Вы находитесь на странице: 1из 57

Securus Software Ltd

Securus NG Administration and User Guide


For Technical Support, Questions or Queries please contact: Tel: 01932 251910

Email: support@securus-software.com

All rights reserved. This product and related documentation are protected by copyright and are distributed under licenses restricting their use, copying, distribution and recompilation. No part of this product or related documentation may be reproduced in any form by any means without prior written authorisation of Securus Software Ltd.

November 09

Table of Contents
1. Introduction................................................................................................................................................ 4 1.1 Why are you reading this manual?........................................................................................................... 4 1.2 Who are we? ............................................................................................................................................ 4 1.3 What is Securus? ...................................................................................................................................... 4 2. 3. Quick Start Guide ....................................................................................................................................... 6 Organisational Setup ................................................................................................................................ 10 2.1 Login .......................................................................................................................................................10 2.2 Navigation Panel.....................................................................................................................................12 2.3 Properties Panel .....................................................................................................................................16 General Tab ..............................................................................................................................................16 Monitoring Tab ......................................................................................................................................... 16 Web Tab ...................................................................................................................................................17 Alerts Tab..................................................................................................................................................17 Library Tab ................................................................................................................................................18 AUP Tab ....................................................................................................................................................18 Access Tab ................................................................................................................................................19 LDAP Synchronization (Active Directory) .................................................................................................19 2.4 Content Panel .......................................................................................................................................21 Pie Charts..................................................................................................................................................21 Summary ..................................................................................................................................................21 Trend Charts .............................................................................................................................................22 New Captures ........................................................................................................................................... 22 System Menu............................................................................................................................................ 22 Administration Menu ...............................................................................................................................31 Web Control Menu ...................................................................................................................................34 Capture Reports menu .............................................................................................................................35 Page 2 of 57

Web Reports Menu ..................................................................................................................................36 4. Reports .....................................................................................................................................................37 3.1 Reporting Tools ......................................................................................................................................37 Quick Searching ........................................................................................................................................ 37 Viewing Captures......................................................................................................................................37 3.2 Capture Reports ..................................................................................................................................... 39 Unviewed Captures ..................................................................................................................................40 Viewed Captures ......................................................................................................................................42 Saved Captures ......................................................................................................................................... 42 Ignored Captures ......................................................................................................................................42 Archived Captures ....................................................................................................................................42 Keyboard Captures ...................................................................................................................................42 Top lists.....................................................................................................................................................42 3.3 Web Reports ...........................................................................................................................................43 Web Log....................................................................................................................................................43 Web Log by User.......................................................................................................................................43 Top Web Pages .........................................................................................................................................43 Top Web Users .........................................................................................................................................44 3.4 User Defined Reports .............................................................................................................................44 Create a user defined report ....................................................................................................................44 Run a user defined report ........................................................................................................................47 3.4 Scheduled Reports.................................................................................................................................. 48 Export format ........................................................................................................................................... 48 3.5 Audit .......................................................................................................................................................48 3.6 Alert Triggers ..........................................................................................................................................50 5. 6. Server Upgrade .........................................................................................................................................54 Data storage configuration.......................................................................................................................56

Page 3 of 57

1. Introduction
1.1 Why are you reading this manual?
If youre for looking for help with an installed and running version of Securus, then youve come to the right place. If not, then we recommend the Securus Installation and Setup Guide as our first choice in rendering you assistance. With this manual we endeavour to help you make the best possible use of your Securus installation. The Administration and User Guide covers navigational setup, fine tuning via the use of groups, and reporting.

1.2 Who are we?


Securus Software develops e-safety software for schools. Were dedicated to protecting children through the use of technology. Being a wholly owned British company we are proud of our reputation as the leading supplier of e-safety solutions. We focus on understanding the issues as well as creating technology that works.

Working in education
Primarily recognised in the education sector, we've been working with schools, local authorities and Grids for Learning since 2003. Currently, we support more than 1,000 primary and secondary schools with well over 1 million children being protected by our solution. We also work with Children's Services departments, helping to protect vulnerable children in their care such as looked after children.

E-safety expertise
With a strong reputation in child protection, we advise organisations on the need for ICT protection, e-safety policies and the use of technology. We contribute regularly to seminars, conferences and press articles on e-safety, helping to raise awareness of how technology can be used to identify abuse and keep children safe.

Based in the UK
Securus Software is registered in England (No: 4613837). Our monitoring software is wholly owned, developed and supported by us. We are a British software development company and are proud of the fact that all our staff our based here in the UK.

1.3 What is Securus?


Latin; safe, secure, free from care, unconcerned, unworried, tranquil

Securus is an e-monitoring application designed to be used in enforcing the Acceptable Use Policy (AUP) governing the use of IT resources and access to external media such as the Internet. Securus monitors the screen display and triggers a capture if the content is a capture of the specified AUP. The appropriate person in the organisation is alerted so further action can be taken. This enables organisations, particularly educational establishments, to meet their e-safety obligations. Securus provides a variety of capture reports grouped by user, severity, capture libraries etc. It also monitors and logs web sites visited and enables the administrator to allow or block access to specified sites. The captured data is stored securely in a proprietary database on the tamper proof Securus server. If required, we can install Securus on your own choice of hardware upon special request for large centrally managed solutions.

E-Safety Concerns
The rapid development in Web 2.0 technology, Virtual Learning Environments (VLEs) and the emergence of proxy bypass sites has led to increasing concerns about cyber bullying, paedophile grooming and access to inappropriate material for many educational establishments. There is a need for these establishments to ensure that pupils can use Information Communications Technology (ICT) resources in a safe and secure environment and that all users adhere to the Acceptable Use Policy.

