Docs

Ping32

Screen Security

Computer screens are the most intuitive human-computer interface. By implementing screen security, enterprises can monitor activities and manage internal threat risks more directly.

Overview

The Screen Security module allows real-time monitoring of employee activity with continuous recording, supporting audits and retrospection to detect any violations. It also supports watermarking on terminals to deter data leakage.

 

Intelligent Screenshots

The Intelligent Screenshot feature periodically captures desktop images on employee terminals and classifies them intelligently, helping enterprises monitor work activity and identify potential risks. Additional capabilities include:

  • Triggered screenshots: Automatically capture when specific processes or applications start or run, allowing precise monitoring of targeted applications.

  • Adjustable intervals: Set custom capture frequency to meet monitoring needs.

  • Image quality adjustment: Modify screenshot clarity to suit different display devices and storage requirements.

  • Storage location selection: Save screenshots locally or on the server for security and auditability.

  • Intelligent analysis: Analyze screenshots to detect abnormal behavior or potential risks automatically.

 

Screen Recording

Ping32 supports full-day screen recording and triggered recording for important applications, ensuring system security and stability.

  • Recording audit: Configure frame rate, interval, and quality for monitoring.

  • Storage management: Save recordings to designated servers to prevent loss or tampering.

  • Triggered recording: Record only under specific conditions, reducing unnecessary storage use.

  • Advanced settings: Customize frame rate, threads, minimum and maximum bitrate according to enterprise requirements.

 

Screenshot Control

Screenshot control restricts common tools like Print Screen as well as software such as QQ, WeChat, PicPick, etc., preventing sensitive data leaks.

Key capabilities:

  • Screenshot logs: Record all screenshot activities including time, user, and content.

  • Intelligent analysis: Detect suspicious or abnormal screenshot activity.

  • Disable screenshots: Block all unauthorized captures.

  • Process-specific control: Prevent screenshots for designated applications or processes.

  • Watermark settings: Add watermarks with user name, IP, or other info to trace leaked content.

 

Screen Watermark

Screen watermarks protect sensitive information by overlaying text or graphics.

  • Customizable to include enterprise name, timestamp, IP info, etc.

  • Acts as a deterrent against photography, screen recording, or screenshots.

  • Serves as a reminder to employees about the sensitivity of displayed data.

 

Window Watermark

Window watermarks are applied to specific applications only when they are in the foreground, providing flexibility and minimal interference.

  • Text watermarks: Display UID, IP, MAC, or custom text, with adjustable size, tilt, and opacity.

  • Dot matrix watermarks: Display pixel patterns to minimize visual interference while maintaining traceability.

 

Resources

We provide detailed courses to help you master Ping32 and troubleshoot issues, offering high-quality services and solutions for your enterprise or clients.

Concept