We receive many questions from customers. Here is the more frequently asked questions we receive on a daily basis.
Network Enforcer - Frequent Questions
- What Windows versions is Network Enforcer compatible with?
Windows NT, 2000, 2003, XP, and Vista 32 bit and 64 bit versions.
- Do I need to install any software on the computers I want to use Network Enforcer on?
Yes - Network Enforcer uses an invisible client service that you can remotely install onto each computer on your network. The client supervises and reacts to user behaviors, as configured.
- Can Network Enforcer's client be remotely installed, invisibly, to computers on my network?
Yes, Network Enforcer has a built in remote install feature that allows you to install the client on each computer on you network - as long as you have an administrative login for each computer.
- How can I make adding a large network of computers to Network Enforcer easier?
Click on "Add Computer" then "Enumerate Network Computers". From there you can have all computers on your network listed. Just click on each computer you want to add, then click "Add". You will be given the Add Computer wizard for each computer you selected. From there you can select all the computers in the list and import previously exported settings, perform remote installs, etc.
- Will users know Network Enforcer is running on their computer?
No - the client runs invisibly, does not appear in the Windows task manager, and does not have a user interface that can be interacted with.
- I added some computer's to my computer list, where do I go from here?
Please refer to our Getting Started guide for using Network Enforcer.
- What behaviors can Network Enforcer alert me about, and react to?
Network Enforcer can alert you, and react to specific behaviors of the following:
Keystroke phrases typed
Websites visited
Applications and Programs executed
Chat client usage
Internet connection activity
Email activity
Windows interacted with
File and document usage
- Can Network Enforcer create various reports about behavior/activity filters users violate?
Yes, Network Enforcer has a handful of very useful reports ranging from brief overview summaries, to detailed breakdowns of behavior filter violations by security level.
- Can I classify behavior/activity filters to be more important/critical than others?
Absolutely. Network Enforcer allows filters to be classified as LOW, MEDIUM, or HIGH security. Each network security level has a threshold you can configure for each computer that allows Network Enforcer to only respond to filter violations for each security level when they reach a set threshold. For example, you can configure Network Enforcer to alert you after 10 Low security filters have been violated, or after only a single High security filter has been violated.
- Can I respond to filter violations directly with the Network Enforcer software?
Yes, one of the responses that the Network Enforcer client can take is to alert you in real time via the Network Enforcer management program. When you receive an alert you can use the various remote administration commands (shutdown, lock computer, reboot, view desktop, send message, etc.) that Network Enforcer allows you to perform on the target computer.
- Can Network Enforcer protect databases from being accessed on the network?
If your setup requires software to access the network, Network Enforcer can easily record what the employee does with that software or will freeze the employee computer depending on your network security preferences.
You can also tell Network Enforcer to monitor files on the network and if they are accessed, it will record and take immediate action.
|
|
|
|
|
Below, you'll find all of our Network Enforcer resources.
Network Enforcer
Network Enforcer Features
Network Supervision
Employee Restriction
Respond to Security Alerts
Network Usage Reports
Purchase Network Enforcer
Related Navigation
Network Enforcer Explained
Network Security Benefits
Enforcer Problem Solving
How Enforcer Works
Network Enforcer Uses
Buy Network Enforcer
Help Documentation
Support Center
Network Enforcer FAQ's
Ordering Questions
Licensing Questions
Enforcer Used As
Network Security Software
Intellectual Property
Network Behavior Analysis
Employee Supervising
Network Behavior Controls
Enterprise Network Security
Network Activity Logging
User Testimonials
"Hi Scott. Thanks for all of your support. I wanted to let you know I got Network Enforcer installed last week. Enforcer is powerful! I think we finally know who has been violating our employee policies and snooping around our network. I can't thank you enough! - George Hutcheson |