Page 4 of 57

Securus Solution
Securus solves this problem by monitoring for illegal and inappropriate activity involving bullying, paedophile grooming, racism, drugs, weapons, terrorism, gambling and abuse. The creation of specific capture categories enables better reporting of captures and consequently, better management and implementation of an appropriate e-safety strategy. Securus is a client server solution that plugs seamlessly into the host network. The client application runs on devices (usually PCs) connected to the network. It monitors the screen display for inappropriate content (text and images) and captures and uploads any captures of the AUP to the tamper proof Securus Server. Securus delivers very informative and powerful reports enabling inappropriate activities to be promptly and effective addressed by the appropriate staff.

Easy Installation & Configuration


Securus is delivered as a plug and play solution using proprietary hardware ready to connect to the network. The client applet is installed on each PC to be monitored by simply deploying and running the client installation program. Once installed each client will automatically update to a newer version if one becomes available on the Securus server. Securus can be deployed in a variety of ways depending on requirement. Some examples include; Locally hosted solution (e.g. Securus server in an individual school network) Centrally hosted solution (e.g. Securus server at a Local Authority (LA) or Grid level with schools having remote access over a Wide Area Network (WAN) to view and manage capture captures. Securus server hosted at secondary schools with primary schools remotely accessing the server over the WAN.

Page 5 of 57

2. Quick Start Guide


Please check the contents of the server box: 1 x Securus Server; 1 x CAT 5 UTP Network Cable; 1 x AC Power Cable and Adapter; 1 x This Guide; 1 x Installation CD If any of these items appear to be missing or for technical advice, please contact us: Email: Telephone: Fax: Post: support@securus-software.com +44 (0) 1932 251 910 +44 (0) 1932 255 481 Securus Software Ltd. Clarendon House 34 Molesey Road Hersham Surrey

KT12 4RQ
By the time you have completed this section, you will be able to: 1. 2. 3. 4. Install the Securus Server hardware Install a Securus Client Generate a test Violation View a test Violation

Bullet points indicate an action for you to perform. Diagrams are included to clarify important points. 1. Install Securus Server Hardware Your Securus Server is shipped fully configured. Connect the Securus Server box to the mains supply with the power adapter provided. Connect the network cable to the Securus Server and an available network access point on your LAN. Switch on the Securus Server using the power button. 2. Install Securus Client Software Install the Securus Client using the CD. Insert the CD into your CD Rom Drive and it will autorun the Setup.exe file. If it does not, browse to the CD drive and click on the setup.exe file. Follow the installation wizard by clicking the appropriate buttons. At the finish of the installation process, reboot the PC and then upon logon you will see an icon like this appear in the Windows System Tray: -

This indicates that the Securus Client software is now successfully installed on the client machine. It will start automatically each time you reboot. Hover over the Securus Icon with your mouse pointer. A yellow pop-up box will appear with the IP address of your Securus Server. Below is a diagrammatic interpretation of a Securus Server/Client installation with some example IP values:

Page 6 of 57

NOTE: The default IP address of your Securus Server is 192.168.0.58. You will need to change this 1 address to a static IP address of your choice. 3. Set server static IP address Type the following URL in your browser; https://192.168.0.58:10000 Login as follows; Username: scadmin Password: admin

The following screen will be displayed;

Change the IP address; Click Networking->Network Configuration->Network Interfaces

Use the Webmin utility to change IP address and other network settings.

Page 7 of 57

Click the Activated at Boot tab then click eth0. Select the static configuration radio button and set the desired IP address

Save the settings and exit

4. Generate a Capture Whenever a capture occurs on a computer protected by Securus, a snapshot of the entire screen is taken and sent to the Securus Server for later interpretation. Captures are generated by text appearing on the screen or through keyboard input. Two ways to generate a capture are: Open notepad and type in an offensive word or phrase Open your web browser and connect to an offensive web site

The out-of-the-box configuration of the Securus system means that there will be no visible sign of a capture having occurred, however a screenshot has been stored on the Securus Server.

5. Viewing the Capture Your Securus server can be administered from a web browser on any machine on your network as follows; Open the web browser and in the Address box type the IP address of your Securus Server that you noted earlier using the format https://192.168.0.2:8081. E.g. in the next diagram a PC at 10.0.3.23 is being used for administration. This is on another subnet (separated from the Securus server by a router) to demonstrate flexibility. 2 If you receive an error at this point, see footnote below.

If you use a proxy server on your network, you must add the Securus Servers IP address into the Exceptions box on any machine you use to administer your Securus Server. In Internet Explorer go to Tools\Internet Options\Connections\LAN Settings\Advanced and add the IP address of the Securus Server to the Exceptions box, making sure to separate it from any other entries by a semi-colon.

Page 8 of 57

A logon box will appear. Type in the User Name Admin and the initial password admin The Securus Server Administration Console will appear. To quickly view the violation that you have just created Select the New Captures tab on the Home screen Double-click on any listed capture to view the capture

The panels on the home screen are all described in the online help that is available by clicking on the Help hyperlink whenever you see this on a page. Congratulations! You have installed and tested your Securus Solution.

Page 9 of 57

3. Organisational Setup
2.1 Login
Enter Securus by logging in. Type in your login and password in the fields provided and press Login. Note: The default login is admin. The default password is admin.

Home Screen
Upon successfully logging in for the first time as an administrator, the Securus Home screen appears. The Home screen shows pie charts indicating recent activity.

If youre just starting out with Securus, pay attention first of all to the location of Home, and Classic View on the thin banner across the top of the Content Panel. If you ever get stuck, lost or confused, these buttons will bring you to a more familiar place.

To the left of Home is the

button. This opens and closes the panels on the left side of the screen.

