Agent Configuration Policy

Agent configuration policy is considered as supplement to other policy settings and contains some commonly used agent control functions.

In SurveilStar Console, click menu 【Policies > Agent Configuration】, click Add button, select the target function from the keywords provided to create agent configuration policy. Please note that different functions have different properties, depending on the specific availability.

Agent configuration Agent configuration properties

Category

Keyword

Configuration description

Basic Setting Scheduled shutdown The configuration can specify a computer to shut down, hibernate, sleep, log off or restart at defined time.
Auto shutdown computer when idle The configuration specifies what the computer should do when its idle time reaches a setting value. By default, the agent will enter the idle state if without operation in three minutes.
Force all users logoff at defined time The configuration can specify a computer and force all its users logoff at defined time.
Disable USB disk auto play in win7 This configuration resolves the problem that when windows7 open the Shell Hardware Detection service, the inserted encrypted disk will be prompted formatted..
Attention: The configuration will take effect after the agent restarts.
Basic policy restoration The configuration can specify what status the agent should be restored after its basic policy is deleted. By default, it restores to allow.
UDP Broadcast The configuration is used to set whether the function that agents ask if other machines on the agent side is enable or not. By default, it is enabled.
Connection mode of the remote control The configuration can resolves the problem of the slow speed of remote control. It can shoose the connection mode of the remote control.
IE Protected Mode The configuration can set whether IE Protected Mode is enabled or not.
Attention: The configuration will take effect after the agent restarts.
Registry monitoring The configuration is used to choose whether to monitor the registry changes.
Running mode of the agent The configuration determines the mode agent runs as.
Attention: The configuration will take effect after the agent restarts.
Diagnostic of abnormal agent communication When other software limits the communication between agents and the server, this configuration will help. The agent will be considered as disconnected abnormally if the uploaded is less than a defined size (KB) in a specified interval. The functions of the agent will be switched to applying off-line policies.
Explorer auto-start after system started The configuration can prohibit explorer.exe runs along with the computer start-up.
Attention: The configuration will take effect after the agent restarts.
Prohibit modifying the startup settings The agent will have the corresponding change permissions to the start up item as the configuration sets.
Disable IPv6 Under window7, the network control does not take effect because of windows communicate with others by IPv6. We can use the configuration to disable IPv6 on the protected computer to make the network control work.
Attention: The configuration will take effect after the agent restarts.
Instant Message Logs Use CAC recording mode The configuration can help to record the fonts with color in IM which you have selected. It may has some influent to users such as when the chat window from minimize to normal will cause a process of highlight to restore, there may be a small area of blue.
White list of IM login accounts The configuration can set the white list of QQ or TM accounts and tips while loading. If setting more than one account, use "," to separate them. It has higher priority to blacklist.
IM login blacklist The configuration can set the black list of QQ or TM accounts and tips while loading. If setting more than one account, use "," to separate them.
The max. numbers of concurrent IM login It limits the number of QQ or TM accounts that allowed to login. The limit is take effect to users. It means when in terminal server, more than one user have logon and the setting limits value is two, each user can login at most two IM accounts.
Screen Snapshot Screen Snapshot display mode The configuration is used to resolves the problem that the history of screen snapshot occupy a lot of space. To set the color of screen recording can help to save space.
Screen capture mode The configuration is used to resolves the problem that the history of screen snapshot occupy a lot of space. To set the color of screen recording can help to save space.
Web Setting for Websites control The configuration can resolve the problem that when a website is belong to more than one classification, the Internet browser control will be incorrect.
Attention: The configuration will take effect after the agent restarts.
Upload/Download log function The configuration can filter the logs about upload and download.
Upload/Download control function The configuration can filter the logs about upload and download.
Application Indentification of BAT file The configuration can convert *.bat to cmd.exe to control.
Prohibits Closing specified program It can disable the specify programs of agent being closed.
Idle time settings If the keyboard and mouse is inactive in a period that match the setting value, the agent will come into idle time.
Email Webmail records filtering Agent will automatically filter the mail record with #upload# that meet specific criteria, and some not meet, you can filter it by this configuration.
Controls of email sending by Outlook The configuration can filter the control about mail sending.
Controls of email receiving by Outlook The configuration can filter the control about mail receiving.
Determination of the offline time of Outlook The time in seconds, which means that within the set time after Outlook from offline to online, unread messages received can be recorded.
Promiscuous mode The configuration specified whether the collection of data is limited to local machine.
Network Control Detected domain name of illegal Internet connection Client will fail to connect to the intranet and internet when it communicates with detected domain name of illegal Internet connection.This policy has precedence over the other conflicting network control policies.
Warning message of illegal Internet connection A warning message pops up when client communicates with detected domain name of illegal Internet connection.This policy will take effect after setting "detected domain name of illegal Internet connection".
Device Wireless network settings This configuration is used to limit the client's wireless network, when the client can search to the specified wireless network, you can only connect to this network, you can enter the wireless network name (SSID) or wireless LAN address (BSSID) to achieve.
Custom If the specified function is not yet included in the existing category keywords, you can select 【Custom】 in category, and enter name and description to creating agent configuration policies. Then input corresponding value in the <content> of the right of property bar.

Please note:
More details about keyword and content of agent configuration not yet included in the existing categories, please contact us: support@surveilstar.com.

Print Policy (Advanced) Back to Index Screen Snapshot Monitoring (Real-time)
Free Trial  Buy Now