of the system. Defragging of drives attempts to elevate these
problems. By defragging the drive we can optimize the performance of our computer
system. Defragging reduces the amount of fragmentation and helps the computer
system to work efficiently. It analyses the selected drive and gives the information
weather the drive needs to be defragmented

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 32


6.2.6. SysBoost – Internet Wipe
When we use internet, all its information gets stored in the computer system. This information
includes list of the visited websites, cookies, information you have entered in the web form
(passwords, ID, name, address). When we delete history it doesn’t get deleted from our system.
It does still exist in the disk. Internet Wipe deletes the internet history, temporary internet
files and internet cookies permanently. Internet history can be misused by third party. This
feature ensures security of your system. It helps you to protect your system from unwanted
threats

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 33


6.2.7. SysBoost – Registry Clean
Registry cleaner is designed to help remove invalid references made in the registry
pointing to uninstalled program or other programs which are no longer in use by the
user. These programs are left behind in the registry causing several problems leading
to a poor system performance. By using Registry clean we can remove unwanted
registry entries from our system. We can optimize the performance of our system by
using this feature. We work on uncountable programs daily out of which few are of
least importance, but we do not get time to clean them manually.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 34


6.2.8. SysBoost – Registry Restore

Sometimes after registry cleanup we notice that some programs are not working
properly and some applications failed to function properly. This is due to missing
registry keys. This may be caused by shared keys which were deleted during the
registry cleaning or by other deleted keys. Sometimes we delete registry by mistake
and realize that the deleted file is of utmost importance. In that case we can use this
feature of registry restoration.

6.3 Port Locker

The maturation of an organization confidential is data. The purely extraordinary feature inbuilt in
Protegent is purely from security purposes. The device is limited to reduce the risk of data
leakage and data theft by locking and blocking the port of your computer. User can enable or
disable port.

locker feature as per the requirement. Leakage of data USB ports via pen drives, memory cards,
flash drives DVD/CD writers, PCMCIA ports, Ethernet Ports, Printer Ports and Infrared Ports.
Preserving your gadget from unauthorized access the module enables the users to lock port with
distinct variety of lock options including permanent, specified time period or the system is on
idle or untouched. Some unauthorized action includes locking and blocking the ports, alters in
settings,setting scheduler etc reproduce the automatic alert.
2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 35
6.3.1. Features
 Block Port
 While listing of Authorized USB device
 USB Read only feature
 Email Filtering
 Block CD/DVD
 Block Printer
 Block/Unblock Single/All Ports
 Block/Unblock as per schedule or block port when system idle
 File Transfer logs from & to USB
6.3.2. Port Locker Startup

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 36


Block Port

To preserve system from unauthorized access, user can easily block all the ports includes
Infrared port, IEEE 1394 port, USB port, and Bluetooth port Network Adaptors port. Via Port
Locker software

White listing of Authorized USB devices


An extraordinary inbuilt feature in Protegent that includes ID hardware device which evolves
the White listing the authorized USB

USB Read Only Feature


This unique and smart feature that evolve USB read only setting to white listed and non white
listed USB mass storage devices access with ease.

Block/Unblock Single/All Ports

Expedite and cannot be expedite the Multiple or single port in one shot

Block /Unblock as per schedule or block port when system idle


Blocked the Multiple or Single ports as per the defined schedule. Ease to blocked the port at
idle state The port can be expedite which is limited to authorized user via password.

File Transfer logs from & to USB


Displays the reports of transferred files with respect to USB device from one destination to
another and vice –versa. Also displays the additive, ablated, rename and modified files.
E-mail Filtering
Displays the outgoing mails filtered and blocked on the user machine. The email filtering
includes the details as attachment size, subject and content of body data & time when the
mail was blocked, receiver's email address (To, cc, Bcc), attachment name.

Block CD/DVD
By enhancing the feature to block CD/DVD ROM port emphasis to block ablaze /inbuilt
CD/DVD ROM. No additive feature includes write or read can built up in this way.