Page 10 of 57

Logging out and your current Login can be found on the thin banner across the top, opposite Home and Back. On the Home screen one sees two large pie charts. The left hand chart shows a breakdown of captures by severity for the selected period. A traffic light colour scheme has been adopted to provide a visual indication of the severity of captures.The default period is the current day.The right hand chart shows a breakdown of captures by category for the selected left hand pie.

Changing time frames


Above the pie charts is a bar that allows you to change the time period of the charts. To change the period, open the pull down menu on the left or click on the calendars in order to set a custom time frame. Note: The Current Day view is updated every minute and will change as captures are logged.

See latest captures


You can see Securus latest captures regardless of category by clicking on View Captures right side of the Content panels menu bar. on the

Classic View
If youre familiar with Securus from older installations, the Classic View, with its columns of menus, will be very familiar.

Regardless of which view you use, there are three panels, namely Navigation, Properties and Content. When on the Home screen, the Navigation panel does not have anything selected and the Properties panel is blank. The Content panel displays options for viewing alerts and web usage.

Page 11 of 57

2.2 Navigation Panel


The Navigation Panel streamlines your work with Securus. As it comes out of the box, Securus includes a basic organisation unit tree consisting of a Domain and one-each default User Group and Station Group. Securus, the Domain, is the main administrative point for the application. Click on it, and the main work area to the right changes to show a summary of activity.

2.2.1 Tree structure


The tree structure is vital for organising your work in the software. It contains six kinds of units:

Domain Organisational Unit

root - by default, contains a User Group and a Station Group contains groups, users and stations

User Group Station Group User Station

contains a set of users contains a set of stations someone logged into the system, no matter what station is used a computer tied into the system, no matter which user is using it

Adding a unit
Whether you want to give clarity to your structure or include a new user, you will probably need to add units to your navigation tree. Adding an Organisational Unit: Click the unit to which the new Organisational Unit will belong. Click the Add Org Unit icon near the top right of the Navigation Panel. In the box that appears, enter the name of the Organisational Unit and a description, if desired.

Page 12 of 57

Note: Organisational Units can be nested they can be elements of other Organisational Units. Adding a Station Group Station Groups are created under the Domain and Organisational Units. Click on the unit under which the Station Group will fall. Click on the Station Group icon. In the box that appears, enter the Station Group name and a description, if desired.

Note: Station Groups cannot be nested within each other. Adding a User Group Like Station Groups, User Groups are created under the domain and Organisational Units. Click on the unit under which the User Group will fall. Click on the Add User Group icon on the right side of the Navigation Panel. a. In the box that appears, enter the User Group name and a description, if desired.

Note: User Groups cannot be nested within each other. Adding a User: In the Navigation Panel, click on the User Group that the new User will fall under. When the Content Panel changes to the view for that User Group, click the Create User icon on its left side. In the box that appears, enter the user name of the User, e-mail address, and first and last names.

Page 13 of 57

Adding a Station:

Click the relevant element of the tree structure When the Capture Panel displays the information for this screen, click on the View Stations icon on the top right, near Help. icon on the left above the list. The Stations list appears. Click the Add station

In the New Station box that appears, add the Station name, IP address and Domain. Note that the Station name and IP address fields must be entered.

Note: Stations can only be added by the server as connections are established.

Deleting a unit
Select the unit to be deleted by clicking on it Click the on the top right of the Navigation Panel When the dialog box appears, choose yes to delete, or no to cancel

Page 14 of 57

Note: when a unit is deleted, all child units involved will be deleted as well. Deleting a User: In the Navigation Panel, click on the User Group that the User belongs to. When the Content Panel changes to the view for that User Group, select the User Click the delete icon to delete the user

CAUTION: Captures associated with this user will now be associated with the User Group or parent organizational unit (if the user group is deleted).

Renaming a unit
You do not need to keep the default names of the default Securus navigation units. Also, the units you create can be renamed to reflect changes in your organisation. Select the unit to be renamed by clicking on it in the Navigation Panel In the Properties Panel, double-click on the name to be changed

Enter the new name Click Save in the line along the top of the Properties Panel

Note: Changes to a name will be reflected in the system only after logging out and logging back in.

Page 15 of 57

2.3 Properties Panel


The Properties panel displays the properties of the currently selected item. This item may be an organisation unit or a selected capture being viewed. Most properties are editable while others are read only. NOTE: Properties are defined for the selected organisational unit and are inherited by the child organisational units, user groups and station groups there under unless exceptions to this rule are applied by using alternative property settings at the child level.

The Properties panel is used to set up the operational parameters and monitoring of users belonging to the selected organisational unit.

General Tab
The general tab contains descriptive information for the selected organisational unit. All entries in this tab are editable.

Monitoring Tab
The monitoring tab contains settings that define the monitoring behaviour for the client. The following parameters are listed;

Parameter Dynamic Web Blocking

Function As needed, blocks whole or part website pages if the sum of detected violations exceeds a specified threshold.

Unblock password Capture timer Stealth capture mode

Password used to unblock PC when blocked Interval at which client will monitor for capture Specifies whether a warning is displayed when a potential capture is captured. If stealth is selected no warning is

Page 16 of 57

displayed. Deactivate enable Specifies whether the deactivate option is displayed on the client menu. Uninstall enable Specifies whether the close client option is displayed on the client menu. Console access Specifies whether the console access option is displayed on the client menu. Show icon Ignore severity level Specifies whether the client icon is displayed on the task bar. Specifies the threshold severity level below which potential captures will be ignored. Application block Auto exit Capture full screen Specifies whether application blocking is enabled. Forces the client to exit on logon. Enables capture of active screen in multiple screen setup. NOTE: The client now always captures the active screen so this is now ignored. Application group Specifies the application group that contains the list of applications to be allowed or blocked for the selected organisational unit.

