Introducing New Features Across the Platform | Release 650
Product Release

Introducing New Features Across the Platform | Release 650

Check out the highlights from our most recent update, Platform Release 650. This is our biggest release so far with 457 features, improvements, and bug fixes. See the highlights below. For a full rundown, check out the complete Release Notes here.

Business Intelligence

Map Employee Locations with the Geo Chart Widget

We have added a new Geo chart widget that will let you plot geolocation coordinates on a map. This will help you visualize employee whereabouts instead of trying to figure out the location coordinates.

You can add the Geo widget to any custom BI reports including a clone of the existing Geolocation report. You can plot the coordinates with a secondary dimension such as Employee, Computer, etc. and measure it against Count, Time, Latitude, Longitude, Error Radius, etc.

Geo Chart Widget for BI Reports

Migrate to Better Analytics and Reporting with the New BI Additions

We have added Instant Messages, Network Monitoring and Camera Usage reports (and associated Data Sources) to the BI Reports. Previously, these were only available under the Monitoring reports.

Migrating to the newer, BI versions of these reports will help you conduct thorough analysis and flexible reporting with powerful tools such as advanced filters, customized widgets, charts and more. You can even create your own custom reports.

BI Reports and Data Sources - Instant Messages, Network Monitoring, Camera Usage

Behavior Rules

Detect Sensitive Information on the Fly with the Keystrokes Content Sharing Rule

Previously, you could detect keystrokes and identify texts or words with the Keystrokes Activity Rule. Now, with the new Keystrokes Content Sharing Rule, you can compare keyboard inputs against sensitive information using the Predefined Classified Data (e.g., Financial Data, Personally Identifiable Data,  Health Data, etc.) or your own custom data definitions.

This rule will be useful to detect data exfiltration attempts or implement etiquette rules (e.g., warn users when they type any swear words in a chat conversation) in virtually any applications or documents in real-time.

Keystrokes Content Sharing Rule

Discover System Incidents, Security Gaps and More with the Windows Log Event Rule

This is a preview feature and might not always produce the expected results. We do not recommend using it for any critical operations. We also do not recommend using this rule on a shared machine such as a Citrix/RDP server. There are often multiple users – all contributing to a much bigger event log. This might cause performance issues. If you have any feedback or bug reports about this feature, please send them to [email protected].

Windows keeps a chronological log of events for application activities, system changes, security incidents, hardware triggers, etc.

We have added a new, Windows Log Event Activity Rule that will help you detect these events.

The ability to detect these events is a very powerful tool because it allows an administrator to identify issues with the computer, discover security gaps and stop potential threats.

Windows Log Event rules will allow you to detect these Windows events by their IDs. For example, an Event ID of 4738 is triggered every time a user object is changed. This type of change might indicate malicious intent, a precursor to account compromise or insider attacks. In this case, you can use the Windows Log Event to detect such events and send an alert to an admin to take action.

Windows Log Event Rule

For step-by-step instructions on how to create such as rule, please check out the Rule Sample 6: Using Windows Log Event to Detect Software Installation/Uninstallation section in the Rules Guide.

Administration and Management

Provide Department Managers Better Team Visibility with the Daily Snapshot Report

Previously, only administrators received the Daily Digest / Daily Snapshot email report. Now, you can enable this feature for Department Managers too – giving them better visibility into their teams’ performance on a daily basis.

You can use the SEND DAILY SNAPSHOT EMAILS TO DEPARTMENT MANAGERS option on the Settings > Security screen to enable/disable this feature.

Daily Snapshot/Daily Digest Email Report for Department Managers

Don’t Miss Out, Get Notified when License Limit Causes Monitoring to Stop

When your users/endpoints exceed the license count, monitoring will stop for them.

We have added a new tab,  License Alerts on the Settings screen which will let administrators receive email alerts when users/computers exceed the allotted number of licenses. This will help you take immediate action so that you don’t miss out on those users/computers.

License Alerts

Enterprise Integrations

Get Active Directory on Your Cloud Instance

At the moment, this is a feature on request. Please reach out to your Customer Support/Account Representative to activate the feature on your instance.

We have added support for Active Directory integration on Cloud instances. Previously, only On-Premise/Private Cloud deployments and custom deployments had AD support.

Active Directory Integration with a Cloud Instance

Sync with Multiple AD Domains/Servers

At the moment, this is a feature on request. Please reach out to your Customer Support/Account Representative to activate the feature on your instance.

We have added support for multiple domains/servers in Active Directory. This will help you bring your users/computers from different organization units into Teramind without having to switch accounts, go through a complicated setup process, or domain merging.

You can add multiple domains/servers tabs and configure them independently from the Settings > Active Directory screen. Use Plus + icon to add a new tab and the Trash Can icon to remove a tab.

