License: Free to try
Downloads: 1
Op. System: Windows2000, WinXP, Windows2003
Last updated: 03-02-2006
File size: 5.55 MB
Publisher: EagleEyeOS LLC.

Publisher description for EagleEyeOS

EagleEyeOS program icon

File Lifecycle Tracking (FLT) Who did what and when did it with the file? Where and under what name can the file be found? FLT is a specially developed feature to trace what kind of operations happened with the file since its creation. This function marks the parallel life-tracks of the file with branches, it is also possible to search the files lifecycle directly from the queried Reports. Device handling Possibility to establish the access policy of a general purpose communication media. Such Devices can be Floppy-, CD-, DVD drives, Infrared, COM, LPT, USB, Bluetooth, Wireless ports, etc. The most important feature of it is to block the devices irrespectively of whether at the moment there is a Device connected to the host or not. Quarantine A special document area protection can be created, which provides the possibility to creat separate territories. Data movement can be controlled within this area, as well as beyond. It has the important ability to define approved users, applications, printers in the area, and specify the path to where the data can be exported to. It has the ability to separate the information from the Local and Domain Administrator, and the separation of the same application - running in the Quarantine and outside of it. Notebook handling - Running on the kernel level offers the possibility to keep the defined rules after losing the connection with the network, and to make them impossible to by-pass. It is possible to disable the Bluetooth devices, pen-drives on a notebook removed from the network. Furthermore it is an important property that the users processes will be logged locally together with the date and time of the disconnection and reconnection. At the next network connection to the Server, the rules and the logs will be synchronized. Printer - Printer rules can also be predefined. With their help, it can be determined which printers can be used or blocked on a certain host to maintain the control of the printed.

Add your review

User reviews