Monitor User Activity Through Session Monitoring

If you want even more peace of mind that your users are not abusing their privileges or making unauthorized changes in your critical servers and to your sensitive data, then you can enable screen monitoring with LepideAuditor. It’s easy to add computers to be monitored. Either manually browse for them, add them by IP or add them through CSV file. Combine the real time alerts and pre-defined reports with video surveillance across your key IT infrastructure to help you improve security and meet compliance demands.

Thousands of Organizations All Over
the World Rely on LepideAuditor
to Secure Their Unstructured Data

Uninterrupted, Invisible User Monitoring

The solution will not be visible to the user during the monitoring process, so you can be confident that your employees will be entirely unaware of its installation or execution. LepideAuditor will automatically start monitoring activities the moment systems are started and will continue to monitor even if a user restarts the system. Session recording can also take place offline, allowing you to access recordings at your convenience.

Monitor Multiple Systems and Computers

With no limitations on the number of computers that can be monitored, the solution scales to any environment. All computers on which the agents are installed can be monitored from a single console. There are also no geographical limitations, allowing multi-national organizations to to monitor computers in different countries. Dual-screen monitoring also allows you to see what users are doing on second screens or floating devices such as laptops.

Take Action if You See Something You Don’t Like

Through the solution, you can re-start, turn off or completely shut down a computer on which you have seen unauthorized or unwanted activity taking place. Warning messages can be sent to the user in question before any further action is taken. You also have the option to periodically display custom pop-up message on all monitored computers.

Delegate Viewing Rights to Specific Users

The viewing aspect of the monitoring feature can be installed on any system you wish. The administrator can delegate monitoring rights for all computers or specific computers only to any specified user. You can also search for and download any video recordings for future reference.

Read all reviews

Read all stories

More from Lepide

Blog
A Quarter of NHS Trusts Have Zero Staff Who are Versed in Security

According to a Freedom of Information Request submitted by Redscan, approximately 25% of NHS trusts who responded to the request have zero qualified security personnel.

Learn More ->
Whitepaper
Popular Cyber Attack Methods and How to Mitigate Them

This White Paper will go through some of the most popular cyber-attack methods attackers are using and the steps you can take to mitigate the risks of you falling victim to them.

Learn More ->
News
LepideAuditor 18.7 - Analyze Your Excessive Permissions

The latest version of the award-winning LepideAuditor now enables you to analyze users and objects with excessive permissions to help you avoid privilege abuse.

Learn More ->

Lepide® is a registered trademark of Lepide Software Private Limited. © Copyright 2019 Lepide Software Private Limited. All trademarks acknowledged.