HOME >> Products

Desktop Resource Management DRM

Product Introduction

Desktop resource management is to provide enterprise-level users with comprehensive and efficient means of computer equipment management, control and control of changes in the IT environment within the enterprise, ensure the normal operation of computer equipment, greatly reduce maintenance costs, and help enterprise users manage computer equipment.

As an important part of Data Protection and Disaster Recovery Protection's comprehensive solution, the desktop resource management system can be combined with Data Protection Guard, Print Protection Management, Data Disaster Recovery Protection, and Documentation Disaster Recovery Protection to create a high-quality, user-friendly solution for users. A full range of safe, efficient information, interactive office environment.

Desktop resource management diagram

● Control level:

Eliminating non-permissible behaviors of employees, such as work time processing tasks; control and control of sensitive information operations, such as copying or transferring information to the outside of the enterprise through peripherals, performing operations that should not be performed on sensitive documents Wait;

Do not want employees to leak internal data to the outside through mobile disk copying, burning, printing, and illegal dial-up outreach;

For specific types of sensitive information, its operation can be controlled;

● Management level:

Statistics the software and hardware information of the terminal so as to grasp the assets of the company or the unit and track the change of the assets;

In accordance with the unified planning, distribution and automatic installation of software and patches by enterprises or organizations;

Immediately send an announcement to inform the end-user of a certain type of message or work order, or the end-user sends an announcement to the administrator immediately to request a solution to a certain type of problem;

Manage the end user's desktop, master the terminal's running process and CPU, memory, and disk usage, thereby constraining their behavior;

View and control the terminal's accounts and shares to reduce the risk of information leakage.

█ Detailed function

[IM control]

● Outbound control of communication tools

Can support disabling communication chat tools, can support monitoring chat content such as QQ.

● IM file transfer control

Authorizes the client computer to send the permission of the document through the chat tool. The computer without the permission can not send the document through the chat tool to protect the leakage of the sensitive or confidential information of the enterprise. At the same time, the document can be backed up when the document is sent out, and the backup document can be viewed. You can learn whether there is important information leaked.

【Mail Management】

● Email management

Record the contents and attachments of the mail received through the POP3 and SMTP protocols, such as OUTLOOK, FoxMail, and other client software, and fully record the entire contents of the POP3/SMTP, EXCHANGE mail, including the recipient, sender, and mail header. , email body and attachment content.

● Email management

Record the mail content and attachments sent through the POP3 and SMTP protocols, such as OUTLOOK, FoxMail and other client software, and fully record the entire contents of the POP3/SMTP, EXCHANGE mail, including the recipient, sender, and mail header. , email body and attachment content.

● WEB mail management

Record the entire contents of the email sent via web-based webmail, including the recipient, sender, email header, email body, and attachment content.

● Email decryption log audit

Record the file records that the terminal automatically decrypts through the white list of the e-mail.

● Email policy control

Supports restrictions on sending emails from different aspects, such as senders, recipients, subject, attachments, etc., to prevent emails from being sent to untrusted mailboxes, thereby effectively preventing the leakage of critical or sensitive documents and information through emails. .

[browser control]

● Web browsing history

You can view and count the pages viewed by an employee by time, computer (group)/user (group), browsing site details.

● Website Control

It can limit the website access of client computers, disable access to websites that are irrelevant to work, standardize the behavior during working hours, improve work efficiency, and at the same time avoid potential security risks caused by visiting malicious websites.

【Network Management】

● Network Management

Support restricts the client computer's ability to use the network by setting the communication direction, IP address range, local port range, and target port range.

● Network access statistics

Detailed record of the web address, number of times, visit time of each site visited by employees, statistics of the total time spent browsing each site or each type of site, displaying the top ten or top twenty visited websites, etc., and visualizing in the form of a bar graph Show results.

● Flow control

You can limit the traffic of the client program. You can specify the name and traffic direction to limit the client's traffic.

