Posted in Archived

ObserveIT’s Threat Detection Console Lets You Easily Spot Suspicious Activity

Reading Time: < 1 minute

We are proud to announce the new Threat Detection Console feature that will be available in our next release!

Now, administrators can easily spot suspicious activity on monitored computers with seven new, easy-to-read charts. These charts are specifically designed to highlight issues that IT security should investigate immediately.

Watch this video  to see how neat this Threat Detection Console is, and be prepared to be wowed!

In the video, you will see the following amazing features:

  • Night and Weekend Activity – The number of logins which occurred outside regular working hours. This chart can help identify unauthorized or malicious logins to monitored computers.
  • Most Active Computers Now – The computers with the most currently active sessions.
  • Infrequently Used Applications – Applications used by the least number of users. This chart can help identify the use of malicious applications on monitored computers.
  • Infrequently Used Computers – Monitored computers used for the least number of sessions. This chart can help identify suspicious use of a computer.
  • Infrequently Used Login IDs – Login IDs used for the least number of sessions. This chart can help identify suspicious use of a login ID.
  • Leap Frog Logins – Instances in which a user logged in from one monitored computer to another. This chart can help identity unauthorized access to a second computer via permitted access to a first computer.
  • Remote Access Sessions – This chart can help identify users who are not authorized to access other computers remotely.The seven charts are viewable on a single page for easy inspection. Some of the charts are customizable.  For instance, you can customize the the days and times that are considered regular working hours for the Night and Weekend Activity chart.

Download ObserveIT now and begin benefitting from early detection of data breaches and other unauthorized ormalicious activities by outsiders or internal trusted users.