Block Printer

Via Block printer option, user can reserve the LPT port of the Printer. Invalid to print
the command once the Printer is blocked.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 37


Port Locker - Reporting: -----
All alerts and logs can be viewed here.

Port Locker –Alerts

Alert message comes whenever someone tries to use the blocked ports on the system. Once it is
viewed it gets removed from alert and moves to Port reports. To email, print or other options
click on Open as HTML
The alert window helps users to find out if any one used the Locked Ports recently.

Port Locker - Port Reports

To view current port lock status Using Port Reports, users can have complete log related to
all Permanent Blocked, Schedule Blocked or Un-Blocked Ports, Users may view report for
the desired port for particular information type in the selected date range.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 38


Port Locker –File Transfer Log:

To check all activities related to USB File Transfer. Using File Transfer Log, users can have
complete log related to all files transferred to and from USB storage device like Pen drives, USB
hard Disk etc. It will generate the log when data will be transferred from one USB storage device
to another and from USB storage device to computer.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 39


Port Locker –Email Filtering Log
To check the log related to Email Filtering.
Using Email filtering log, users can view the reports of all the Emails blocked. It will show
the details of the blocked Emails like Date, To, CC, BCC, Subject, Attachment Name,
Attachment size and Body. Report can also be viewed in the HTML format by clicking on
Open as HTML button.

To view the report of a particular date, click on Select Date, select the date range and
click on View button.

Port Locker –Activity Log


To check the log related to activities performed on the system i.e. blocking and
unblocking of the ports. Active log displays each action performed by the system like
changing of the setting of port locker, blocking and unblocking of ports and setting
scheduler.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 40


Port Locker –Configuration
Select Configuration button from the toolbar.
Configuration section will help users to set & manage port locker settings. It includes:
  Port Settings 
  Device Permissions 
  File Transfer Log 
  Email Filtering Log 
 General Settings 

 Log size
 Notification
 Managed Setting

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 41


Port Settings

Select Port Settings from Configuration option:


By default USB port is scheduled blocked for 5min.

How to Lock the Ports?

Select the ports to be locked. If users want to lock all the ports at a time, select all ports
option otherwise select the selected ports.
Select the Lock type to lock the Port. And click Apply button. A confirmation screen will
follow:

Different Lock Types


•Permanent Blocked:
Permanent Block, to lock certain ports permanently and then Click Apply button
•Schedule Blocked:
Specific or scheduled time to lock your ports, select Schedule
Blocked option: Then Schedule Setting is divided into two
parts:

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 42


•Lock System when idle.
•Select Duration

Lock System when Idle

Lock when system is idle and 'Set the idle time'. This will enable the software to lock
your ports after certain point of time if your computer remains idle or untouched.

Click Apply to store the applied settings.

Note: After the completion of idle time it will ask for the password to unblock the port.

Select Duration:

Select duration option, "select from time and then to time". Click add button to add
the selected time. Users can select multiple schedule time to lock the ports.

In the Above figure, the ports will be lock from 4: 15:25 PM to 4: 18:25 PM. and all the ports
will be un- Blocked from 4: 15:25 PM.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 43


Un-Blocked Option:

To unlock the Ports, select Unblocked Lock type. And click Apply.

On adding the schedules settings, the dialogue box displays “Scheduler settings successfully”.

Device Permission

Using Device Permissions option in General Settings users can unlock


authorized USB Flash drives and pen drive even if the USB Port is permanently
blocked. User can also assign USB Read-only setting to white listed and non-
white listed USB mass storage devices.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 44


1. Insert a USB Drive which has to be included in the White List.
2. Select USB White List.
3. Click enumerate this will give device description and with that user can provide the
name of the USB pen drive.
4. Then Click on Add to add the enumerated device.
5. Check USB Read-only, to assign the setting of read only to USB mass storage device.
6. To block print screen the user must check Block Print Screen option.
7. And then click Apply to apply the settings.

File Transfer Log

When user selects File Transfer Log from Configuration option, following window will appear:

Click on Enable File Transfer Log to enable the setting options.

