GETTING STARTED with AreaGuard Neo

Installation and deployment of clients – Data collection and monitoring – Data evaluation – Security policy settings and parameters

Installing the AreaGuard Neo server and client

The installation of AreaGuard Neo consists of:

Encryption on the clients begins immediately after installation of the client software, based on the settings defined by the administrator console. Based on the basic settings:

Encryption runs in the background, allowing users to work unimpeded. Once encryption is completed, notification of encryption is sent to the administrator.

In addition to data encryption, AreaGuard Neo allows you to define specific USB devices that are allowed or disallowed. Typically, this is done through Whitelists of devices that are allowed to read and copy data to and from the client computers. Whitelist entries can be based on the type or the serial number of the device.

Monitoring client behavior

In addition to encrypting defined folders, files and user profiles, AreaGuard Neo collects client behavior data. This provides the administrator with detailed information about each station’s security status. Based on this information, the administrator can modify the encryption and USB device settings by specific user. Client behavior information is also valuable for forensic purposes, i.e. as evidence of potential inappropriate activities.

Administrator console

The administrator console is the central component of AreaGuard Neo. The admin console is used to install and uninstall the clients, arrange and evaluate the collected client behavior data according to specified criteria. Additional functions include the administration of encryption keys, setting target directories to-be encrypted, and managing removable devices.

Efficient tabs allow you to move quickly between the various modules. Rather than having to plod through lists of logins, the admin console allows you to easily navigate user activities as they relate to objects that you select in the navigation tree. The tabs display logs of various activities by date and time, as well as the user that was logged in to the computer at the time the activity in question occurred, as well as a description of the activity. Expanding the log entry reveals more detailed information. The logs can be organized according to user preference.

Action buttons allow you to set rules and limitation for each client, user, group and domain.


TOPlist