Received the award: China’s first professional server sharing file monitoring software
Software introduction:
Dashizhi Company Computer Data Leakage Prevention Software is a software specially designed to protect the security of company computer data and prevent the leakage of computer files. It can effectively disable U disks and the use of USB storage devices. It can also prohibit the computer from sending emails and prohibiting network disk uploads. Computer files, prohibit QQ files from being sent, prohibit FTP file uploads, etc. to prevent network leaks and fully protect the security of computer files.
The main functions of this system are as follows:
Ab relied on USB storage devices, including USB flash drives, mobile hard drives, mobile phones, tablets, etc. It does not affect USB mice, keyboards, dongles, etc.
》Set a specific U disk, that is, the computer can only recognize U disks in the white list. At the same time, you can also set secondary permissions for specific U disks.
》Only allow files to be copied from the USB flash drive to the computer, and prohibit the computer from copying files to the USB flash drive, or only allow the computer to copy files to the USB flash drive, and prohibit the USB flash drive from copying files to the computer.
Password permission settings. When copying files from the computer to a USB flash drive or mobile hard disk, you need to enter the administrator password.
》Disable the CD/DVD drive and the CD-ROM burning function, but allow the CD/DVD drive to read and disable the floppy drive.
》Monitor USB storage device copy records. Detailed record of the log when copying computer files from USB flash drive, including copy time, file name, etc.
b. Comprehensively prevent the leakage of secrets through the Internet
》It is forbidden to leak secrets through chat software. Set specific QQ, allow QQ chat but prohibit file transfer, prohibit QQ group file transfer, prohibit WeChat file transfer, etc.
》It is forbidden to upload files outside the mailbox. It is forbidden to log in to all mailboxes, allowed to log in to specific mailboxes, only allowed to receive emails and prohibited from sending emails, etc.
》It is forbidden to transfer files from the network disk to the outside. It is prohibited to use all network disks and cloud disks, and you can also set the use of specific network disks, cloud disks, etc.
》Program black and white list management. Set a list of programs that are prohibited from running, or set a list of programs that are only allowed to run.
》Webpage black and white list management. Set a list of URLs that are prohibited from opening, or set a list of URLs that are only allowed to be opened.
It is prohibited to log in to forums, blogs, post bars, spaces, etc., it is prohibited to use FTP to upload files, it is prohibited to transfer files between mobile phones and computers through the network, etc.
c. Operating system underlying protection
》Disable registry, disable device manager, disable group policy, disable computer management, disable task manager, disable Msconfig, disable safe mode, disable CD boot computer, disable infrared, disable serial/parallel port, disable 1394, disable PCMCIA, disable modem
》Disable U disk to start the computer, disable DOS commands, disable formatting and Ghost, prohibit modification of IP/Mac, block PrtScn, block Esc key, block clipboard, prohibit network sharing, prohibit viewing process, block Win key, block Ctrl+Alt +A key, disable Telnet, and automatically hide and run when booting the system
》Set a global whitelist, prohibit LAN communication, disable virtual machines, prohibit user creation, disable wired network cards, disable wireless network cards, prohibit installation of portable WIFI, disable Bluetooth, login password settings, software callout hotkey management, installation directory permission management, UAC management, recovery management
》It is forbidden to press F8 to enter safe mode when booting, prohibit the optical drive from starting the operating system, prohibit the USB disk from starting the operating system, prohibit the PE disk from starting the computer, etc., to prevent various means from bypassing system monitoring.
it works
it works
it works