View
3
Download
0
Category
Preview:
Citation preview
Ekran System v. 6.15
Program Overview
Contents
• About the Program • Ekran Server & Management Tool• Database Management• Licensing• Client Installation & Update• Monitoring Parameters• Offline Client Detection (“Lost”
Clients)• Client Protection• Advanced User Authentication• Two-Factor Authentication• Password Management• User and Entity Behavior
Analytics
• Administrator’s Approval on Login
• Granting User Access on Schedule
• Notifying Users about Being Monitored
• User Blocking• Viewing Sessions• Alerts • USB Monitoring• Dashboards• Interactive Monitoring• Reports• Application Customization• Health Monitoring
Page 2 of 148
About the Program
Page 3 of 148
About the Program
Smart user activity video recording system.
Page 4 of 148
Privileged Activity
Monitoring
• Ekran System allows creating indexed video records of all concurrent Windows, Citrix, and Linux terminal sessions on your servers and record remote and local sessions on workstations, including macOS.
Employee Work Control
•Are you interested in your company's security?
•Do you want to know what your employees do during their working hours?
•Do you want to control sensitive information use?
Privileged Password and
Session Management
• Ekran System helps you to provide privileged access to critical assets and meet compliance requirements by securing, managing and monitoring privileged accounts and access.
Flexible Deployment and
Licensing
• Ekran System supports the widest range of platforms and infrastructure configurations delivering reliable deployments of any size, from pilot dozens to tens thousands of endpoints. Flexible licensing helps to fit budget and addresses project changes.
About the Program
Ekran System is an affordable user monitoring solution for enhanced cyber security.
You can record all terminal, remote, and local user sessions and alert security personnel to suspicious events.
Page 5 of 148
Ekran Management Tool
GUI part used for system management &
session viewing
Ekran Server
Main component used for storing data
obtained from Client computers
Ekran Clients
Windows/macOS/Linux/Citrix
Components installed on the target computer to
monitor user activity and send it to the Server
Ekran System Components
Ekran System Structure
Page 6 of 148
High Availability Mode (Enterprise Edition)
Page 7 of 148
The High Availability mode provides a high level of operational performance and balances the load of sent data, minimizing downtime and service interruptions.
Disaster Recovery Mode
Page 8 of 148
The Disaster Recovery mode allows you to configure and deploy Ekran System in such a way that if the Ekran Server stops functioning for any reason, another Ekran Server instance can replace it without data loss and reinstallation of the system.
Single-Tenant/Multi-Tenant Mode
Page 9 of 148
The Multi-tenant mode allows multiple strongly isolated tenants to operate in Ekran System environment. Data of each tenant is independent and not accessible to other tenants.
Ekran Server & Management ToolUser management, permissions, Active Directory Integration, Management Tool settings
Page 10 of 148
Management Tool
You can manage the whole system via the Management Tool in your browser.
Page 11 of 148
Tenant Management
Ekran System has Single-tenant and Multi-tenant modes.
The Single-tenant mode is selected by default. In this mode, all users have access to all Clients and settings according to their permissions.
In the Multi tenant mode all tenant users have access to their tenant Clients, but they have no access to other tenants’ Clients, configurations, alerts, reports, etc.
You can switch to the Multi-tenant mode any time.
Page 12 of 148
User Management & Permissions
• Create two types of users: Internal or Active Directory (Windows domain users/groups).
• Use groups for easier user management.
• Define permissions for users.
Page 13 of 148
Active Directory Integration
Page 14 of 148
Integration with Active Directory allows you to establish the domain trusts with multiple domains.
Active Directory Integration
Page 15 of 148
Integration with Active Directory allows you to do the following:
• Add users & user groups from trusted domains to allow them to access the Management Tool and Client machines with enabled Forced User Authentication.
• Create alerts for domain groups to quickly respond to suspicious user activity on the Client computers belonging to trusted domains.
Management Tool Log
Page 16 of 148
Audit all user activities performed in the Management Tool via the Management Tool Log with the detailed information on all changes.
Database Management
Page 17 of 148
Database Configuration
Page 18 of 148
Database Cleanup
Page 19 of 148
You can configure the cleanup operation that can be applied either to a separate Client or to the Client Group.
Database Archiving (Enterprise Edition)
Page 20 of 148
Archive and delete the old monitored data from the Database not to run out of space on the Server computer and to save the monitored data in a secure storage.
