Sales +91-9266603983

Frequently Asked Questions


Q1. What happens if someone tampers with the inDefend Agent?

As inDefend is a security software,if anyone tries to tamper the software all the outgoing connections and access to all removable storage devices will be blocked.

Q2. Is it possible for the end-user to unnistall inDefend Business agent?

As inDefend is a security software,Uninstalltion of inDefend Agent from any computer will be only possible with the correct Installation password.This password is only known to the inDefend Administrator.

Q 3. How much time it will take for the inDefend Agent installation?

It will take approximately 5 minutes to install the inDefend Business Agent

Q 4. What are the supported Operating Systems for installing inDefend Agent?

inDefend Business Agent

Technical Specification for Installing inDefend Business Agent on your organization

  • Hardware Requirements
    • RAM: 256 MB or more
    • Processor: Intel Pentium III-compatible or above
    • 100 MB of available hard-disk space
  • Software Requirements
  • Supported Operating Systems
    • Microsoft Windows XP 32-bit & 64-bit Service Pack 2 or above (All licensed editions)
    • Microsoft Windows Server 2003 32-bit & 64-bit (All licensed editions)
    • Microsoft Windows Vista 32-bit & 64-bit (All licensed editions)
    • Microsoft Windows Server 2008 32-bit & 64-bit (All licensed editions)
    • Microsoft Windows 7 32-bit & 64-bit (All licensed editions)
Q 5. what are the pre-requisites software for installing inDefend Agent?
Pre-requisites software required for installing Agent is  .Net 4.6 and above.
Q 6. What are the system Requirements for installing inDefend Agent?
System requirements for installing inDefend Agent is mentioned below:


  • RAM – 2GB or above
  • Hard disk space – 1 GB free hard disk or above
  • CPU – Intel Pentium IV and above
Q 7. How inDefend is better than a standard Firewall?
Differentiating Features of the Product inDefend Business Standard Firewall Solution*
Device Control & Monitoring
USB Storage Device Control and Monitoring Yes No
USB Storage Device Specific Control and Monitoring Yes No
White-listing of USB Storage Devices Yes No
CD-DVD Access Control and Monitoring Yes No
Forced Encryption on Removable Storage Drives Yes No
Internal Access Restriction** (Advanced Encryption Control) Yes No
Monitoring of Files copied to USB Drives Yes No
Internet Control & Monitoring
Browser Control (Website Filtering using pre-defined website categories) Yes Yes
HTTP/HTTPS File Upload Monitoring and Control Yes Yes
Complete Shadow Logs of Uploaded Files Yes No
SMTP Email Monitoring and Control (Any Port) Yes Yes
SMTP Email Attachment Monitoring and Control (Any Port) Yes Yes
Complete Shadow Logs of Emails and Attachments Yes No
Gmail Monitoring (both through browser and email client) Yes No
Gmail Attachment Monitoring and Control (both through browser and email client) Yes No
Attachment Monitoring and Control for other webmail services (both through browser and email client) Yes No
Complete Shadow Logs of Gmails, Drafted Gmails and Attachments Yes No
Internet Application Connectivity Control and Monitoring
Category based Application Connectivity Monitoring Yes No
Application Signature based Application connectivity control (application control whitelist) Yes No
Proxy (UDP/HTTP)and Tunnelling Application Control Yes No
Torrent and P2P Application Control Yes No
IM/Chat/VoIP/Remote Desktop Sharing Application Control Yes No
Download Accelerator Application Control Yes No
Uncategorized/Unauthorized Application Control Yes No
Network Printer Control Yes Yes
Instant Messenger Chat Monitoring
Skype Chat Monitoring Yes No
Gmail/GTalk Chat Monitoring Yes No
Search Engine (Google/Yahoo/Bing) Activity Monitoring Yes Yes
Silent Employee Monitoring
End-user Desktop Screenshot Recording Yes No
Stealth Mode for Silent Monitoring Yes NA
Internet Bandwidth Monitoring and Control
Bandwidth Monitoring of Internet and Network Upcoming Feature Yes
Bandwidth Control of Internet and Network Upcoming Feature Yes
Monitoring and Control of Roaming Workforce
Offline Policy Implementation and Locking (For roaming laptops) Yes No
Offline Monitoring and Recording (For roaming laptops) Yes No
Cloud-based server setup (using public static IP and port-forwarding/virtualserver) Yes NA
Policy Implementation and Monitoring for traffic through DataCards and Thirdparty Wifi/LAN Yes No
Easy Administration Features
User-based policies (For Organizations with Active Directory) Yes Yes
Remote Silent Agent Deployment (For Organizations with Active Directory) Yes NA
Advanced Analytics based on Cyber Intelligence Yes No
Detailed Reports with Print functionality Yes Yes
Threat Center for better policy recommendation Yes No
Temporary User Policies Yes Yes
Tamper Proof (Password protected Installation/Uninstall) Yes NA
Centralized Admin Control with Web based Dashboard Yes Yes
SMTP Email Alerts for Administrator Yes Yes
Centralized Remote Agent Update Management Yes NA
NO Single Point of Failure (If server goes down, policies remain implemented) Yes No
VPN Supported Yes Yes
* Considering standard firewall solutions available in the market
** Internal Access Restriction refers to the fact that data can be copied to USB storage devices only in encrypted manner and this data cannot be accessed from Non-organization computers
Q 8. Can I restrict the downloads by inDefend Agent?

No.We do not monitor downloads as in this case data are not going outside of your organization.

Q 9. What are the features of inDefend Business?

For detailed information please Refer to this page

Q 10. What is the cost of Product and premium maintenance?

For detailed information please contact our sales team

Q 11. After Installing inDefend Agents how to check that agents are properly getting installed or not?
  • First go to Agent Install/UnInstall log section in server dashboard to check whether Agent are properly installed or not
  • Go to Agent Management Section and check whether the last connected time for those agents is getting updated or not after restarting those agent’s computer to ensure the connectivity between inDefend Business Agent and Server.