Unacceptable Use
Unacceptable Use (Windows/Mac)
The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: UNACCEPTABLE USE.
ALERT RULE |
Description |
---|---|
Browsing Adult sites |
An alert is triggered upon browsing to websites with adult content. |
Browsing Dynamic DNS sites |
An alert is triggered upon browsing to websites offering Dynamic DNS services, that automatically update DNS servers with the frequently changing IP associated with a specific domain name. This action could indicate that the user is trying to hide his IP. |
Browsing Gambling sites |
An alert is triggered upon browsing to gambling websites, which can affect employee productivity and also indicate an employee with addiction issues or financial debt. |
Browsing hacking, key loggers or password-cracking sites |
An alert is triggered upon browsing to websites related to hacking tools, key loggers, or password cracking tools. This action could indicate that the user has plans to obtain access to sensitive information. |
Browsing Illegal activities, violence or hate sites |
An alert is triggered upon browsing to websites related to illegal activities, violence, hate, terrorism and weapons. |
Browsing Illegal drugs sites |
An alert is triggered upon browsing to websites related to illegal drugs. |
Browsing remote proxies’ sites |
An alert is triggered upon browsing to websites related to remote proxies. This action could indicate that the user is trying to make indirect network connections to other network services while changing his real identity. |
Browsing unauthorized predefined sites |
An alert is triggered upon browsing to a predefined blacklisted website. |
Downloading computer anti-sleep software |
An alert is triggered upon downloading an installation file or ZIP file that is a member of the Computer Anti-sleep Software list that can be used by employees to make it appear as they're working, while they're actually not. |
Running Bitcoin mining tools |
An alert is triggered upon running various tools for Bitcoin mining. As this is a digital payment system and a currency, a high computing power is required for this resource-intensive process. This action indicates usage of IT resources for private needs. |
Running computer anti-sleep software |
An alert is triggered upon running an executable file that is part of the Computer Anti-sleep Software list that can be used by employees to make it appear as they're working, while they're actually not. |
Typing workplace violence words |
An alert is triggered upon typing a sensitive word that is included in a list of workplace violence words. |