CurrentWare v7.0.2 is here! Read the release blog to learn more.

AccessPatrol has 7 dashboards, giving you visibilities on file operations and device activities from your entire organization. With AccessPatrol’s web dashboard, you will gain the insights you need to enforce your removable media policy with great confidence. 

These dashboards work in tandem with AccessPatrol’s USB activity reports to give you advanced insights into how peripherals such as portable storage devices are being used in your organization.

Hey everyone, this is Dale here. I am the Digital Marketing Manager for CurrentWare.

In today’s video, I’d like to show off the new USB activity dashboards introduced to AccessPatrol in version 7.0.

These dashboards provide a convenient overview of the peripheral device usage of your entire workforce as well as specific groups or users—all from the convenience of a web browser.

They work in tandem with AccessPatrol’s device control features and USB activity reports to protect sensitive data against the security risks of portable storage devices.

Today’s video is just a sneak peek of what AccessPatrol is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards.

At this time, AccessPatrol can track activities from the following peripherals:

  1. Portable storage devices such as USB flash drives, external hard drives, optical discs, tape drives, and SD cards
  2. and Mobile devices including smartphones, PDAs, and tablets

This device usage data is used to populate various graphs across AccessPatrol’s dashboards. You can further refine how granular this data is by limiting the time frame, selecting only specific groups, and even investigating individual users.

Having these metrics available at a glance makes detecting potential insider threats far more efficient as your organization scales. 

Any groups or users that need to be reviewed further can be investigated using the more granular dashboards and AccessPatrol’s device activity reports.

For a more proactive approach to insider threat management you can set up targeted alerts that will notify designated staff members when these high-risk activities occur. 

For the most up-to-date information on AccessPatrol’s activity tracking and data loss prevention capabilities, visit our knowledge base at CurrentWare.com/Support or visit the AccessPatrol product page at CurrentWare.com/AccessPatrol

 In the overview dashboard you can review the following metrics:

  • File Operations that happened over the selected time period, including the number of files that have been copied/created, the number of files that have been deleted, and the number of files that have been renamed/saved as.
  • Overall Device Activities, with a breakdown of how many of the peripherals were authorized and how many were blocked from use.
  • The Top 5 File Types graph shows the most common file types that are copied/created or deleted to and from portable storage devices
  • The Top 5 Device Types graph shows the most common classes of peripheral devices that are blocked and allowed
  • The Top 5 Files Operations graph shows which groups or users have the greatest number of files that have been Copied/Created and Deleted to and from portable storage devices
  • The Top 5 Devices Activities graph shows which groups or users have the greatest number of Blocked and Allowed devices.
  • And finally, The Activity Log provides access to the raw data, with controls to show and hide certain columns, filter and sort data, conduct searches, and export the data to an Excel spreadsheet or PDF. Each dashboard has their own Activity Log with columns that are relevant to that specific dashboard.

Moving on to the Files Dashboard you will see…

  • A timeline of file operations that shows the relationship between the various operations over the course of the selected time period. This can be used to search for patterns in anomalous device usage, such as peaks in file transfers outside of regular operating hours.
  • You will also see graphs with the Top File Types Copied/Created to internal hard drives and external devices
  • Below that, we have graphs that show the users or groups that have Copied/Created or Deleted the most files
  • And, just like the overview dashboard, there is an Activity Log with the raw data.

Finally, we have the Devices Dashboard

In this dashboard, we have…

  • A device activities graph that shows a timeline with the number of allowed and blocked devices each day. This can be further refined to show an hourly breakdown of a specific day so you can find out what time your users were attempting to use blocked devices. 
  • Next, we have graphs with the users or groups that have the most allowed and blocked devices activity over the selected time period. 
  • Scrolling down to the Activity Log, we can use the sorting controls to take a closer look at the users that have been attempting to use unauthorized peripherals.

As you can see, we have specific users that are repeatedly trying to use devices that have not been approved for use by the organization.

While this could just be an accidental oversight on the user’s part, there’s a risk that it’s something much more serious. 

For example, what if this is actually a disgruntled employee trying to steal trade secrets or sensitive customer data so they can bring it to a competitor, or worse, sell it to cybercriminals on the dark web.

Between the costs associated with a damaged reputation, fines, loss of competitive advantage, and remediation, a data breach like this could completely ruin a company.

Before we confront this employee or send them for retraining, let’s investigate this incident further so we can make an informed decision.

Clicking on this user, we’ll be taken to a dashboard that focuses exclusively on their activity. 

Looking at the Devices graph we can see that they have made multiple attempts to use blocked devices. 

Scrolling down, we can see that they’ve been trying to use unauthorized portable storage devices.

