Privileged User Monitoring
Get user audit trails of everything that happens on sensitive servers


Privileged User Monitoring: Key Capabilities

Screen capture recording plus video activity analysis for searchable, text-based logging of all user activity

Advanced keylogging enables keyword searching to instantly find any on-screen mouse or keyboard action

DBA Activity Audit monitors and audits all SQL queries executed by DBAs against production databases


IT users can be prevented from logging in to a server without entering a valid ticket number (from an external ticketing system), to ensure that every login is connected with a specific purpose:

  • Show all privileged user access— not limited to access via the ‘standard’ method. ObserveIT records all user activity at the end point and cannot be bypassed.
  • Record nested/underlying commands run in the background by scripts and programs.
  • Search on all text and keywords captured on the screen.

ZERO-GAP MONITORING, ANALYSIS, ALERTING AND INTERVENTION

ObserveIT monitors, records and analyzes privileged user activity in every application, Web page and window. Beyond Windows servers, ObserveIT also supports Windows desktop and Unix/Linux environments, regardless of how users log in (Remote Desktop, Terminal Services, VMware, GoToMyPC, LogMeIn, SSH, Telnet, ICA, local login, etc.). Addressing a major security gap in most organizations, ObserveIT even generates user activity logs and screen recordings for commercial, legacy, bespoke and cloud apps, including those with no internal logging facilities of their own.

Administrators can observe live sessions in progress and can lock a session and user account from within ObserveIT if they wish to immediately stop a suspicious or dangerous activity. This is particularly useful in the event that the system generates a real-time alert: the administrator receiving the alert can view all activity occuring in the live session screen, rewind to see the actions that led up the alert and take immediate action to prevent further risk.

Additionally, the recordings and resulting user activity logs are valuable for root cause analysis, ad hoc IT forensics and regulatory compliance audit reporting. Reports can be customized to specific business needs and can be scheduled or run on demand.


VIDEO REPLAY AND ACTIVITY ANALYSIS

ObserveIT monitors, records and analyzes privileged user activity in every application, Web page and window. Beyond Windows servers, ObserveIT also supports Windows desktop and Unix/Linux environments, regardless of how users log in (Remote Desktop, Terminal Services, VMware, GoToMyPC, LogMeIn, SSH, Telnet, ICA, local login, etc.). Addressing a major security gap in most organizations, ObserveIT even generates user activity logs and screen recordings for commercial, legacy, bespoke and cloud apps, including those with no internal logging facilities of their own.

Administrators can observe live sessions in progress and can lock a session and user account from within ObserveIT if they wish to immediately stop a suspicious or dangerous activity. This is particularly useful in the event that the system generates a real-time alert: the administrator receiving the alert can view all activity occuring in the live session screen, rewind to see the actions that led up the alert and take immediate action to prevent further risk.

Additionally, the recordings and resulting user activity logs are valuable for root cause analysis, ad hoc IT forensics and regulatory compliance audit reporting. Reports can be customized to specific business needs and can be scheduled or run on demand.

top down