Database Archiving (Enterprise Edition)
Page 21 of 148
You can view the archived sessions from your archived database in the Session Viewer and perform searches in them in a usual way at any time.
Database Parameters
Page 22 of 148
If the database credentials defined during the Server installation have been changed according to your company policy, you can easily edit them without re-installing the Server. Also, you can define the location for storing binary data received during monitoring.
Isolating Database from Clients (Enterprise Edition)
Page 23 of 148
You can disconnect all Clients from the database and send them offline so that you can fix issues with the database, run database cleanup and maintenance without stopping the Ekran Server. Once database work is restored, you can return all Clients online in one click.
SIEM Integration
Page 24 of 148
Ekran System integrates with your SIEM system using log files of the monitored events.
Advanced SIEM Integration
Page 25 of 148
Get access to the Ekran System alert events and monitored data by creating a separate log file in one of the following formats:
• Common Event Format (CEF)
• Log Event Extended Format (LEEF)
Advanced SIEM Integration
Page 26 of 148
Ekran System allows sending the records about the alerted events and monitored data directly to SIEM systems such as Splunk, ArcSight, and QRadar.
Licensing
Types of Licenses & Serial Key Management
Page 27 of 148
Licensing
Page 28 of 148
Ekran System is licensed by the number of Ekran Clients, end-points to be monitored. All management components, including Server and Management Tool, are provided for free with any deployment.
Types of Ekran Client licenses:
• Terminal Server Client license
• Infrastructure Server Client license
• Workstation Client license
• Linux / UNIX Server Client license
Licensing
Page 29 of 148
Serial Key & License Management
Page 30 of 148
Request a trial serial key for 30 days to deploy the system and review its basic features with a restriction of 3 Workstation Client licenses, 3 Linux/UNIX Server Client licenses, and 1 Terminal Server Client license.
To work with Ekran System for a longer period, license it by activating the serial keys on the computer with the installed Ekran Server. You can use either permanent keys, or update and support keys.
Enterprise Key
Page 31 of 148
Activate Enterprise serial key to get exclusive access to a set of additional, valuable features of Enterprise Edition of Ekran System.
Unique Enterprise Edition Features
Page 32 of 148
Features available only for Enterprise Edition:
• High Availability
• Multi-tenant
• Password Management
• Offline Clients Detection (“Lost” Clients)
• Integration with Ticketing System
• Granting User Access on Schedule
• User Behavior Analysis
• Server Resource Monitoring
• Database Archiving
• Advanced SIEM Integration
• IP Filtering
• Approving USB Access by Administrator
• SWIFT Username Monitoring
• Audio Recording
Client Installation & Update
Page 33 of 148
Installing Ekran Clients
Page 34 of 148
Convenient Ekran Client installation:
• Local:
o Linux Clients (via tar.gz file)
o macOS Clients (via tar.gz file)
o Windows Clients
using installation file with default parameters
using generated package with customized parameters
• Remote (for Windows Clients)
Remote Installation
Select computers to install Clients on
Customize installation parameters
The Clients are successfully installed!
Target Computers for Remote Installation
Page 35 of 148
• Scan your local computer network
• Define a range of IP addresses to search the target computers
• Simply enter target computer names
Updating Ekran Clients
Page 36 of 148
When Ekran Server is updated to a newer version, all Clients are automatically updated to the same version after their first connection to the Server.
If you want to personally supervise the update process of target Clients, you can disable the Update Client automatically option on them.
Monitoring Parameters
Page 37 of 148
Client Monitoring
Page 38 of 148
The screen captures the Client sends are stored in the form of deltas (differences between a newer recorded screen capture and an older one) to minimize storage space.
Recorded information is saved in an easy-to-review and easy-to-search form:
• The name of the launched application
• The title of the active window
• Entered URL
• Text entered via user’s keyboard (keystrokes)
• Clipboard text data (copied and pasted text)
• Commands executed in Linux (both from user input & by running the scripts)
• The information on plugged-in USB devices
User Activity Recording
Page 39 of 148
Ekran Client user activity recording is event-triggered by default.
You can configure Windows, macOS, and Linux Clients either to screenshot active window only or to record user activity without taking screenshots.
Audio Recording
Page 40 of 148
Ekran System allows recording any output and input sounds that have been played on the Windows Client machines.
