| The All Integrated Management
    Console 
 Here are some samples of the Real-Time Violation Monitor;- 
 The Real-Time Violation Monitor function is available as part of the
Management Console or via a separate stand alone program which is included with
your download. The most recent events are at the top of the screen. In this scenario, the Real-time data collector was started at
    19:22:41.a user called FRED using Jim's PC, made an outgoing request to www.blondes.com,
    and the request has been picked up, in the text coming back to the browser 37 seconds
    later is the word EXPENSIVE which was also picked up.
 At 19:23:55 the Real-time data collector was shut down, and displays its session
    statistics for you to see.
 As well as displaying the data in the Violation Monitor,
    this information is also recorded to the database and can be reported
    against. Quick View Users activity can be seen at a glance, sorted under 3 categories,
    UserName, Web Site and IP Address, the data is collated in a collapsible tree, just like
    explorer, and can be sorted into different orders using the radio buttons at the bottom of
    each screen:-  
 Here we can see FRED has visited 6 sites 13 times, and spent 220
    seconds viewing these sites, JOE has visited 1 site 4 times and spent 86 seconds viewing
    it, lets expand the tree:-  
 Here we can see the sites the users have visited, and the number of
    pages at each site that have been viewed, 1, 2, 2, 4, 2, 2 and 4 respectively, notice the
    number of times each site has been hit, and the number of seconds spent at each site, lets
    expand again:- 
 Here we can see the actual pages visited, how many times, and how
    long spent at each page on the site, and near the bottom you can see data that has been
    entered into a web search engine, "More+Non+Business+Related+Stuff" so you can
    even see what people are searching for as well as what they are looking at. OK, activity by site:- 
 Shows, web sites and the people that visited them, see how Fred used
    his own PC to visit the OK sites, but sneaked onto Jim's PC, to look at the naughty sites,
    Cyber Predator picked him up. The Activity by IP tab, this shows activity by IP address, people
    not using Microsoft Windows would use this tab to tie activity to a terminal, others
    can too. 
 Violations Each violation is logged as IC for incoming or OG for outgoing, the
    screen below shows the violation word, the direction, and the number of times (per user)
    this word has been detected. In the case of OG violations the system gives you the URL of
    the target site, for IC violations, you are shown a sample of data surrounding the
    violation word, so you can see what context that word was used in, sometimes some
    violation words can actually be OK in certain contexts:- 
 Sorted by Violation too, you can see all users that are associated
    with that word 
 Graphs There are 4 graphs, the first one shows top 10 users by # of unique
    sites, by hovering the mouse over a segment you get a detail box popping up, there are 20
    different types of graph you can choose from, we have selected some different ones here to
    show you some of them:- 
 By clicking the right mouse button over any graph will show you a
    menu, from here or the toolbar, you can choose different graph types, colour schemes,
    fonts, etc etc:- 
 This Graph shows you the user with most violation words:- 
 Top 10 sites, speaks for itself;- 
 The top 10 users graph, similar to the first graph, except this one
    shows time usage rather than number of sites visited, the sample below is a doughnut graph
    showing Fred with 220 seconds of usage out of a daily total of 306:- 
 Obviously this data is made up, and the web site names are
    fictitious, but hopefully this gives you a view of what Cyber Predator can do for you. |