{"id":6811,"date":"2023-08-24T09:00:41","date_gmt":"2023-08-24T09:00:41","guid":{"rendered":"https:\/\/www.teramind.co\/blog\/?p=6811"},"modified":"2026-04-15T15:03:21","modified_gmt":"2026-04-15T15:03:21","slug":"introducing-new-features-across-the-platform-release-643","status":"publish","type":"post","link":"https:\/\/www.teramind.co\/blog\/introducing-new-features-across-the-platform-release-643\/","title":{"rendered":"Introducing New Features Across the Platform | Release 643"},"content":{"rendered":"\n<p>Check out the highlights from our most recent update, Platform Release 643. This is our biggest release so far with 433 features, improvements, and bug fixes. See the highlights below. For a full rundown, check out the complete Release Notes <a href=\"https:\/\/kb.teramind.co\/hc\/en-us\/articles\/19563301533971-Release-643-2023-08-10-\" title=\"\" rel=\"noopener\">here<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Activity Monitoring &amp; Business Intelligence<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Find Out Where Your Employees Are with Geolocation Monitoring<\/h4>\n\n\n\n<p>We are introducing Geolocation monitoring to help you track where your employees are working from. This might be useful if you have a remote, dispersed team or have field workers who work on different job sites. You can use the information for security, scheduling, payroll, and compliance purposes. For example, check for attendance, identify if an employee is working from home, track when a user is traveling abroad, etc.<\/p>\n\n\n\n<p>Using the new <strong>Geolocation<\/strong> BI report, you will be able to track the location down to the country, city, local divisions, and the actual coordinates (latitude, longitude). The feature works even when the user is offline.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2298\" height=\"1088\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation.png\" alt=\"Geolocation BI Report\" class=\"wp-image-6812\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation.png 2298w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation-300x142.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation-1024x485.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation-768x364.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation-1536x727.png 1536w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/geolocation-2048x970.png 2048w\" sizes=\"(max-width: 2298px) 100vw, 2298px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">View Everything in One Place with the All Events Report<\/h4>\n\n\n\n<p>The new <strong>All Events<\/strong> BI report will show all the events (e.g., Web\/App Activity, Alerts, File Transfers, Emails, Sessions, Print, Keystrokes, etc.) for all users and computers. This report will help you get a holistic view of the activities happening in the organization. It will also make it easy for you to conduct analysis and audits by using a single pane of view instead of having to go through different reports.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events.png\"><img decoding=\"async\" width=\"1893\" height=\"1227\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events.png\" alt=\"All Events BI Report\" class=\"wp-image-6814\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events.png 1893w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events-300x194.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events-1024x664.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events-768x498.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events-1536x996.png 1536w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/all-events-368x240.png 368w\" sizes=\"(max-width: 1893px) 100vw, 1893px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Stay Ahead of the Game, Monitor the New Outlook for Windows<\/h4>\n\n\n\n<p>If you are currently trying out the new Outlook for Windows, you are in luck! We are proactively adding support for the new Outlook desktop client that&#8217;s currently being rolled out by Microsoft as a preview version through their Insider channels.<\/p>\n\n\n\n<p>You should be able to track incoming\/outgoing emails, capture attachments, and apply behavior rules to the new Outlook for Windows.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/new-outlook.png\"><img decoding=\"async\" width=\"1199\" height=\"858\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/new-outlook.png\" alt=\"Outlook for Windows\" class=\"wp-image-6815\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/new-outlook.png 1199w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/new-outlook-300x215.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/new-outlook-1024x733.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/new-outlook-768x550.png 768w\" sizes=\"(max-width: 1199px) 100vw, 1199px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Reduce Noise and False Positives by Ignoring Old IM Activities<\/h4>\n\n\n\n<p>Sometimes, users might browse older messages on their IM client. This would unnecessarily capture irrelevant data on your IM activity reports and unexpectedly trigger behavior rules.<\/p>\n\n\n\n<p>We have added two new <strong>Monitoring Settings<\/strong> for <strong>Instant Messaging<\/strong> which will allow you to cut off capturing IM conversations older than certain days.<\/p>\n\n\n\n<p>Using these options, you will be able to reduce noise in your IM monitoring reports and prevent false positives.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/im-settings.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1662\" height=\"1033\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/im-settings.png\" alt=\"Instant Messaging Settings\" class=\"wp-image-6816\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/im-settings.png 1662w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/im-settings-300x186.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/im-settings-1024x636.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/im-settings-768x477.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/im-settings-1536x955.png 1536w\" sizes=\"(max-width: 1662px) 100vw, 1662px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Enterprise Security<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Get the Most Security &amp; Privacy for Your Data with End-to-End Encryption<\/h4>\n\n\n\n<p>End-to-End Encryption (E2EE) secures your data by encrypting it all the way &#8211; from its origin to its consumption. The encryption is done by multiple, strong security keys and passphrases. The data cannot be deciphered by a third-party entity or a user without the encryption keys and passphrase.<\/p>\n\n\n\n<p>By integrating envelope encryption and end-to-end encryption alongside a TLS 1.2 or higher transport protocol, Teramind E2EE will provide you with multi-layered security for your data. This combined approach will enhance privacy, integrity, and control of sensitive information as it&#8217;s stored or accessed. This will also be a suitable option if you need to meet strict compliance requirements.<\/p>\n\n\n\n<p>When E2EE is enabled, the <em><strong>Session Player<\/strong><\/em>, <strong>Keystrokes<\/strong> activities, and other supported data* will be masked. A user, even an administrator will not be able to view the data unless they have the right passphrase.