Web Tab
The web tab contains settings that define the web monitoring and blocking behaviour for the client. The following parameters are listed; Parameter Web Blocking Web Logging Allow List Only Web Block Threshold Function Enables or disables web blocking Enables or disables web site logging Allows only web sites on the list to be accessed The total severity value of detected potential violations that will trigger a block of the web page Web Access List Contains a list of allowed and blocked web sites. Note: the list is applied to the selected organisational unit

Alerts Tab
The Alerts tab contains settings that define the thresholds for monitoring and reporting specific activity over a defined period of time. It also includes email alert triggers. The following parameters are listed; Parameter Alert level Function Specifies the cumulative weighted severity threshold at which an

Page 17 of 57

email alert (Hive OS) is triggered. NOTE: This parameter is ignored in Securus NG. Accumulation period Specifies the accumulation period for severity and total capture thresholds. This parameter is also used to highlight capture activity by users and enable report grouping by accumulated severity or total captures over a specified period. Trigger count Specifies the total capture threshold for the specified accumulation period at which an email alert is triggered. NOTE: This parameter is ignored in Securus NG. Alert Trigger Displays any email alert trigger(s) created for selected for the organisational unit.

Library Tab
The Library tab shows the selected library and the enabled/disabled categories. The system (or parent) library category selection is shown by default. The user can select from the list of custom libraries created by the system administrator at domain level (menu: System->Libraries). All custom libraries are based on the system library shipped in the product. The custom libraries include or exclude words and phrases from various library categories as required. The following parameters are listed; Parameter Library Function The selection list includes all libraries created by the system administrator.

The library categories are also listed and can be selected or deselected as required.

AUP Tab
The AUP tab shows the selected AUP and the behaviour of the client on acceptance or decline. The following parameters are listed; Parameter Aup Name Function Shows the selected AUP. The AUP is selected from a list of AUPs created by the system administrator at the domain level (menu: Administration -> AUP) Shows the selected AUP. The AUP is selected from a list of AUPs created by the system administrator at the domain level (menu: Administration -> AUP). NOTE: Only applies to users on the RM Connect 2.4 Network. Shows the selected AUP. The AUP is selected from a list of AUPs created by the system administrator at the domain level (menu: Administration -> AUP). NOTE: Only applies to users of Winsuite 2000. Display AUP on logon.

Block on Aup Decline

Exit on Aup Decline

Display Aup

Page 18 of 57

Access Tab
The Access tab shows supervisors who have management or monitor access for the selected organisational unit. The following parameters are listed; Parameter Manager Access Function Shows the login username with manager access to the selected organisational unit. This user can create child organisational units, edit property settings and view reports. Shows the login username with monitor access to the selected organisational unit. This user can edit property settings and view reports.

Monitor Access

LDAP Sync Tab (Active Directory) The LDAP tab enables the users to be added to the selected user group from the specified Active Directory group. The following parameters must be set as follows;

Parameter Enabled Server url

Admin username Admin password Search base

Function Yes/No. Enables LDAP synchronisation if set. The LDAP server IP address or domain name with port number. E.g. ldap://192.168.0.2 Note: if port number is not specified then the default port number will be used. User name of the LDAP server required to access data in the format specified in the LDAP path User password

LDAP path to the LDAP content which will be downloaded during synchronization Synchronization interval in minutes, min value is 5 minutes
Last synchronisation time

Sync interval Last sync

Page 19 of 57

Here is an example setting; Enabled yes Server url ldap://192.168.0.2:239 Username - CN=administrator,CN=Users,DC=SecurusSoftware,DC=local Password (password) Search Base - OU=Employees,OU=SBSUsers,OU=Users,OU=MyBusiness,DC=SecurusSoftware,DC=local Sync Interval - 5 Explanatory Notes: CN = Common Name DC = Domain Controller OU = Organisational Unit (can be used instead of CN) Domain controller is securussoftware.local so thats DC=SecurusSoftware,DC=local in LDAP syntax. CN is equal to an object type in Active Directory for example an Organisational Unit or User. So for Username specify the full path for that user. For SecurusSoftware.local/Users/administrator this would be CN=administrator,CN=Users,DC=SecurusSoftware,DC=local. For search base you need to specify the OU you wish to synchronise the user group to. For example SecurusSoftware.local/MyBusiness/Users/SBSUsers/Employees would be OU=Employees,OU=SBSUsers,OU=Users,OU=MyBusiness,DC=SecurusSoftware,DC=local This can be setup on multiple user groups at the same time. Users that are already in the group but are not in the Active Directory OU will not be removed. A user will be moved if he currently exists in one user group in Securus but is in a OU in AD that you are synchronising to on a different user group.

Page 20 of 57

A simple way to find the path of a user or Organisational Unit in Active Directory is to right click the object and click properties. Next click the Object tab in the window that appears and this should give you a domain path. For example, in SecurusSoftware.local/MyBusiness/Users/SBSUsers/Employees the first entry is the domain controller.

2.4 Content Panel

The Content Panel is where most daily work in Securus is done, from reviewing reports to updating lists. The Main Menu for the Content Panel is found across its top. This menu is context dependent, so the items available change depending on what element of the Navigation Panels tree you select. When the Domain is selected, all of the menu items are available. Note: To get back to the previous screen after viewing a capture click the exit button on the top right corner of the Content Panel window. This closes the capture window and displays the previous screen. Four tabs are also displayed by default. These are;

Pie Charts
This tab displays two pie charts. The left hand pie chart shows a breakdown by severity of captures for the selected period. The default period is the current day. The right hand pie shows a breakdown by Category for the selected left hand pie slice. Clicking a category slice on the right hand pie shows a list of captures in the selected category.