There are two setting options:

1. All Extensions
2. Selected Extensions

All Extensions

By selecting All Extensions, File transfer log will generate the reports of all type of file
extensions.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 45


Selected Extensions

By selecting Selected Extensions, File transfer log will generate the reports of
only selected file extensions.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 46


1. Click on Selected Extensions; enter the extensions in Extension Type.
2. Click on Add button to add the settings in the list.
3. Select any setting and click on Remove button to remove the setting.
4. When you click on Apply button, following message will pop up to confirm that
the setting has been applied.

Email Filtering Log

When user selects Email Filtering Log from Configuration option, following window
will appear: Click on Enable Email Filtering to activate the setting options.
There are two setting options:

1. Enable Attachment
2. Enable Body

Enable Attachment

Enable Attachment allows administrator to filter and block the outgoing Emails with
attachments. Administrator can make the settings to filter and block attachments with all
kind of file extensions or certain type of extensions send by the clients through MS
Outlook.

There are two setting options:

1. All Extensions
2. Selected Extensions

All Extensions

By selecting All Extensions, the Emails which have any type of file extension
(for e.g. .exe, .doc, wmv will be blocked.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 47


Selected Extensions

Selected Extensions is positioned to block Emails with certain types of file attachments. This
feature insures
Important files, such as “*.exe”, organization“*.doc”, “*.xls” etc.
Emailss. Administrators can add or delete file Extension types in order to
fine-tune the filter. Emails can also be filtered and blocked according to
the size of the attachments.

1. Click on Selected Extensions; enter the extensions in Extension Type.


2. Click on Add button to add the settings in the list.
3. Select any setting and click on Remove button to remove the setting.
4. Click on Size and define the size of the attachments. Emails which contain the
attachment which exceeds the set size will be blocked.
5. When you click on Apply button, following message will pop up.

Click on OK button, to confirm the settings.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 48


Enable Body

The Enable Body setting gives administrators the ability to block outgoing Emails based on
words or phrases found in the message body. It also allows filtering according to size of the
message body.

1. Click on Enable Body and then click on Enable Body Text.


2. Enter the word or Phrase in the text box and Click on Add button to add the settings in the
list.
3. Select any setting and click on Remove button to remove the setting.
4. Click on Size and define the size of the Email body. Email's body which exceeds the set size
will be blocked.
5. When you click on Apply button, following message will pop up.

Port Locker - General Settings


Options in General Settings:
 General Settings 
 Log size
 Notification
 Managed Setting

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 49


General setting - Log Size

Click Log size from General Settings, following screen appears:

In this Section, users can select the size of the Log Files and can enable software to delete
the Log Files after certain point of time.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 50


1. Select the time interval in which you want to receive the reports (daily, weekly or
monthly).
2. Select the type of report (incremental or complete).
3. Then check Email, if you want to send the report through email. Fill Sender address,
password of sender's Email address, SMTP Server and Recipient address field.
4. Then check FTP, if you want to upload the Lock report to your website. Fill FTP Server
name, User name, Password field.
5. Check All Reports to get the report of Activity log, File Transfer Log and Email Filtering
Log. You can also select the individual report.

General setting - Manage Settings


Using Manage setting option, user can save, load and reset the setting.

1. Using Save button, users can save the changes in one file (.save file). This file will include
whole changed settings.
2. Using Load button, users can load the saved changes or settings that are applied before and
have been replaced after saving the .save file by some other settings.
3. Using Reset button users can reset the default settings.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 51


7. COMPANY OVERVIEW
Unistal Systems Pvt. Ltd. is the Data Care Industry's largest, most experienced and
technologically advanced provider of data recovery products and services. In case
of any kind of data loss on any type of computer storage media, Unistal has a
solution with fast, advanced and cost-effective products and services - ranging
from do-it-yourself software products, data loss prevention solutions to 24/7/365
services network. With nearly 19 years‟ experience performing successful data
recoveries, Unistal has served customers across the globe including Secret
services, government agencies, corporate houses, and numerous computer users.
Unistal has developed the industry's widest range of data recovery products and
services, providing desktop, laptop, server, email, and database and tape
recoveries for all media types and operating systems - anywhere, anytime.
Headquartered right in the heart of New Delhi has four offices and 14 service labs
strategically located across India.

