Received the award: China’s first professional server sharing file monitoring software
Software introduction:
Dazhi Company Computer Data Leakage Prevention Software is a software that specifically protects the security of company computer data and prevents the leakage of computer files. It can effectively disable U disks and the use of USB storage devices. It can also prohibit computers from sending emails, prohibiting network disks from uploading computer files, prohibiting QQ from sending files, prohibiting FTP file uploads, etc. to prevent network leaks and comprehensively protect computer file security.
The main functions of this system are as follows:
Ab relied on USB storage devices, including USB flash drives, mobile hard drives, mobile phones, tablets, etc. It does not affect USB mice, keyboards, dongles, etc.
》Set a specific U disk, that is, the computer can only recognize U disks in the white list. At the same time, you can also set secondary permissions for specific U disks.
》Only allow files to be copied from the USB flash drive to the computer, and prohibit the computer from copying files to the USB flash drive, or only allow the computer to copy files to the USB flash drive, and prohibit the USB flash drive from copying files to the computer.
Password permission settings. When copying files from the computer to a USB flash drive or mobile hard disk, you need to enter the administrator password.
》Disable the CD/DVD drive and the CD-ROM burning function, but allow the CD/DVD drive to read and disable the floppy drive.
》Monitor USB storage device copy records. Detailed record of the log when copying computer files from USB flash drive, including copy time, file name, etc.
b. Comprehensively prevent the leakage of secrets through the Internet
》It is forbidden to leak secrets through chat software. Set specific QQ, allow QQ chat but prohibit file transfer, prohibit QQ group file transfer, prohibit WeChat file transfer, etc.
》It is forbidden to upload files outside the mailbox. It is forbidden to log in to all mailboxes, allowed to log in to specific mailboxes, only allowed to receive emails and prohibited from sending emails, etc.
》It is forbidden to transfer files from the network disk to the outside. It is prohibited to use all network disks and cloud disks, and you can also set the use of specific network disks, cloud disks, etc.
》Program black and white list management. Set a list of programs that are prohibited from running, or set a list of programs that are only allowed to run.
》Webpage black and white list management. Set a list of URLs that are prohibited from opening, or set a list of URLs that are only allowed to be opened.
It is prohibited to log in to forums, blogs, post bars, spaces, etc., it is prohibited to use FTP to upload files, it is prohibited to transfer files between mobile phones and computers through the network, etc.
c. Operating system underlying protection
deddie in the matter
》Disable U disk to start the computer, disable DOS commands, disable formatting and Ghost, prohibit modifying IP/Mac, block PrtScn, block the Esc key, block the clipboard, prohibit network sharing, prohibit viewing processes, block the Win key, block the Ctrl+Alt+A key, disable Telnet, and automatically hide the operation when the system is turned on.
》Set global whitelist, prohibit LAN communication, disable virtual machines, prohibit creation of users, disable wired network cards, disable wireless network cards, prohibit installation of portable WIFI, disable Bluetooth, login password settings, software callout hotkey management, installation directory permission management, UAC management, recovery management
》It is forbidden to press F8 to enter safe mode when booting, prohibit the optical drive from starting the operating system, prohibit the U disk from starting the operating system, prohibit the PE disk from starting the computer, etc., to prevent various means from bypassing system monitoring.















Useful
Useful
Useful