Summary
The summary displays summary panels showing the most recent captures and events.

Page 21 of 57

Trend Charts
The trend charts display

New Captures

System Menu
The System menu is available only when the Domain is selected. Selecting a menu item places a tab on the menu line under the Name and Description display. The tab stays on the submenu, and can be removed by clicking the in it. Selecting a menu item also opens a menu, which is displayed under the tabs.

Libraries Tab Clicking the Libraries selection in the System menu puts the Libraries tab on the submenu and opens the Libraries menu. The options within this menu enable you to shape Securus into a powerful tool that fits the language used by those within your organisation. It also gives you the ability to quickly adapt as needed, by entering new terms (we use Phrases in Securus) as well as being able to add and change a relative weight to a phrases severity as circumstances dictate. Securus uses three levels of libraries: System library Comes with the installation; not editable. Applies to all users.

Page 22 of 57

Global library Custom library

Editable by administrators. Applies to all users. Created and edited by administrators as needed; is applied to specific organisations and all subsequent child units.

Create library To create a custom library: Click the Add icon on the Library menu. The New library dialogue appears.

In the Library field, enter the name of the library. In the Description field, add notes as required. They will be displayed to the right of the Library in the list. Press Save to preserve your addition; press Cancel or to abort the task.

Edit library Once the library has been created, you can change its name and description via the Edit library function. To edit the global or a custom library: Select the library by clicking on it. Press the Edit library icon. Change the name and/or description. Press Save to preserve your addition; press Cancel or to abort the task. icon.

Note: To access the Global library, click on the Show Global library Delete a library Select the library by clicking on it. Press the Delete library icon.

Caution! Securus does NOT ask for a confirmation when deleting a library. A deleted library cannot be recovered! Press the Delete icon only if you are sure that you want the library to be removed. The Global and system libraries cannot be deleted.

Working within a library


Select the library by clicking on it. Next, press the Show phrases icon. The Phrases panel appears.

Note that the phrases in the System library are created, maintained and accessible solely by Securus. The Phrases menu includes menu options and displays the phrases along with their characteristics.

Page 23 of 57

The following columns are displayed. Phrase Embedded Excluded Severity Category The term being monitored against Whether or not Securus registers an alert when the phrase is part of a larger term, i.e. 'miss' in 'permissible' Whether or not the term is currently monitored against as an element of that library A numerical value indicating the relative importance of the phrase on a scale of 1-100, with 100 being the worst The grouping, across libraries, under which the phrase falls for reporting purposes

The pull-down menu on the right of each of these columns allows you to sort the elements of the column by ascending or descending order and to choose which columns are displayed. Create Phrase To add a phrase: Click the Add icon on the Phrase menu. The New phrase dialogue box appears.

In the New phrase dialogue, enter the word or phrase In the Severity box, enter a numerical value indicating the relative importance of the phrase on a scale of 1-100, with 100 being the worst. Check the Embedded and Excluded boxes as needed to indicate whether to look for the term within larger word units or to ignore the term at this time. Select the category under which the term falls by choosing from the drop-down list. Press Save to keep your addition or Cancel to abort the addition

Note that if you create a phrase that is already in one of Securus libraries, a box appears stating that the phrase already exists. Click OK to continue. Edit a phrase To edit a phrase: Select the phrase by clicking on it Press the Edit phrase icon Change the name and/or characteristics Press Save to preserve your addition; press Cancel to abort the task.

Delete a phrase To delete a phrase: Select the phrase by clicking on it Press the Delete phrase icon

Page 24 of 57

Caution! Securus does NOT ask for a confirmation when deleting a phrase. A deleted phrase cannot be recovered! Press the Delete icon only if you are sure that you want the phrase to be removed.

Timetables

The Timetables menu enables you to break up a day into discrete periods in order to divide activity more effectively for reporting and to enable stricter and more lenient control at specific times. This is particularly useful for enabling/disabling web access during breaks and other times. Securus comes with a default timetable that Administrators can modify, and new ones may be added. Create Timetable To create a new timetable: Click the Add Timetable icon on the Timetable menu. The New timetable box appears.

In the Name field, enter the title for the new timetable In the Description field, add detail as desired. Remember to take into account those unable to follow your sterling logic, and leave notations! Press Save to keep your addition or Cancel to abort the addition

Edit timetable name To edit a timetables name: Select the timetable by clicking on it. The line with the timetable becomes shaded Press the Edit timetable icon. The Edit Timetable box appears.

Page 25 of 57

Setting up timetable periods


Once a timetable has been added, the periods within it needs to be set up. To set up a timetable: Click on the timetable to be set up. The line with the timetable becomes shaded. Click the Show Phrases icon. The Timetable Periods window opens.

Add a period by pressing the Add period

icon. The New Period box appears.

In the Name field, enter the name for this time period. In the Period start field, enter the time at which the period begins. Use the 24-hour HH:MM:SS format. In the Period end field, enter the time at which the period ends. Select the day of the week for which this applies in the pull-down menu on the Day field. Press Save to preserve your addition; press Cancel to abort the task.

Once the periods are entered, they can be sorted in various manners (i.e. alphabetically or by time) by accessing the sorting pull-down menu on the right of each column head. Making changes within a timetable is done via the Edit period function. Edit a period To edit a period: Select the period by clicking on it. The line with the period becomes shaded Press the Edit period icon. The Edit period window opens

Page 26 of 57

Make the required changes Press Save to preserve your addition; press Cancel abort the task.