Sync with Multiple AD Domains/Servers

Get Better Context with Attributes in Alert Notification Emails

We have added a new Alerts option, AGENT ATTRIBUTES TO USE FOR NOTIFICATIONS to the Settings > Alerts screen. This option will allow you to choose LDAP attributes that will be added to the rule alert notification emails giving you better context about the incident and user(s) involved.

LDAP Attributes in Alerts Notification Email


Extend Websites Monitoring to Firefox and Opera Browsers

Previously, Mac Agent could monitor user activities on the Apple Safari, Google Chrome and Brave browsers only. Now, we have added support for Firefox and Opera browsers allowing you to extend your web monitoring capabilities.

You will be able to see website activities on reports like BI Reports > Applications & Websites, Monitoring > Web Pages & Applications, etc.

Websites Monitoring in Firefox and Opera Browsers

Create Flexible Websites Rules with the Webpage Title Criterion

The Webpages rule now supports the Webpage Title criterion allowing you to create more flexible website-based rules quickly and easily. For example, specifying “news” will detect both and as they both contain “news” in their page titles. Whereas, with the Webpage URL criterion you will have to specify individual URLs for the sites.

Webpage Title Criterion in Webpages Rules

To learn more, check out the Activity Rules > Webpages section of the Rules Guide.

Monitor Locked Session for Continuous Time Tracking

We have enabled support for the RECORD LOCKED SESSIONS option available on the Monitoring Settings > Monitoring Profile > Screen panel.

It will allow you to continue recording and track time even when the user locks their computer. It will also work when the screen saver gets activated, or when an RDP (remote desktop session) window is minimized.

Locked Session Recording Monitoring Option

Please note that this feature affects how the user’s work time, idle time, session time, etc. are calculated and what information is displayed on the Dashboard. To learn more, check out the Monitoring Settings > Editing Screen Settings section of the User Guide.

Limit Offline Recording with the Buffer Size Option

We have enabled support for the OFFLINE RECORDING BUFFER SIZE (MB) option available on the Monitoring Settings > Monitoring Profile > Offline Recording panel.

With this option, you will be able to configure how much disk space the Agent will use before it stops capturing the screen recordings in offline mode.

Offline Recording Buffer Size Monitoring Option

To learn more, check out the Monitoring Settings > Editing Offline Recording Settings section of the User Guide.

Detect Data Leaks by Tracking File Transfers on External Drives

We have enabled support for the TRACK EXTERNAL DRIVES option available on the Monitoring Settings > Monitoring Profile > File Transfers panel.

External drives are a common vector for data exfiltration. With this feature you will be able to easily identify such activities from reports like the BI Reports > File Events, Monitoring > File Transfers and Employees > Employee’s Details > File Transfers tab.

File Transfers Monitoring Option for External Drives

To learn more, check out the Monitoring Settings > Editing File Transfers Settings section of the User Guide.

Connect Over a SOCKS Proxy for Security and Performance

Many organizations use SOCKS proxies for security, compatibility, performance, or anonymity purposes. Previously, Teramind Agent couldn’t connect to its server if you were using any SOCKS proxy.

Now, we are adding several Agent Configuration Parameters (socks-server, socks-port, socks-user, socks-password, socks-version5) that will let you connect to a SOCKS server easily.

Mac Agent Parameters for SOCKS Proxy

To learn more, check out the Agent Installation/Configuration Parameters (Mac) section in the Agent Installation article.

Exclude App Bundles from Network Monitoring for Privacy and Performance

We have introduced a new Agent Configuration Parameter (network-exclude-bundles) that will let you exclude application bundles from the network driver. This can be useful if you want to exclude certain apps/services from network tracking for privacy or security purposes. The feature can also be used for performance tuning and troubleshooting purposes.

Mac Agent Parameter for Network Monitoring

To learn more, check out the Agent Installation/Configuration Parameters (Mac) section in the Agent Installation article.

Other New Features & Improvements

There are a lot more improvements packed into this release with several general enhancements to the UI, settings, security, and performance. Below are just a few of them. Please check out the full list here.

BI Reports

Improved date filter in the Login Session report, support for Common filters in the Audit report, inclusion of the Position dimension in chart widgets, combining Global and Widget filters, and more.

Monitoring Settings

Support for conditional audio capture in remote sessions, better handling of regular expression in File Transfers monitoring, and other updates.

System Settings

Separate options for monitoring new users and computers, better status when updating the agent remotely, etc.


Faster processing of Daily Snapshot email reports, OCR load balancing improvements, permanent deleting of screen recording, to name a few.

Leave a Reply

Your email address will not be published.