Upload
ethan-goff
View
41
Download
1
Embed Size (px)
DESCRIPTION
Spector 360. Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software. Reporting. Websites Visited Email/Webmail Chat/Instant Message Program Activity Network Activity. Keystrokes Downloads/uploads - PowerPoint PPT Presentation
Citation preview
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Spector 360
Spector 360 is the Corporate Network Edition of Spector Pro – winner of the PC Magazine Editor’s Choice Award for Best Activity Monitoring Software
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
ReportingReporting
• Websites Visited
• Email/Webmail
• Chat/Instant
Message
• Program Activity
• Network Activity
• Keystrokes
• Downloads/uploads
• Snapshots
• Bandwidth Usage
• Document Tracking
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Website ActivityReporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Website Activity ViewsReporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
User Website DetailReporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Network Bandwidth UseReporting
Internet Radio being played
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Network Bandwidth DetailReporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Network Bandwidth SnapshotReporting
This snapshot details adjusting the volume of Internet radio while working on PowerPoint.
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
User Activity DetailReporting
See an interactive demo at http://www.spector360.com/screenshots/UserExplorer/overview.htm
Each tab displays a different type of activity
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Keyword AlertsReporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Sample Reports
These reports represent only a sampling
More can be seen at
http://www.spector360.com/overview/report.htm
Reporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Additional Features
• Automated email report delivery
• Monitor files deleted, created, renamed, printed, transferred (includes files written to CD, DVD or USB devices)
• Alerts if specified documents are accessed
Reporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Activity Overview
• Red flag irregularities
• See probable cause at a glance
• Hyperlink to details
“Quick View reports let you know what’s happening REAL FAST….For example,…the Quick View charts are showing me EXACTLY how many hits websites are getting. …If you see a website that shouldn’t be popular, all you have to do is click the bar on the chart to find out what’s going on.”
Robert Haviland, Hickman County Schools
Centerville, Tennessee
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Miss nothing reporting Easily spot trends and irregularities.
e.g., Who seems to be using the most network bandwidth and why?
Music consuming bandwidth
Activity Overview
“Spector also enabled us to monitor the time and date students were on computers as well as all actions they undertook.”
Greb Gebhardt, Lowanna CollegeVictoria, Australia
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Miss nothing reportingWhat websites are being visited most frequently and who is spending the most time browsing the web? In this example, mlb.com is a baseball site.
You can drill down to find the baseball enthusiasts and exactly how much time they’ve spent.
“The number of students now engaged in non educational work on computers is almost nil.”
Greb Gebhardt, Lowanna College
Victoria, Australia
Productivity
Activity Overview
User
Active
Time
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Miss nothing reportingWho is transferring the most files?
What exactly are they sending out?
To whom are they sending it to?
“The software…enabled us to monitor the use of USB drives and other external devices that previously we did not have access to.
Students trying to use other students or staff accounts has…reduced considerably.”
Greb Gebhardt, Lowanna CollegeVictoria, Australia
Productivity
Confidential information
Activity Overview
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Miss nothing reportingWho are the top violators of those keywords that indicate abuse (e.g., sex, bomb, gambling)?
Productivity
Confidential information
Keyword Alerts
Curse word
Curse word
Activity Overview
“Using key word alerts, we were able to set flags on files…and web searching and web sites…which …would send notification…that there may be a breach of…usage policy.
The alert list…includes flags for things like remote desktop, administrator and other key staff login codes.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Spot trends What are the top online search terms being used and do they look suspicious?
Productivity
Confidential information
Keyword Alerts
Online search terms
Activity Overview
“We discovered…searches by…students in Google for keywords such as sex, porn, etc.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Miss nothing reportingSearch for a word/phrase across the entire user base. e.g., a racial epithet or sexual term in an anonymous email.
Productivity
Confidential information
Keyword Alerts
Online search terms
Lawsuit protection
Activity Overview
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Miss nothing reporting
Who is arriving at work late and leaving early?
Who is taking frequent breaks and just how long are they?
Productivity
Confidential information
Keyword Alerts
Online search terms
Lawsuit protection
User activity
Activity Overview
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Reduce Computer Misuse
Stop PC and Internet abuse
Provide proof of student identity and activity
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Detect & Stop These Activities
• Offensive chat/email
• Bullying
• Threats to students,
teachers, and school
• Bandwidth abuse
• Game playing
• Bypassing web filters
• Student hacking
• Illegal downloads
Computer Misuse
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Offensive chat and email“First we put the keyword (alert) list (of inappropriate words) on the library PCs….The very first day…the first hour…we had 10 alerts. And there are only 31 PCs in the library, so 1/3 of the PCs sent alerts the first day.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
Computer Misuse
“Several students…managed to use a bypass proxy web site to access MSN Messenger.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Offensive chat & email
Bullying “At one time, the site (at which one can insert a person’s name and it creates a violent image of that person “destroyed”) attracted quite a few, but once a student tried it with Spector in place, the outcome of the prank was decidedly different.”
Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota
Computer Misuse
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Offensive chat & email
Bullying
Threats to students, teachers, school
“An uncomplimentary anonymous web email was sent to the assistant principal from a PC within the school system network.
(A threatening) note (was) found, (which) was composed on a PC and printed out.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
(Note: Spector detects these activities and identifies the user.)
Computer Misuse
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Offensive chat & email
Bullying
Threat to students, teachers, school
Bypass web filters
“Students were using an ‘anti-proxy’ program, bypassing the content filter by bouncing off another server. With Spector, now we can monitor even that.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
“We were seeing sexual sites visited. But since the introduction of Spector, we rarely see anything like that.”
Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota
Computer Misuse
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Offensive chat & email
Bullying
Threat to students, teachers, school
Bypass web filters
Student hacking
“We were subject to some hacking attacks that almost shut our network down. Spector allowed us to discover who the culprits were.
The student body is running scared because the word is out that the IT department is now mysteriously able to find out which students are causing havoc in the computer systems.”
Robert Frost, Highland School of TechnologyGaston County, North Carolina
Computer Misuse
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Offensive chat & email
Bullying
Threats to students, teachers, school
Bypass web filters
Student hacking
Illegal downloads
“Students were storing mpeg's and games on the server and renaming them to hide them from being seen in their profiles.
The word spread like wildfire and it has stopped that kind of behavior cold.”
Robert Frost, Highland School of TechnologyGaston County, North Carolina
Computer Misuse
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Offensive chat & email
Bullying
Threats to students, teachers, school
Bypass web filters
Student hacking
Illegal downloads
Risk in general
“A keystroke logger (was found) on a library PC. It was downloaded off the Internet…(and) capturing passwords….very frightening for us.
I felt we were protected from the outside, but were we protected from ourselves? Spector showed us we needed to do more.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
Computer Misuse
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Resolve Technical Problems
• View error Messages
• Identify malware sources
• Document Procedures
• Save staff time
• Reduce Bandwidth
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
View error messages “The screenshots show me error messages and exactly what led up to a problem.”
Resolve Technical Problems
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
View error messages
Identify malware sources
“(Students) go to websites and cookies get placed that change the behavior of Internet Explorer. I can discover the website that caused the problem and block it for everyone.”
“I can discover how a virus was introduced.”
Resolve Technical Problems
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
View error messages
Identify malware sources
Document Procedures“I use the screenshots to document installations and configuration changes for later review.”
Resolve Technical Problems
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Error Messages
Identify malware sources
Document procedures
Save staff time
“The incidents are few and far between now. And that alone saves us work. We don’t have to ‘clean’ the machines as often as before.”
Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota
“We have found that our support workload is reduced because the kids don’t try to crash the PCs any more, and if a machine does fail, we can see from the log what was happening when it failed. This makes it much easier to fix.”
Fungai Chawira, St Augustine’s High School London, England
Resolve Technical Problems
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
View error messages
Identify malware sources
Document Procedures
Save staff time
Reduce Bandwidth
“It only takes a moment to see who’s hogging bandwidth. Right now, on the bandwidth chart, I see one user bringing down large amounts of data…. It looks like lots of music.”
Robert Haviland, Hickman County SchoolsCenterville, Tennessee
“We found a folder with 60-80 songs in it on one of our file servers … way down deep. We wouldn’t have found the songs without Spector.”
Todd Kumpola, Rapids Area School DistrictPark Rapids, Minnesota
Resolve Technical Problems
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Improve Learner Outcomes
“The ability to easily monitor, report and follow up on misuse…has changed student practices and improved teaching and learning.
…teachers…complained that students were now completing work in half the time…and they would have
to create additional work for them.” Greg Gebhardt, Lowanna College
Victoria, Australia
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Increase Time on Target
“We discovered about 30% of students playing games, which are hidden from teachers’ views as they walk past.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
“Instead of playing games, they now listen to the teacher….
Classroom productivity has absolutely increased using Spector. Teachers now feel like they can talk TO the students, as opposed to having to stand BEHIND them.”
Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota
Improve Learner Outcomes
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Diagnose Student Weaknesses
For example: A student has poor web search technique and chooses the first search entry or paid ads.
You actually see it happen.
“If a teacher believes that a particular child has not been concentrating in class…he can come to us after the lesson and ask to see the record of the child’s activity during the lesson.”
Fungai Chawira, St Augustine’s High School London, England
Improve Learner Outcomes
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Assess Understanding
Teachers can watch the learning process by reviewing assignments, email and chat conversations.
Improve Learner Outcomes
Instant Messaging Example
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Expose Dishonesty
Review communications for suspicious activity.
Improve Learner Outcomes
Email Example
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Example of PlagiarismImprove Learner Outcomes
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Monitoring Strategies
• Deterrence
• Detection
• Investigation
• Discipline
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Deterrence “With evidence of inappropriate PC activity, a student is confronted. Word then spreads like wildfire, and the end result is productivity increases and the incidence of malicious actions drops to near zero.”
Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota
“It’s a lot easier to fight off temptation when you know there are consequences. Spector is like radar, or an unmarked car. It keeps the good kids good.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
Monitoring Strategies
In a study of high school computer use, off-task activity immediately declined 67% after students viewed a monitoring announcement at each login, which included sample reports.
After scofflaws were disciplined and word spread, median off-task activity declined 94%.
Results demonstrated that a highly visible detection strategy and vigorous enforcement of Acceptable Use Policy significantly deters unacceptable computer activity.
South Plainfield H.S., Plainfield, Illinois
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Deterrence
Detection
“The keyword alert feature is really wonderful. the very first day … the first hour … 1/3 of the PCs sent alerts. These were Word documents with inappropriate language.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
Monitoring Strategies
“Two students…had staff passwords and…used these to have unrestricted access to parts of the internet and more.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Deterrence
Detection
Investigation
“The Principal called us to get the information and - with a Spector snapshot - we did. The guilty student was caught.”
Jeff Hunt, Park Rapids Area School DistrictPark Rapids, Minnesota
“Being able to print a copy of what the student has typed is proof enough and amazes the student that we have the information.”
Dean Edwards, Maxwell Adventist Academy
Kenya
Monitoring Strategies
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Deterrence
Detection
Investigation
Discipline
“And because Spector provides who, what, when, and where, we were able to go to the Assistant Principal, who started calling students into the office.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
“Some students didn’t believe the hype and next week were amazed when they were called into the office and shown why we had removed them from the network.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
Monitoring Strategies
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Investigation Example• Spector 360 Quick View panels and
alerts show probable cause.
• In-depth review of the student follows.
• Visual evidence is sent to the assistant principal.
• The student is shown the evidence and is disciplined.
• The student spreads the word, which deters other students from violating Acceptable Use Policy.
Monitoring Strategies
“One student was repeatedly trying to access porn sites,” said Haviland. “With Spector 360 and its keyword alerts, I received reports on it all. We kept records, took them to the assistant principal, and the student went to ISS (In-School Suspension). The other kids heard about it and that cut down that activity A LOT!”
Robert Haviland, Hickman County Schools
Centerville, Tennessee
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Monitoring Methods
• Random monitoring
• Upon request
• Formal investigations
• Keyword alerts
• Automated reporting
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Random monitoringReview of a student’s computer use
Only 10 minutes to review a week’s activity
Monitoring Strategies
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Random monitoring
Upon request
When inappropriate behavior is suspected
Examples:
• Poorly done assignments
• Switching screens when you walk by
• Complaints by students
• Suspicious activity
Monitoring Strategies
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Random monitoring
Upon request
Formal Investigations
Serious violations
• Cheating
• Racial, Sexual harassment, bullying
• School and teacher threats
Monitoring Strategies
“…video dumps have been used as evidence for law enforcement in cases of cyberbullying and…selling of illegal goods on eBay.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Random monitoring
Upon request
Formal Investigations
Keyword Alerts
Receive immediate email notification of words and phrases detected in:
• Instant Messages
• Websites
• Keystrokes
Monitoring Strategies
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Random monitoring
Upon request
Formal Investigations
Keyword Alerts
Reports (print, email, export, automated delivery)
Monitoring Strategies
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
Who Reviews Activity
• IT Staff
• Teachers
• Administrators
• Parents
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
IT staff“In this case, the Principal called us to get the information and - with a Spector snapshot - we did. The guilty student was caught.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
Who Reviews Activity
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
IT staff
Teachers
“The persons in charge are able to view the PCs they are in charge of... They get the alerts, they do the viewing, and they take the appropriate action.
Spector has been an eye-opener for teachers…. (they) are not being circumvented, and they appreciate that.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
“I get keyword alerts emailed to me, then I send a message to the responsible teacher.”
Robert Haviland, Hickman County SchoolsCenterville, Tennessee
Who Reviews Activity
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
IT staff
Teachers
Administrators
“And because Spector provides who, what, when, and where, we were able to go to the Assistant Principal, who started calling students into the office.”
Larry Koby, New Castle Community SchoolNew Castle, Indiana
Who Reviews Activity
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
IT staff
Teachers
Administrators
Parents
“Spector has enabled us to verify to parents large downloads…or printing jobs, when (students) have made claims to their parents that others have been using their account.”
Greg Gebhardt, Lowanna CollegeVictoria, Australia
“(Monitoring) is much better than having parents and students complaining of harassment as they have in the past.”
Dean Edwards, Maxwell Adventist AcademyKenya, Africa
One school automates summary email reports to each parent.
Who Reviews Activity
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit
“Will the time come when monitoring software is as important as anti-virus software? The time is here now! You need to have a tool like Spector in your repertoire.”
Regional Credit Union
“I believe monitoring software is going to become a workstation standard. If you’re not monitoring, I’d say you have to ask yourself why.”
Chris HoerskeDrexel Chemical Company
As computers need anti-virus software, so do they need
monitoring protection software.
Sample Reports Activity Overview Reduce Misuse Fix Tech Issues Learner Outcomes Monitoring Strategies Who Reviews Activity
Exit