Delete a period To delete a period: Select the period by clicking on it Press the Delete period icon

Caution! Securus does not prompt administrators for a confirmation when deleting a period. There is no way to retrieve deleted periods. Press the Delete period icon only when sure that the line is to be removed.

Application list

The application list shows all of the applications available on a PC as well as the applications source. Securus comes ready to capture activity in a variety of applications, and administrators may edit the list of applications under observation. The columns here include: Application name Filename Capture weighting Source PC the program that Securus monitors the application's name as it is shown in Securus reports an indicator of the severity of the event captured, with importance increasing from 1-100 the location from which the computer accesses the application. Securus comes ready to monitor a variety of applications; these are noted as 'PRESET'.

Create application To create a custom library: Click the Add icon on the Application menu. The Add application dialogue appears.

Page 27 of 57

In the Application field, enter the name of the application. In the Filename field, add the file name. Press Save to preserve your addition; press Cancel or to abort the task.

Edit application Once the application has been added, you can change its name, filename and weight via the Edit application function. To edit the applications name: Select the application by clicking on it. Press the Edit library icon. The Edit Application box appears.

Change the name, filename or weighting. Press Save to preserve your changes; press Cancel or to abort the task.

Delete an application Select the application by clicking on it. Press the Delete application icon.

Caution! Securus does NOT ask for a confirmation when deleting an application. A deleted application cannot be recovered! Press the Delete icon only if you are sure that you want the application to be removed. Along with the standard add, edit and delete icons, the Application list menu includes: Clear applications Default weightings restores the application list to its initial (preset) population restores the capture weighting list to its original settings

Page 28 of 57

Application Groups

The Application Groups tab enables administrators to set application monitoring and weighting for specified sets of users.

Create Application Group To create an Application Group: Click the Add appears. icon on the Application Group menu. The New Application Group box

In the Name field, enter the name of the Application Group. In the Description field, add notes as required. They will be displayed to the right of the Application Group in the list. Press Save to preserve your addition; press Cancel to abort the task.

Edit Application Group Once the Application Group has been created, you can change its name and description via the Edit Application Group function. To edit an Application Group: Select the Application Group by clicking on it. Press the Edit Application Group icon. Change the name and/or description. Press Save to preserve your addition; press Cancel to abort the task.

Delete Application Group Select the Application Group by clicking on it. Press the Delete Application Group icon. In the window that appears, click OK to delete the item, or Cancel to stop the process.

View Settings Click View Settings to see the settings that are specified for that Application group in particular.

About Selecting the About tab of the System menu brings up the About window. This window displays the following important information:

Page 29 of 57

In order to expedite calls for assistance, please have this information at hand when contacting Securus customer support.

Install license

Securus requires a license key and generates a unique serial number for each organisations installation of the Securus software. The serial number is based on the specific hardware configuration. To install your Securus license, go to System Install license. Then copy and paste the license key provided by Securus into the field available. Click install license to install, or cancel to terminate the process without installing the license. Note that the license key enables use of Securus for the specified number of days after which clients will cease communicating with the server. The system must be activated within 20 days for continued use. Activation binds the license key to the specific machine. See the Activate section for details.

Page 30 of 57

License installation is required in order to begin setting up and connecting users and stations. A license permits use for the specified period..

Activate

Once a license has been installed, an activation request is generated. Activating Securus via the activation code sent in response to the request is necessary as this is the process that binds the hardware to the system.

Administration Menu
The Administration options on the Main menu help administrators set up supervisors, AUPs and e-mail alerts, all of which can be used within specific Organisational units.

Page 31 of 57

Supervisors

Securus enables administrators to set up supervisors who are then assigned to specific Organisational units. Add Supervisor To add a Supervisor: Click the Add icon on the Supervisor menu. The New Supervisor box appears.

In the First name field, enter the supervisors first name. In the Last name field, enter the supervisors last name. In the Login field, enter a login name for the supervisor In the Password field, enter a password for the supervisor In the Email field, enter the email to which alerts will be sent Press Save to preserve your addition; press Cancel to abort the task.

Edit Supervisor Once the Supervisor has been added, you can change the name and other information via the Edit Supervisor function. To edit a Supervisor: Select the Supervisor by clicking on the appropriate name. Click the Edit Supervisor icon. The Edit Supervisor box appears.

Change the information as required. Press Save to preserve your addition; press Cancel to abort the task.

Delete Supervisor Select the Supervisor by clicking on the appropriate line. Press the Delete Supervisor icon. In the window that appears, press OK.

Page 32 of 57

AUP Administrators can tailor their own AUPs for individual groups in order to accommodate the specifics of that groups use. An AUP can be assigned to an organisational unit in the Aup Properties.

Alert mail settings Securus can send e-mails to selected recipients automatically once various thresholds are reached for specified Organisational units. To set an e-mail alert: In the Administration pull-down list, click Alert Mail Settings. The Alert Mail Settings box appears.

Enter the Gateway, Smtp User and Password and Message Source data. Click the Save button to keep your entry; click Cancel to abort the process.

Page 33 of 57

Web Control Menu

The Web Control menu allows administrators to turn on and off access to specific urls as well as to see a list of all web sites visited. Web control is available at the Domain level only, and affects all Organisational units under it. The Web Control menu has three options; Allow list Block list Web Access displays a list of all websites that are allowed to be accessed displays a list of all websites that are not allowed to be accessed displays a list of all web sites visited

Allow List

The Allow List defines what web domains are accessible to a given unit.

Add Host To include a new element to the list: Click the Add icon on the Allow List menu. The New Host box appears.

In the Name field, enter the name of the host to be added. Press Save to preserve your addition; press Cancel to abort the task.

Delete Host Select the host by clicking on it. Press the Delete Host icon. In the window that appears, click Yes to delete the item, or No to stop the process.