【Screen Control】

● Management rules

For screen management of designated authorized client computer screens, the screen history screen of each client computer according to date can be recorded according to the date; at the same time, the screen information at the time can also be viewed in combination with the log. The screen history screen can also be saved as a video format for playing with common players.

● File control

When the user operates a document, the client records the document's operation actions, the path of the document, the disk on which the document operation is located, and the application program used for the document operation.

● Application control

When the user opens the application or closes the application, or switches the application window, the client records it and sends the data to the server periodically.

● System event control

When the client starts/stops, the user logs in/logs off, and when the uninstall software is installed, the client logs and sends the data to the server periodically.

● Print control

Full and detailed record of all the client computer's print information, by viewing the print log to understand whether the company's print resources are wasted. The recorded contents include the time of printing, computer, user, color, paper, printer name, document title, number of printed pages and other information.

● Real-time screen management

Support real-time viewing of the client's screen, support screen management for a group of computers, and can adapt to multi-display working environment. You can see that the employees in the network are operating the latest screens of the computer to facilitate managers to conduct network behavior inspections, identify violations, and promptly correct them.

● History screen management

Query the screen history on the computer on which the client is installed. The system does not record the screen history by default. You can adjust the screen snapshot frequency by setting the time interval.

● Multi-screen control

Support for multi-screen monitoring, managers can centrally monitor the computer operations of multiple employees at the same time.

● Mobile storage management

Displays the specified removable storage device usage log on the authorized client computer. The log contains the computer name, time, operation, type, removable storage ID, removable storage information, description, and so on.

[Application Control]

● Application rules

The ability to limit the application permission of the client computer to the program can be achieved either by limiting the process name, or by classifying the application program, selecting the program to be prohibited from the category list, and achieving the limitation for games, stock trading software, etc. Use, regulate the behavior during the work time, improve the purpose of work efficiency.

● Application configuration

Application software classification management: user-defined application software classification, for the system built-in application software can not be directly modified, but can be copied for the new software to modify.

Application software process configuration: The user can define the process space of the application software and define the process's encryption extension information.

● Application control

Limit the user's permission to use the specified application to prevent the program running with security risks from running.

Supports classification and control of applications.

● Application Distribution Management

Automatic enough for large-scale software deployment and installation, you can also copy files or applications to the client computer, support for breakpoints in the transmission process, the installation allows installation through the background or interactive installation of two ways.

● Application statistics

Information displayed on the authorized client computer that the application is accessed, including information such as application, number of times, total time, and time, and statistics histogram display.

【remote control】

● Send notification

When it is necessary to notify workstation users of certain information or to issue certain commands, you can select the corresponding computer or group (if it is a group, send a message to all computers in the group), select Send notification, enter the message in the dialog box Press the send button to notify the target computer.

● Remote logout

Log off the client computer.

● Remote restart

Restart the client computer.

● Remote shutdown

Shut down the client computer.

● Remote assistance

Client computers can be remotely controlled to facilitate administrators to remotely control computers in the network.

● Uninstall the client

The client that sends the command to uninstall the monitoring computer can be directed to a computer (group) or user (group) in the network.

【system maintenance】

● Information maintenance

Statistics the basic information of the computer on which the client is installed, including the operating system, physical memory, computer name, network address, and current status.

● Hardware Management

Displays the information in the computer device manager where the client is installed.

● Process Management

Displays all running processes on the computer where the client is installed. You can directly end or refresh the process on the client.

● Network status

Display the status of the network connection of the computer running the installation client and audit the network connection of the client computer in the network. You can directly end the process of running the program on the client. You can display the process including the running program, the source IP address, and the destination IP address. , connection port and other information.

● Software Management

Displays all programs installed on the computer where the client is installed, including installed software, system security updates, and so on.

● System service

Displays the list of services on the computer where the client is installed. You can manually start or stop a service.

● Startup project

Displays the computer-launched project on which the client is installed, and can manually delete an item.

● System users

Display the list of users on the computer where the client is installed, and manually delete the user on the client computer.

● Shared directory

Display all shared file names and paths on the computer on which the client is installed. You can directly stop the shared files on the client.