Since AccessPatrol is currently blocking any devices that are not explicitly allowed, I know that the only way sensitive data is leaving through a USB drive is if it’s a device that we’ve allowed before. So, let’s take a closer look at how they’ve been using their approved devices.

As you can see here, the types of files that they are transferring are more than capable of containing sensitive data; let’s take a look at the file names for more details.

With the Activity Log we can use the filters, sorting, and column options to isolate our view to the entries we’re the most interested in. 

Once we find something that looks off, we have more than enough information to confront this employee and take any necessary corrective actions.

Ready to protect your sensitive data against theft to USB portable storage devices? Block and monitor peripheral device usage today with a free trial of AccessPatrol, CurrentWare’s USB control software.

Simply visit CurrentWare.com/Download to get started instantly, or get in touch with us at CurrentWare.com/Contact to book a demo with one of our team members. See you next time!

Dashboards:

  • Overview
  • Files
  • Devices
  • Groups (Users)
  • Users
  • Groups (Computers
  • Computers

Overview

This dashboard provides a quick glance at your team’s file operations and device activities. Drill down by department/user to gain further insight. 

Charts:

  1. File operations and device activities scorecards
  2. Top 5 file types copied/created and deleted
  3. Top 5 device types blocked and allowed
  4. Top 5 file operations by groups/computers/users
  5. Top 5 device activities by groups/computers/users
  6. Activity log for file operations and devices activities

Files

This dashboard provides top-level information about your organization’s file operations based on your users’ file activities. Gain insight on files being transferred onto your users’ internal hard drives. Audit file transfers and files deleted based on file names, destination path and file types.

Charts:

  1. File activities graph
  2. Top 5 file types copied/created to internal hard drives
  3. Top 5 file types copied/created to external devices
  4. Top 5 files copied/created by groups/computers/users
  5. Top 5 files deleted by groups/computers/users
  6. Activity Log

Devices

This dashboard provides top-level information about your organization’s device activities. You can drill down to see what devices were blocked and which authorized devices were allowed.

Charts:

  1. Device Activities
  2. Top 5 devices blocked
  3. Top 5 devices allowed
  4. Activity Log

Groups Dashboard

This dashboard provides a summary of your group’s computer activities, showing you the top 5 users with the most file operations and device activities along with a detailed activity log.

Charts:

  1. Top 5 file operations by users
  2. Top 5 device activities by users
  3. Activity Log

Users/Computers Dashboard

This dashboard provides detailed information about each user/computer in your company. On the top, you can see the user’s connection status (logged in/logged off or connected/disconnected) along with the group that they belong to.

Charts:

  1. File operations scorecard
  2. Device activities scorecard 
  3. Files activities graph
  4. Device activities graph
  5. Top 5 file types
  6. Top 5 device types
  7. Activity Log – Files
  8. Activity Log – Devices

Using the Dashboard

On each dashboard page, you have the option to change the selection based on the groups/users/computers that you want to display. You can also change the date range using the date picker. 

Groups/Users/Computers Selections
Choose all groups to see reports on your entire organization. Filter down to specific groups and users to gauge how your departments are performing. 

The charts on the dashboards will change depending on your selection. For example, if you select groups, the Top 5 Active Time charts under the Overview will display the top 5 groups. Whereas, when you select all users, that chart will display your top 5 users. 

Date Picker
Change the date to compare how your organization is performing based on your date range. Presets buttons are available for quick access to common date ranges such as today, this week and last 30 days. 


Analyzing data using the Activity Log 

Each dashboard contains an activity log at the bottom of the page to give you detailed information on your organization’s activities. 

  • Sorting: every column is sorted. Click on the header to sort the data. 
  • Search: use this to narrow down the results. This is especially useful in detailed tables where you want to search for activities on specific websites or applications. 
  • Optional Columns: some tables contain optional columns that are hidden by default. Click on the 3 dots to reveal these optional columns. 
  • Export to PDF/Excel: to take your data further, you can export them in .PDF or .xlsx format to perform your own data analysis. 
  • Filtering: filter the values from a column by using filtering operations

Dashboard Settings Menu

Located on the top right hand corner of the page, there is a gear icon (settings) that lets you configure AccessPatrol settings. 

  • More Reports: a shortcut that takes you to the legacy report window
  • Device Type Filter: exclude certain device types from the dashboards
  • Exclude Device & File Names: a shortcut that takes you to the setting to exclude devices and file names from your dashboards
  • Delete Data: a shortcut that takes you to the data deletion tool

New to CurrentWare? Get Started Today!

“I chose CurrentWare for the solid product that gave more options with a lower price tag, high accuracy, and solid customer support.” -Vincent Pecoreno Network Administrator, Viking Yachts