As inDefend is a security software,if anyone tries to tamper the software all the outgoing connections and access to all removable storage devices will be blocked.
Q1. What happens if someone tampers with the inDefend Agent?
Q2. Is it possible for the end-user to unnistall inDefend Business agent?
As inDefend is a security software,Uninstalltion of inDefend Agent from any computer will be only possible with the correct Installation password.This password is only known to the inDefend Administrator.
Q 3. How much time it will take for the inDefend Agent installation?
It will take approximately 5 minutes to install the inDefend Business Agent
Q 4. What are the supported Operating Systems for installing inDefend Agent?
inDefend Business Agent
Technical Specification for Installing inDefend Business Agent on your organization
- Hardware Requirements
- RAM: 256 MB or more
- Processor: Intel Pentium III-compatible or above
- 100 MB of available hard-disk space
- Software Requirements
- Supported Operating Systems
- Microsoft Windows XP 32-bit & 64-bit Service Pack 2 or above (All licensed editions)
- Microsoft Windows Server 2003 32-bit & 64-bit (All licensed editions)
- Microsoft Windows Vista 32-bit & 64-bit (All licensed editions)
- Microsoft Windows Server 2008 32-bit & 64-bit (All licensed editions)
- Microsoft Windows 7 32-bit & 64-bit (All licensed editions)
Q 5. what are the pre-requisites software for installing inDefend Agent?
Q 6. What are the system Requirements for installing inDefend Agent?
- RAM – 2GB or above
- Hard disk space – 1 GB free hard disk or above
- CPU – Intel Pentium IV and above
Q 7. How inDefend is better than a standard Firewall?
|Differentiating Features of the Product||inDefend Business||Standard Firewall Solution*|
|Device Control & Monitoring|
|USB Storage Device Control and Monitoring||Yes||No|
|USB Storage Device Specific Control and Monitoring||Yes||No|
|White-listing of USB Storage Devices||Yes||No|
|CD-DVD Access Control and Monitoring||Yes||No|
|Forced Encryption on Removable Storage Drives||Yes||No|
|Internal Access Restriction** (Advanced Encryption Control)||Yes||No|
|Monitoring of Files copied to USB Drives||Yes||No|
|Internet Control & Monitoring|
|Browser Control (Website Filtering using pre-defined website categories)||Yes||Yes|
|HTTP/HTTPS File Upload Monitoring and Control||Yes||Yes|
|Complete Shadow Logs of Uploaded Files||Yes||No|
|SMTP Email Monitoring and Control (Any Port)||Yes||Yes|
|SMTP Email Attachment Monitoring and Control (Any Port)||Yes||Yes|
|Complete Shadow Logs of Emails and Attachments||Yes||No|
|Gmail Monitoring (both through browser and email client)||Yes||No|
|Gmail Attachment Monitoring and Control (both through browser and email client)||Yes||No|
|Attachment Monitoring and Control for other webmail services (both through browser and email client)||Yes||No|
|Complete Shadow Logs of Gmails, Drafted Gmails and Attachments||Yes||No|
|Internet Application Connectivity Control and Monitoring|
|Category based Application Connectivity Monitoring||Yes||No|
|Application Signature based Application connectivity control (application control whitelist)||Yes||No|
|Proxy (UDP/HTTP)and Tunnelling Application Control||Yes||No|
|Torrent and P2P Application Control||Yes||No|
|IM/Chat/VoIP/Remote Desktop Sharing Application Control||Yes||No|
|Download Accelerator Application Control||Yes||No|
|Uncategorized/Unauthorized Application Control||Yes||No|
|Network Printer Control||Yes||Yes|
|Instant Messenger Chat Monitoring|
|Skype Chat Monitoring||Yes||No|
|Gmail/GTalk Chat Monitoring||Yes||No|
|Search Engine (Google/Yahoo/Bing) Activity Monitoring||Yes||Yes|
|Silent Employee Monitoring|
|End-user Desktop Screenshot Recording||Yes||No|
|Stealth Mode for Silent Monitoring||Yes||NA|
|Internet Bandwidth Monitoring and Control|
|Bandwidth Monitoring of Internet and Network||Upcoming Feature||Yes|
|Bandwidth Control of Internet and Network||Upcoming Feature||Yes|
|Monitoring and Control of Roaming Workforce|
|Offline Policy Implementation and Locking (For roaming laptops)||Yes||No|
|Offline Monitoring and Recording (For roaming laptops)||Yes||No|
|Cloud-based server setup (using public static IP and port-forwarding/virtualserver)||Yes||NA|
|Policy Implementation and Monitoring for traffic through DataCards and Thirdparty Wifi/LAN||Yes||No|
|Easy Administration Features|
|User-based policies (For Organizations with Active Directory)||Yes||Yes|
|Remote Silent Agent Deployment (For Organizations with Active Directory)||Yes||NA|
|Advanced Analytics based on Cyber Intelligence||Yes||No|
|Detailed Reports with Print functionality||Yes||Yes|
|Threat Center for better policy recommendation||Yes||No|
|Temporary User Policies||Yes||Yes|
|Tamper Proof (Password protected Installation/Uninstall)||Yes||NA|
|Centralized Admin Control with Web based Dashboard||Yes||Yes|
|SMTP Email Alerts for Administrator||Yes||Yes|
|Centralized Remote Agent Update Management||Yes||NA|
|NO Single Point of Failure (If server goes down, policies remain implemented)||Yes||No|
|* Considering standard firewall solutions available in the market|
|** Internal Access Restriction refers to the fact that data can be copied to USB storage devices only in encrypted manner and this data cannot be accessed from Non-organization computers|
Q 8. Can I restrict the downloads by inDefend Agent?
No.We do not monitor downloads as in this case data are not going outside of your organization.
Q 9. What are the features of inDefend Business?
Q 10. What is the cost of Product and premium maintenance?
Q 11. After Installing inDefend Agents how to check that agents are properly getting installed or not?
- First go to Agent Install/UnInstall log section in server dashboard to check whether Agent are properly installed or not
- Go to Agent Management Section and check whether the last connected time for those agents is getting updated or not after restarting those agent’s computer to ensure the connectivity between inDefend Business Agent and Server.