Unistal's decade long experience in data recovery services has helped to


continuously evolve new methods of retrieving data, provide business continuity
solutions, disaster recovery solutions, data loss prevention and data recovery
software.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 52


8. FAQ’S

1. If we install “Unistal 3 in 1” than it slow down the speed of our system?


Ans: If all the system requirements are fulfilled then it will not slow down the
system if still it problem persist you need to reinstall the “Unistal 3 in 1” because it
is not installed properly.

2. Can we install “Unistal 3 in 1” on windows 7 64-bit Service pack 1?


Ans: Yes we can install.

3. After how many days “Unistal 3 in 1” license will expire?


Ans: 370 days.

4. After how many days trial pack of “Unistal 3 in 1” will


expire? Ans: You can get the trail pack of 30 days.

5. Can we check information about license any time?


Ans: You can check the license status any time.

6. Can we install all components of “Unistal 3 in 1” simultaneously?


Ans: You can install the entire component in one go.

7. Can we install any specific component of “Unistal 3 in


1”? Ans: Yes, you can install the specific component.
8. Can we change the password of “Unistal 3 in 1”?
Ans: Yes, you can change the password of “Unistal 3 in 1”.

9. Can we configure setting of “Unistal 3 in 1” at the time of


installation? Ans: Yes, you can configure the settings of “Unistal 3 in 1”.

10. How many components are available in “Unistal 3 in


1”? Ans: Three components are there in “Unistal 3 in 1”.

11. Can we renew license of “Unistal 3 in 1” after


expiry? Ans: yes.
12. Unistal 3 in 1” pop up any message before expiry? Ans: yes.
Ans: yes
13. Before how many days “Unistal 3 in 1” warns about
expiry? Ans: 10 days
14. If our system goes slow after installation of “Unistal 3 in 1” than what should we
do?

Ans: First we need to check the system requirements, which should be fulfilled.
Then we need to check for the software if any conflicting software is there in the
System or not. (Make sure no conflicting software should be there). We need to run a
deep scan of the system (there might be some viruses in the system) If everything is
proper then we need to uninstall and reinstall the software again.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 53


15. Can we convert “Unistal 3 in 1” from trial to retail?
Ans: Yes we can convert the trail pack to retail product by using Activation key.
16. Can we uninstall any single component of “Unistal 3 in
1”? Ans: Yes we can uninstall the single component.
17. Unistal 3 in 1” has any default setting?
Ans: Yes there are few default settings for every component.
18. Do you provide technical support?
Ans: Yes. After your purchase you will receive a premium software product with
step-by-step instructions. In the extremely rare case of a problem, our support team
will give you step-by-step instructions to correct your issue. 100% Guaranteed.
19. If I want to monitor more than one computer, do I need to buy another license?
Ans: An individual license is required for every computer that you wish to monitor.
20. Can we install the “Unistal 3 in 1” in Windows XP 64-bit?
Ans: “Unistal 3 in 1” will not work on Windows XP 64-bit.

The maturation of an organization confidential is data. The purely extraordinary feature inbuilt in
Protegent is purely from security purposes. The device is limited to reduce the risk of data
leakage and data theft by locking and blocking the port of your computer. User can enable or
disable port.
Locker feature as per the requirement. Leakage of data USB ports via pen drives, memory cards,
Flash drives DVD/CD writers, PCMCIA ports, Ethernet Ports, Printer Ports and Infrared Ports.
Preserving your gadget from unauthorized access the module enables the users to lock port with
Distinct variety of lock options including permanent, specified time period or the system is on
idle or untouched. Some unauthorized action includes locking and blocking the ports, alters in
settings, setting scheduler etc reproduce the automatic alert.

2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 54


2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 55
2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 56

S-ar putea să vă placă și