Monitoring

View Monitoring enables creating and managing monitoring configuration templates for computers. An administrator can define any number of profiles and assign them to devices. Based on these profiles, data is collected regarding device performance, print history, user activity monitoring, and many other parameters.

circle-exclamation

Monitoring settings view

The view presents a list of created templates as tiles that contain the following information:

  • Profile name – A unique name for the monitoring configuration.

  • Creation date – Information about the date the profile was added.

  • Last edited/By Date of last edit and the user who edited it.

  • Action buttons:

    • Edit – Opens the configuration side menu.

    • Duplicate – Creates a copy of the existing profile.

    • Delete – Permanently deletes the profile.

Monitoring profile configuration

List of available options

During configuration, the administrator can select the following monitoring elements:

  • Services

  • Printing

  • Event logs

  • Network

  • User activity

  • Task scheduler

  • E-mail

  • Performance

  • RDP sessions

Each option has a checkbox fieldthat enables or disables monitoring. For more complex elements, an icon is available gear leading to Advanced settings.

Details of individual option configurations

Services

Simple monitoring of Windows services, allowing them to be stopped, restarted, or started.

User activity

Records the activity of pointing devices - keyboard and mouse.

By default, the system monitors all started processes for user activity. It is possible to exclude selected processes, e.g., Chrome, from monitoring. If a process is excluded, the system will not record information about whether the user was active or inactive in it.

The system allows configuring the maximum user inactivity time. The default value is 60 seconds. This means that as long as the user does not exceed 60 seconds without using the keyboard or mouse, they are shown as active. After exceeding this time, the system marks them as inactive and records this in the logs.

This value can be adjusted freely in seconds; for example, setting 180 means 3 minutes of inactivity before marking the user as passive. This parameter is assigned per computer and applies to the user logged in there.

Printing

Monitoring of prints from physical devices and virtual printers, including saving to PDF via the print mechanism. The number of pages, color or mono mode, and document size are recorded. It is also possible to define printing costs - details are described in the Printing.

Here we define the monitored printers by name. The default value is *, which means monitoring all printers detected in the system. Specific names can be specified, e.g., Printer123.

The exclusion mechanism works analogously. If we do not want print-to-PDF operations to appear in monitoring, we can add, for example, *pdf*. However, note that this will exclude any printer containing the phrase “pdf” in its name, e.g., HPPDF123.

The safest approach is to specify the exact name visible in the system, e.g., “Print to PDF”.

Event logs

Monitoring Windows logs with the ability to select the type, kind, and number of recent events for analysis.

triangle-exclamation

Network

Monitoring of network traffic generated by selected processes.

There is the possibility to add or exclude specific processes from monitoring. If a process is excluded, the system will not record data sent or received by that process.

For example, to exclude the Chrome browser or Microsoft Teams, specify the process name, e.g., chrome.exe, ms-teams.exe or use a pattern, e.g., *chrome*.

Computer performance

Performance monitoring allows detailed analysis of system resources. The following parameters are available:

  • Available memory

    • Shows the amount of memory available to the system and new processes.

  • Used memory

    • Shows overall memory usage in the system, taking into account different allocation types such as physical memory or cached memory.

  • CPU usage

    • Illustrates overall processor load, taking into account all cores. Enables system performance analysis.

  • Disk utilization

    • Shows disk activity, including the number of read and write operations, and the time required to complete them.

  • Disk queue length

    • Shows the number of I/O operations waiting to be performed, which allows assessing disk load.

Task scheduler

Monitoring of the Windows system event scheduler.

E-mail

Monitoring of outgoing mail in desktop Outlook (recipient, user, subject, attachment, date). Advanced configuration such as blocking file sending in email via DLP is available in Data Protection.

RDP

Recording of remote desktop (RDP) sessions, including who and when connected, with which account, and the moment the session ended.

Summary

View "Monitoring settings" enables administrators to comprehensively manage device monitoring templates. Thanks to the wide range of available options and integration with Data Protection this feature allows tailoring monitoring to the organization’s specific needs, supporting optimization of device performance and data security.

Last updated

Was this helpful?