The audio data can be monitored and recorded in the following applications:
• Skype • Slack• Zoom
• Viber• WhatsApp• Firefox
• Chrome• Opera• Internet Explorer
URL Monitoring
Page 41 of 148
Ekran Client monitors URLs entered in web browsers.
You can configure the Client to monitor full URLs or domains of top and second level only.
Keystroke Logging
Page 42 of 148
To ensure the GDPR compliance, all logged keystrokes are hidden, but you can perform searches within them and create alerts to be triggered when specific words are typed.
Also, keystrokes can be filtered, which allows you to reduce the amount of information received from the Windows Client and grant that there is no privacy violation by defining applications where keystrokes will be monitored.
Keyword-Triggered Monitoring
Page 43 of 148
You can configure Ekran Clients to start monitoring and creating screen captures only after detecting the defined keywords entered by the user in specified applications.
Clipboard Monitoring
Page 44 of 148
Ekran Client captures all text data, which has been copied or cut and then pasted into documents, files, applications, browser address bar, etc. on the Windows Client machines.
You can adjust an alert to be triggered whenever the user copies or cuts information and pastes it.
Application Filtering
Page 45 of 148
Ekran System allows you to define the filtering rules for websites/applications to adjust the amount of monitored data and exclude the areas where private information can be observed to comply with corporate policy rules and country regulations related to user privacy.
Monitoring Time Filtering
Page 46 of 148
In addition to application filtering rules, you can define monitoring time filtering ones.
By selecting certain days of the week and defining specific hours, you can establish the bounds in which Ekran Clients will record all user activity.
IP Filtering
Page 47 of 148
Additionally, you can filter out sessions from certain remote IP addresses or monitor only sessions from certain IP addresses.
SWIFT Username Monitoring
Page 48 of 148
Ekran System allows recording the user name used for logging into the SWIFT network so you can easily identify such users.
Privileged User Monitoring
Page 49 of 148
Monitor the activity of users logging in under privileged user accounts.
Bandwidth Usage Reduction
Page 50 of 148
Ekran System allows you to configure bandwidth usage reduction parameters to manage the traffic volume from the Client to Ekran Server.
The following parameters can be configured:
• Screenshot Throttling
• Batch Registration Timeout
• Screenshot size reducing
Client Group Settings
Page 51 of 148
You can define the settings for a Client Group and then apply them to the Client to save your time.
Monitoring via Linux Clients (X Window System)
Page 52 of 148
The Ekran System remote SSH session monitoring provides the ability to monitor the commands executed in the terminal.
Monitoring of the Linux sessions started locally via the graphical interface is supported as well.
Monitoring via Linux Clients (Remote Sessions)
Page 53 of 148
The remote Linux Client session contains:
• User actions (input commands and responses from the terminal)
• System calls
• Commands being executed in the running script
Monitoring via Linux Clients (Local Sessions)
Page 54 of 148
The local Linux Client session for X Window System contains:
• Screenshots
• Application name
• Activity title
• Activity time
Offline Client Detection(“Lost” Clients)
Page 55 of 148
Offline Clients Detection (“Lost” Clients)
Page 56 of 148
Offline Client detection will help you to timely detect Clients that have stopped transmitting monitoring data. Just define the time period after which the Clients will be considered “lost” and get notified about such incidents.
Viewing Offline Clients (“Lost” Clients)
Page 57 of 148
You can view all Clients that are offline for more than specified time period on the Offline Clients page.
Client Protection
Page 58 of 148
Protected Mode
Page 59 of 148
Ekran System allows you to protect Windows Clients and their data by enabling the Protected Mode.
The usage of Protected Mode has the following advantages:
• Prevention of Client uninstallation.
• Prevention of stopping Client processes.
• Prevention of editing Client system files and logs.
• Prevention of editing Client settings in the registry of the Client computer.
• Prevention of modification, removal, and renaming of Client files.
Client Uninstallation
Page 60 of 148
Users, including privileged ones, are unable to stop the Client working on their machines, as well as remove the Client locally without the Administrator assistance.
Only Ekran System Administrator knows the uninstallation key defined prior to Client installation and necessary for local removal.
Advanced User Authentication
Page 61 of 148
Advanced User Authentication
Page 62 of 148
Advanced user authentication allows you to achieve two goals:
• Monitor users’ activity on the computer when multiple users use the same credentials to log in.