[Log and alarm]

● System log

Displays the console software on the authorized client computer, including type, user name, IP address, time, and content.

● Alarm rules

Provides alert notifications for file operations, website visits, applications, software changes, and hardware changes on specified authorized client computers.

● Alarm information

The operations on the file, website access, application program, hardware changes, and software changes in the alarm rule are triggered on the authorized client computer. The recorded information includes the computer, category, operation, description, and time.

【asset Management】

● Asset Management

Displays software assets on authorized client computers, including computers, software, and more.

● Patch management

Scan and check the installation status of Microsoft's patches on computers and focus on downloading the latest patches and distributing them to various computers for installation to prevent system threats.

● Software uninstall

Supports the forced and batch uninstallation of software, and supports setting the task execution time period.

[Risk Audit Report]

● Terminal behavior record statistics report

Record the copy and paste logs between the terminals' processes.

The various logs of the terminal operation behavior are displayed in reports and are recorded in units of months.

● Terminal version/type statistics

The current status of terminal security software upgrades and distributions are displayed through histograms.

The current mobile terminal type is displayed by histogram.

● Terminal online/lost rate

The pie chart shows the current end-user's online rate.

The current mobile terminal usage rate and loss rate are shown by a pie chart.

● Number of files by folder type

Use the histogram from high to low to indicate the number of different file types.

● Number of files by file extension

Use the histogram from high to low to indicate the number of different file types.

● According to the dense attribute statistics file number

Use the histogram from high to low to indicate the number of different dense files.

● By upload file number top10

Use the histogram high to low to indicate the top 10 most uploaded files.

● According to the number of downloaded files top10

Use the histogram from high to low to indicate the top 10 most downloaded files.

● Browse by file number top10

Using the histogram from high to low means that the top 10 files are browsed.

● Trends in the number of documents in the past 30 days

Use a line chart to show how the number of files changes each day for the past 30 days.

█ Advantages

● Dual protection of online and offline strategies. Online and offline refer to whether the security terminal maintains the connection status with the desktop system security server. Through the security protection of the two policies, the control that the terminal is detached from the server can meet the security protection requirements.

● The log is detailed and clear. There are log records and warnings for terminal file operations, process usage, and instant messaging. They are recorded on demand, organized by category, and are accurate and informative.

● Full-featured and centralized, flexible and easy to operate. The various functions of this system cover the main aspects of desktop management.

█ Target value

● Sensitive information won't go away. The system provides peripheral management functions. By controlling the use of terminal peripherals, end users can not copy or transmit sensitive information outside the enterprise or the unit under unauthorized conditions.

● Sensitive information cannot be understood. The system transparently adds and decrypts sensitive information, enabling unauthorized users to read without taking sensitive information.

● Strong auditing of file operations. The system provides a file control function, through the strict audit of the operation of sensitive documents, to achieve the user's illegal operation after the investigation;

● User behavior can be monitored. In terms of management, the system provides remote terminal management functions that enable administrators to manage the running applications, desktop conditions, memory, and hard disk usage in real time. If a user's behavior does not meet the requirements of the company or organization, it can be terminated or real-time forensics by locking or taking screenshots. In terms of control, the system provides process control functions to control whether the user is allowed to run a program. This function can regulate user's behavior on the one hand, improve the work efficiency of the staff effectively, on the other hand also guarantee the stability of the terminal, prevent the attack of the virus.

● Measurable terminal assets. The administrator can count the software and hardware assets of the terminal, and can track the changes to prevent the loss of the company's or unit's assets.

● Data distribution can be automated. Administrators can distribute documents, software, or patches to terminals and choose to store, install, or execute based on their nature.

● Information interaction can be immediate. The exchange of information between administrators and end users is used for the publication and feedback of announcements within companies or organizations.


Copyright(C)2018, Zero Information Technology (Shanghai) Co., Ltd. All Rights Reserved. Supported by Toocle Copyright Notice 备案字号:沪ICP备18008633号