Page 34 of 57

Block List

The Block List shows the hosts that are not accessible by the selected unit in the Navigation pane. The list is populated and managed in the same manner as the Allow List.

Web Access

The Web Access option brings you to a list showing the web domains accessed and the number of times each domain has been reached. This is covered in greater detail in section 3.2.

Capture Reports menu

Most of the items found under the Capture Reports menu are identical to those found on the Capture Reports menu on the Home screen. They are covered under section 3.1. The one exception is the Custom Report option.

Page 35 of 57

Custom Reports

Securus enables administrators to design their own queries. The fields displayed are the same as in other reports. However, selecting options from the add query field list lets a report be built by severity, phrase, username and whether the capture was archived, ignored or saved.

To remove a query field, click the (X) next to the field. Date criteria cannot be removed.

Web Reports Menu

All of the items found under the Web Reports menu are identical to those found on the Web Reports menu on the Home screen. They are covered under section 3.2.

Page 36 of 57

4. Reports
Securus NG includes a number of predefined reports. These are designed to enable the user quickly identify and manage the potential issues highlighted by the captures.

3.1 Reporting Tools


Quick Searching
All reports display a list of captures in the content panel. A quick search feature enables the lists to be further refined showing only captures that match the selected criteria..

Figure 1 - Quick Searching

Viewing Captures
To see an individual capture, double click anywhere on the relevant line. The Capture Screenshot panel opens:

Page 37 of 57

Once the screenshot opens, you can Archive, Ignore or Save it.

Archive a Capture To archive a capture; Click the Archive Capture icon. The Capture Archived box appears. Click OK to continue.

Ignore a Capture To ignore a capture; Click the Ignore Capture icon. The Capture Ignored box appears. Click OK to continue.

Page 38 of 57

Save a Capture To save a capture; Click the Save Capture icon. The Capture Saved box appears. Click OK to continue.

3.2 Capture Reports


The Capture Reports menu on the Home screen gives users access to data regarding captures that Securus has acquired.

All of the Captures reports display the same information in their columns. These are: Screenshot Date/Time User Station Phrase Application Source Severity Library a visual display of what was captured when it happened according to the system time who did it where it happened the phrase that triggered the capture what application it happened in from whence it came from the 1-100 scale set by administrators in which set of phrases the offending word was found

Page 39 of 57

Unviewed Captures
Securus new captures can be looked at by accessing Unviewed Captures under the Capture Reports menu option.

Update Unviewed Captures In order to update the Unviewed Captures report, click the Refresh Data icon on the top left of the panel.

Archive Unviewed Captures Archive unviewed violations when you know that they will be needed for future reference. To archive an unviewed capture; Click anywhere on the unviewed violation graphic or otherwise. The entry becomes shaded and the Properties panel changes to Capture Properties, with the attendant information shown. Click the Archive Captures icon. The Archived Captures box appears. Click OK to continue.

Ignore Unviewed Captures Securus gives you the freedom to determine that a particular capture can be ignored and moved for further processing or deletion.

Page 40 of 57

To ignore an unviewed capture; Click anywhere on the unviewed violation graphic or otherwise. The entry becomes shaded and the Properties panel changes to Capture Properties, with the attendant information shown. Click the Ignore Captures icon. The Ignored Captures box appears. Click OK to continue.

Save Unviewed Captures To save an unviewed capture; Click anywhere on the unviewed violation graphic or otherwise. The entry becomes shaded and the Properties panel changes to Capture Properties, with the attendant information shown. Click the Save Captures icon. The Saved Captures box appears. Click OK to continue.

Page 41 of 57

Viewed Captures
The Viewed Captures report shows a list of captures that have been examined but not yet put into another category. The functions within the report are the same as those found in the Unviewed Captures report above.

Saved Captures
Captures that need to be included in data are moved to Saved Captures. The functions within the report are the same as those found in the Unviewed Captures report above.

Ignored Captures
Captures that are not needed can be removed by sending them to the Ignored Captures report. Captures cannot be deleted, so this is the place to put those that will not be needed in future. The functions within the report are the same as those found in the Unviewed Captures report above.

Archived Captures
The captures that you want to keep at hand i.e., examples, but dont want to be included in the latest data, can be placed in the Archived Captures report. The functions within the report are the same as those found in the Unviewed Captures report above.

Keyboard Captures
Captures that come from entering words by keyboard and are not received via an external source are called Keyboard Captures. They are kept separately as they clearly show the actions of the user and are thus of particular interest to Securus administrators. The functions within the report are the same as those found in the Unviewed Captures report above.

Top lists

Securus produces league tables for the most popular phrases and two categories of users. Top Users are those who make use of the system the most and High Risk Users attract Securus attention the most often for their captures. Each list has a Refresh button follows: Top Phrases Top Users High Risk Users to enable users to update the list at will. The lists show different data as

shows a list of the most commonly captured phrases and each phrase's total count shows a list of the users with the highest system use and each one's total count shows a list of the users who trigger alerts the most often and each one's total severity

Page 42 of 57

3.3 Web Reports

Web Log
The Securus Web log shows the same data in Web Access Control, but in chronological order, and without breaking down access by domain. You can update the information by clicking the Refresh data icon.

Web Log by User


Securus enables you to easily focus on user web access by providing a Web Log by User function. Like the Web Log, you can update the information by clicking the Refresh data icon. Web Log by User shows the number of times each user has accessed the internet. This gives you the ability to look further into internet use than the Top User list does.

Top Web Pages


Like Capture Reports, Web Reports has its own league tables. Top Web Pages shows a list of the most commonly accessed web pages and the number of times each page was accessed.