• Improve your security by limiting the access to the specific users who know secondary authentication credentials.
Advanced User Authentication (Windows Clients)
Page 63 of 148
The Ekran System Client requests entering credentials before allowing a user to work with Windows OS.
One-Time Password (Windows Clients)
Page 64 of 148
Enterprise Edition Ekran System provides the administrator with a unique ability to protect the Client computer with a one-time password.
One-Time Password (Windows Clients)
Page 65 of 148
The user can request a one-time password directly from the secondary authentication window displayed on login to Windows OS.
Advanced User Authentication (Linux Clients)
Page 66 of 148
The Ekran System Client requests entering credentials before allowing a user to work with the terminal on Linux Client machines.
Two-Factor Authentication
Page 67 of 148
Two-Factor Authentication
Page 68 of 148
Two-factor authentication allows you to enable an extra layer of security to better protect the critical endpoints in your network.
Two-Factor Authentication
Page 69 of 148
Add users who will be allowed to log into the Windows and Linux machines with installed Clients using time-based one-time passwords (TOTP) generated in the TOTP mobile applications.
Two-Factor Authentication
Page 70 of 148
The Ekran System Client prompts the user to enter a TOTP to start working with the system.
Password Management
Page 71 of 148
Password Management
Page 72 of 148
Managing privileged accounts and implementing role-based access control is critical for enterprise security teams. Ekran System password management functionality provides you with full control and visibility over privileged user access.
With Ekran System, you can:
• Securely store credentials
• Provide granular access to stored credentials
• Manage passwords without interfering privileged users workflow
Adding Secret
Page 73 of 148
Add a Secret to define a computer to be accessed to, privileged account credentials, and a user or user group to give access to.
Logging in Using Secret
Page 74 of 148
The privileged user can access the critical endpoint via Secret using Ekran System Connection Manager.
Viewing Secrets in Sessions
Page 75 of 148
You can easily navigate to user sessions in which a specific Secret was used. In addition, the Secret data is highlighted in blue in the Session Player so you can quickly find it.
User and Entity Behavior Analytics
Page 76 of 148
User and Entity Behavior Analytics
Page 77 of 148
Ekran System User and Entity Behavior Analytics (UEBA) allows you to better protect your system from malicious and illicit insiders.
UEBA has the following advantages in detecting suspicious activities:
• Analysis of user behavior patterns and establishment of a baseline for
normal behavior.
• Automatic detection of behavioral deviations.
• Timely notification of potential insider threats.
User and Entity Behavior Analytics
Page 78 of 148
Add user behavior rule to view the user profiles, analyze the sessions with the detected anomalies, and get timely notified about the risky user activity.
User and Entity Behavior Analytics
Page 79 of 148
The monitored sessions that contain detected user behavior anomalies have a special risk score.
The risk score indicates the severity level of the session and is calculated according to the risk level of the abnormal user behavior patterns and alerts detected in the monitored sessions.
Administrator’s Approval on Login
Page 80 of 148
Administrator’s Approval on Login
Page 81 of 148
Administrator’s approval on login allows you to better protect the Client machines in your network from undesired access.
Administrator’s Approval on Login
Page 82 of 148
Add users whose access to the Client machines needs to be restricted.
Administrator’s Approval on Login
Page 83 of 148
When the restricted user logs into the Client machine, the Client blocks the desktop and sends the user’s access request to the administrator.
Administrator’s Approval on Login
Page 84 of 148
After the administrator confirms the user’s access request, the user is allowed to start working with the system.
Granting User Access on Schedule
Page 85 of 148
Granting User Access on Schedule (Enterprise Edition)
Page 86 of 148
Granting User Access on Schedule feature allows you to protect the Client computers from access at undesired time.
Granting User Access on Schedule (Enterprise Edition)
Page 87 of 148
Add users whose access to the Client machines will be granted only for a certain period of time out of which the administrator’s approval on login will be required.
Granting User Access on Schedule (Enterprise Edition)
Page 88 of 148
The restricted users will be able to log in to the Client computers during the defined time period and will need the administrator’s approval for login outside this period.
Notifying Users about Being Monitored
Page 89 of 148
Notifying Users about Being Monitored
Page 90 of 148
To follow the security policy of your company or your country regulations, you can:
• Enable displaying an additional message on user logging in to notify the user that his or her work is being monitored.
