Protection Dashboard SummaryProtected computers dashboard including total successful, unreachable, failed and unknown document security status of computers and software activity management status. |
Scanning Monitor ViewScan monitoring view of all protected computers including currently installed document security protection on each computer and optional management and security capabilities. |
Document Security ReportsReal-time document security and configuration changes reports for currently installed protected computers administration management including exporting and printing capabilities. |
Automatic Actions CapabilitiesAutomatic actions options including windows execution command, email and SYSLOG message upon receiving specific event notification from protected computers. |
Automatic Export CapabilitiesAutomatic exporting capabilities for text files and windows SQL/Access ODBC database including protected computers document security and configuration changes events. |
Remote Control ViewerRemote control viewer option that enable document security management administration from remote sites including optional selection of administration permissions. |
Events Removal OptionsProvide automatic removal of document security and configuration changes events for management and administration of the collected events on network organization protected computers. |
Protected Documents FormatsProvide selectable documents formats including PDF, Word, Excel, Power Point, compressed and textual documents types that will be protected by the software. |
Quarantine Folder SelectionProvide optional quarantine folder that will be used for moving blocked protected documents upon discovery of restricted words or phrases on the protected computers. |
Client Notification MessageProvide automatic editable client notification message that will be displayed when restricted words or phrases are discovered in documents on the protected computers. |
Unstoppable Protection ServiceProvide optional unstoppable client document security service mode to prevent computer administrators from stopping the secured protection service and keep it running constantly. |
Auto Discovery ScanningAutomatic computers discovery and scanning options for active document security protection of network computers including domain, workgroup or IP addresses range. |
Multiple Redundant ServersProvide multiple redundant servers option for clients protection service installation on distributed environment including first available or first responsive server. |
Server Administration PermissionsProvide optional server administration permissions that enable to create and control the management operations that will be available for specific system administrators. |