Page 43 of 57

Top Web Users


As with Top Web Reports, this selection displays a list of internet usage. However, this list includes the users with the highest internet use and the counts for each.

3.4 User Defined Reports


The logged on user can create own user defined reports based on specific filter criteria and save these for future use. The reports will be available to execute whenever the user defined reports screen is shown.

User defined reports can be created from any report screen displaying captures or other lists such as users in user groups.

Create a user defined report


Click the New button to show the Create new report dialogue.

Page 44 of 57

Enter the report name then click the Create button Create report filter criteria Click the + sign to display the report criteria screen

to create the new report.

The following screen will be displayed;

Page 45 of 57

Click and drag a field to be used as filter criteria into the filter area;

Click where indicated in the field window to display the field criteria condition screen as shown below;

Page 46 of 57

Enter the condition and the matching value as shown above. Click Set and then Save to save the report criteria for the selected report.

Run a user defined report


Click the Load button Click the Execute button the defined filter criteria. to load the selected report settings. to run the selected report. The screen below shows a typical output for

To run a report with no filter criteria remove all filter criteria in the filter criteria screen then click the Execute button.
3

The conditions available depend on the selected field.

Page 47 of 57

3.4 Scheduled Reports


Any report can be saved as a user defined report and scheduled to run at a specified time and repeated at regular intervals as appropriately specified.

Click the + sign screen.

button followed by the expand

button at the top left hand corner of the content

Click the schedule check box and enter the appropriate schedule setting as shown in the screen below. Note that the report can be email to the specified person.

Type a report name and the click the Save schedule settings.

button to save the report with selected criteria and

Note that to use an existing report, first select the report from the report list, enter the appropriate schedule setting then click the Save button to save the settings.

Export format
Various output formats can be selected for a scheduled report as for a normally run report. Click the Export button to select the required output format. Click the Exit icon on the Export Data window to save and exit. The selected output format will be saved with the scheduled report.

3.5 Audit
Securus version 7 includes an Audit report, which shows system changes and who made them. You can access the Audit Events report via the Audit tab of the menu bar.

Audit Events has a Refresh button follows: Date/Time Principal Tag Description

to enable users to update the list at will. The columns show data as

when the modification occurred who made the modification what kind of modification was made more detailed information regarding the change

Page 48 of 57

Page 49 of 57

3.6 Alert Triggers


Securus can e-mail specified people whenever certain thresholds are crossed. This is accessed by clicking the Alert Trigger appears. icon on the right side of the Content panels menu bar. The Alert Triggers menu

Create Alert Trigger To create an Alert Trigger: Press the Add icon on the Alert Trigger menu. The Alert Trigger box appears.

In the Name field, enter the name of the Alert Trigger. In the Description field, add notes as required. They will be displayed to the right of the Alert Trigger in the list. Press Save to preserve your addition; press Cancel to abort the task.

Edit Alert Trigger Once the Alert Trigger has been created, you enter the details for the rigger by using the Edit Alert Trigger function. You can also change the triggers name and description via the Edit Application Group function To edit an Alert Trigger: Select the Alert Trigger by clicking on it. Press the Edit Alert Trigger icon. The Edit Alert window appears.

Page 50 of 57

Select whether all or just any conditions must be met before the alert is triggered. Under the Conditions tab, fill in the information to set category or categories, severity threshold and time limits. Press the Recipients tab. Here you can add, edit and delete e-mail addresses for alerts to be sent to and attach specific categories to each.

Page 51 of 57

Add a recipient Press the Add icon to enter the email address for the new alerts recipient. In the box that appears, enter the email address and select the categories for which the alert is active. Press Save to preserve your addition; press Cancel to abort the task.

Edit a recipient To change the parameters, press the Edit

icon and make the modifications necessary.

Page 52 of 57

Press Save to preserve your changes; press Cancel to abort the task. Delete a recipient

To delete an email for an alert trigger, press the Delete icon. In the Confirm box that appears, select Yes to continue or No to abort the deletion.

Delete Alert Trigger Select the Alert Trigger by clicking on it. Press the Delete Alert Trigger icon. In the window that appears, click OK to delete the item, or Cancel to stop the process. icon to update the list.

Press the Refresh

Page 53 of 57

5. Server Upgrade
Securus NG can perform automatic upgrades when a newer version of the server software is posted on the Securus FTP website. The server must be configured with details of the FTP site. The site must be visible by the server so any firewalls should be configured to allow access.

1. Setting up ftp access; Select Update Monitoring Settings from the drop-down menu.

Enter ftp server details including schedule start time and repeat interval.

Page 54 of 57

2. Update download; If an upgrade version is detected the file will be downloaded and message indicating update is being downloaded will be displayed;

After download the Upgrade button will be displayed;

3. Upgrade process; Clicking the upgrade button opens up the upgrade console;

Page 55 of 57

Click Start upgrade to begin the upgrade process. The following should be displayed showing upgrade in progress.

On completion the server will restart.

6. Data storage configuration


Securus NG stores data perpetually by default. The system administrator should configure additional storage devices when required with all stored data always accessible for viewing on the server. Alternatively, the server can store data cyclically. The oldest data is overwritten when the specified disk capacity threshold is reached. For this mode of storage the server is configured as follows; Click on Configure storage settings in the System menu.

Page 56 of 57

Enter the required threshold values. The Minimum free space is the disk free space that must be maintained. The Violations delete threshold value represents the number of violations that will be deleted in a batch until the minimum free space becomes available. The server will check periodically that the minimum free space specified is available. If this space is not available the number of captures specified by the Violations delete threshold will be deleted. This process is repeated until the minimum free space specified is available. For example if this value is 10 then 10 violations will be deleted in each delete session.

Page 57 of 57

Вам также может понравиться