• Display a Client tray icon with the notification about monitoring to the user.
Notifying Users about Being Monitored
Page 91 of 148
• Require the users to enter the comments to the additional message displayed on their login to the Client computers.
Notifying Users about Being Monitored
Page 92 of 148
• Require the user to enter a valid ticket number created in the integrated ticketing system to start working with the Client machine.
Notifying Users about Being Monitored
Page 93 of 148
• Display the icon on the desktop to inform the users that their actions are currently being recorded.
User Blocking
Page 94 of 148
User Blocking Overview
Page 95 of 148
Ekran System allows you to block users performing potentially harmful and forbidden actions on computers with Windows OS with Ekran Clients
installed on them.
Users can be blocked manually from both Live and Finished sessions, or automatically when they perform an action that triggers a specific alert.
User Blocking Overview
Page 96 of 148
The user desktop is blocked, and after the defined time interval the user is forcibly logged out.
If the blocked user tries to log in to the Client computer, the system does not allow him/her to do so.
Viewing Blocked User List
Page 97 of 148
The Blocked User List contains information on when, and why the user was blocked.
To allow the users access to the Client Computer, remove them from the list.
Viewing Sessions
Page 98 of 148
Searching Data in Session List
Page 99 of 148
Ekran System Management Tool allows searching in the recorded sessions.
Search is performed by different parameters:
• For Windows Clients: active window title, application name, user name, Client name, visited URL, clipboard text data, user’s comment to the additional message, ticket number, USB device information.
• For macOS Clients: active window title, application name, user name, Client name, visited URL.
• For Linux Clients: commands, command parameters, and command output.
Viewing Live Session
Page 100 of 148
Ekran System allows you to perform monitoring of user activity and listen to the sounds being played on the Client machine in real time.
You can connect to a Live session and observe the activities a user is performing at the given moment.
Magnifying Glass
Page 101 of 148
You can enlarge certain parts of the video in the Session Player by using the Magnifying Glass.
Forensic Export
Page 102 of 148
With Ekran System Forensic Export, you can:
• Export a monitored session or its part to a securely encrypted file.
• Investigate the recorded user activity and audio data in the in-built offline session viewer.
• Present evidence in forensic format to the third parties.
Alerts
Page 103 of 148
Setting Up Alerts
Page 104 of 148
Ekran System allows you to enable quick incident response using alert notifications:
• Set up alerts about suspicious user activity on the Client computers.
• Specify individuals to receive instant alert notifications via email or in the Tray Notifications application.
You can set the alert to:
• Display a warning message to the user when the alert is triggered.
(The message can be edited)
• Block the user.
• Forcibly stop the application.
Alert Actions
Page 105 of 148
Default Alerts
Page 106 of 148
Ekran System contains a set of default alerts prepared by the vendor security experts. They will alarm you about data leakage, potentially fraudulent, illicit, or work-unrelated activities.
Alerts in Session Player
Page 107 of 148
Monitored data associated with alert events is highlighted in different colors in the Session Player according to the alert risk level.
Alerts in Alert Viewer
Page 108 of 148
You can view detailed information on all alert events as well as screen captures associated with them in a special viewer.
Receiving Alerts
Page 109 of 148
Receive alert notifications in real time, review them in the Ekran System Tray Notifications journal, and open the session with the alert-related data in the Session Player.
USB Monitoring
Page 110 of 148
USB Monitoring Overview
Page 111 of 148
Ekran System provides two types of monitoring USB devices plugged into the Windows Client computer:
• USB-based storage monitoring, to view information on the devices detected by Windows as mass storage and receive alert notifications.
• Kernel-level USB monitoring, for an in-depth analysis of plugged-in devices and their blocking.
Setting Up Kernel-level USB Rules
Page 112 of 148
Ekran System can detect mass storage devices connected to a computer, alert you on device plugging in, block their usage or forbid access to them until administrator’s approval (either all devices of a certain class or all except the allowed devices) on a Client computer.
USB-Based Storage Monitoring
Page 113 of 148
USB-based storages are automatically detected on being plugged in.
Kernel-Level USB Monitoring
Page 114 of 148
Screen captures created on USB devices being plugged in or blocked are highlighted in the Session Viewer.
Dashboards
Page 115 of 148
Dashboards Overview
Page 116 of 148
The dashboards offer a convenient real-time view of the most useful data grouped in one place.
Customize the dashboards on the Management Tool Home page by adjusting their look and settings.
Dashboard Types
Page 117 of 148
There are four main types of Ekran System dashboards:
System State Dashboards
o Licenses
o Clients
o Database Storage Usage
Monitoring Dashboards
o Recent Alerts
o Latest Live Sessions
Threat Detection Dashboards
o Sessions out of Work Hours
o Rarely Used Computers
o Rarely Used Logins
Server Resource Monitoring
o CPU Usage
o Memory Usage
o Database State
System State Dashboards
Page 118 of 148
Clients Database Storage Usage
Licenses
Monitoring Dashboards
Page 119 of 148
Recent Alerts
Latest Live Sessions
Threat Detection Dashboards
Page 120 of 148
Rarely Used Computers Rarely Used Logins
Sessions out of Work Hours
Server Resource Monitoring
Page 121 of 148
CPU Usage Memory Usage Database State
Interactive Monitoring
Page 122 of 148
Interactive Monitoring Overview
Page 123 of 148
You can filter out data by three parameters:
• Who: filter by a specific user logged into the Client computer.
• Where: filter by a specific Client.
• When: filter by the time period.
Additionally, you can set the order of bars being displayed, using the Applications and URLs filters.
Data is displayed in the form of two column charts (Application Monitoringchart and URL Monitoring chart).
To see the list of application/website entries, click on the column with the application/website name.
Application Monitoring Chart
Page 124 of 148
This chart provides information on the application usage frequency.
You can also use this chart to analyze information on the most and least used applications and detect any threats and suspicious activity on investigated computers.
URL Monitoring Chart
Page 125 of 148
This chart provides information on the website visiting frequency.
You can also use this chart to analyze information on the most and least visited websites and detect potentially harmful activity on investigated computers.
Reports
Page 126 of 148
Reports & Statistics
Page 127 of 148
Ekran System Reports provide the full overview of the time spent in applications and on websites visited on the user’s machine.
Generate a highly customizable report ad-hoc or schedule sending reports to your email on a daily, weekly, or monthly basis.
The reported activity can include alerts, launched applications, visited web-sites, plugged-in/blocked USB devices, and executed Linux commands.
Scheduled Reports
Reports & Statistics
Page 128 of 148
The reports can be generated manually at any time for any time period.
Manual Report Generation
Report Types
Page 129 of 148
Activity summary report Activity pie chart report
Activity chart report
Report Types
Page 130 of 148
User statistics report
Clipboard grid report
Report Types
Page 131 of 148
Session grid report
Sessions out of work hours grid report
Report Types
Page 132 of 148
Detailed activity report
User daily activity grid report
Report Types
Page 133 of 148
User Productivity report
Report Types
Page 134 of 148
Alert grid report
Report Types
Page 135 of 148
User behavior analysis report
Report Types
Page 136 of 148
URL pie chart reportURL summary report
URL chart report
Report Types
Page 137 of 148
USB storage grid report
Kernel-level USB storage grid report
Report Types
Page 138 of 148
Terminal server grid report
Report Types
Page 139 of 148
In the Linux grid report, you can view all exec* and sudo commands executed on Linux Client computers.
Linux grid report
Application Customization
Page 140 of 148
Date and Time Format
Page 141 of 148
Date&Time Format configuration allows you to define the date and time format for the Management Tool and the Server.
Custom Logo on Client Notifications
Page 142 of 148
Custom Logo settings allow you to enable using custom graphic files instead of the default logo on the Client notifications during secondary authentication, user blocking, etc.
Report Customization
Page 143 of 148
Custom Reports settings allow you to enable using custom graphic file instead of the default logo in the reports. Also, you can add the header and footer text in the reports.
Custom Email Subjects
Page 144 of 148
Custom Email Subjects settings allow you to define the subjects to be used in email notifications sent by Ekran System.
Health Monitoring
Page 145 of 148
System Health Monitoring
Page 146 of 148
System Health Monitoring allows you to get detailed information about the database storage usage and errors occurring in Ekran System which helps to monitor the system “health” and react to any problems in time.
Server Resource Monitoring
Page 147 of 148
Ekran System allows you to see the resource usage by the Ekran System Server process at the moment:
• CPU Usage by Server process
• Memory Usage by Server process
• Database State
Visit us online:
www.ekransystem.com
Page 148 of 148
Recommended