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/e2ee.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1032\" height=\"611\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/e2ee.png\" alt=\"Session Player End-to-End Encryption\" class=\"wp-image-6817\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/e2ee.png 1032w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/e2ee-300x178.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/e2ee-1024x606.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/e2ee-768x455.png 768w\" sizes=\"(max-width: 1032px) 100vw, 1032px\" \/><\/a><\/figure>\n\n\n\n<p>*<em>Currently, screen recordings and keystrokes data are encrypted under E2EE.<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Use An Encrypted Third-Party SSL Certificate for Additional Security (On-Premise)<\/h4>\n\n\n\n<p>Previously, we only supported unencrypted SSL certificates with an On-Premise deployment.<\/p>\n\n\n\n<p>From this version, we have added support for third-party signed, encrypted certificates. You will be able to upload such a certificate from the <strong>Settings<\/strong> &gt; <strong>Security<\/strong> &gt; <strong>SSL<\/strong> section of your Dashboard.<\/p>\n\n\n\n<p>There are many benefits to using a private key-encrypted SSL certificate. For example, the private key\u2019s secrecy ensures additional security through asymmetric encryption, prevents authorized users from decrypting the data, and reduces risks from brute-force and man-in-the-middle type attacks. Additionally, it improves the authenticity and trust of the data transmission.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/third-party-SSL.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1973\" height=\"790\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/third-party-SSL.png\" alt=\"Encrypted SSL Certificate\" class=\"wp-image-6818\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/third-party-SSL.png 1973w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/third-party-SSL-300x120.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/third-party-SSL-1024x410.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/third-party-SSL-768x308.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/third-party-SSL-1536x615.png 1536w\" sizes=\"(max-width: 1973px) 100vw, 1973px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Having Issues with LDAP Authenticate? Use Your Own Certificate (On-Premise)<\/h4>\n\n\n\n<p>We have added a few options to the <strong>Active Directory <\/strong>settings that will allow you to use your own CA certificate for LDAP authentication.<\/p>\n\n\n\n<p>While it&#8217;s not recommended to use a self-signed certificate, sometimes you may need to use one. For example, if you are testing out a new deployment or running it on a low-risk internal site and you don&#8217;t want to see security alerts from browsers and operating systems. Also, Teramind will not let you use LDAP password verifications for Dashboard changes if it detects an invalid\/untrusted certificate. This feature will help you mitigate such issues.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/ldap-sef-signed-certificate.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1581\" height=\"785\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/ldap-sef-signed-certificate.png\" alt=\"LDAP Self-Signed Certificate\" class=\"wp-image-6819\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/ldap-sef-signed-certificate.png 1581w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/ldap-sef-signed-certificate-300x149.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/ldap-sef-signed-certificate-1024x508.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/ldap-sef-signed-certificate-768x381.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/ldap-sef-signed-certificate-1536x763.png 1536w\" sizes=\"(max-width: 1581px) 100vw, 1581px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Want to Enforce the CA Authority (or Mask it)? Use Your Own Proxy Certificate<\/h4>\n\n\n\n<p>By default, Teramind injects a web proxy certificate into websites to monitor encrypted\/HTTPS traffic. This certificate is signed by our root certificate <strong>Quick Web Proxy<\/strong>, which acts as the Certificate Authority (CA) for the domain\u2019s certificate.<\/p>\n\n\n\n<p>It&#8217;s now possible for you to use your own root certificate instead of Teramind&#8217;s default Quick Web Proxy certificate. This might be useful in an enterprise setting where you need to enforce your own certificate authority for security and compliance purposes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/proxy-certificate.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1896\" height=\"1152\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/proxy-certificate.png\" alt=\"Proxy Certificate\" class=\"wp-image-6820\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/proxy-certificate.png 1896w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/proxy-certificate-300x182.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/proxy-certificate-1024x622.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/proxy-certificate-768x467.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/proxy-certificate-1536x933.png 1536w\" sizes=\"(max-width: 1896px) 100vw, 1896px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Automate Certificate Installations, Add Them Though Nginx (On-Premise)<\/h4>\n\n\n\n<p>In some situations, you might have a locally incorporated CA, and sign your certificates by it. In order for this to work, you might need to install Root CA and Sub CA certificates on each of your web servers.<\/p>\n\n\n\n<p>To make it easier for you, we have added support to add your own SSL certificate bundle to your master node through the Nginx configuration.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1742\" height=\"667\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/nginx-config.png\" alt=\"Nginx Configuration\" class=\"wp-image-6821\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/nginx-config.png 1742w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/nginx-config-300x115.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/nginx-config-1024x392.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/nginx-config-768x294.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/nginx-config-1536x588.png 1536w\" sizes=\"(max-width: 1742px) 100vw, 1742px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Mac<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Don&#8217;t Miss Out, Track Secure Web Traffic on All Popular Browsers<\/h4>\n\n\n\n<p>The Mac Agent is now able to decrypt HTTPS\/TLS traffic. This will give you the ability to create Webpages-based behavior rules &#8211; warn users and block network connections. This capability applies to all apps and browsers that use HTTPS\/TLS.<\/p>\n\n\n\n<p>As part of the feature, a proxy certificate will be injected into the websites to monitor HTTPS\/TLS traffic.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-proxy.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1897\" height=\"1116\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-proxy.png\" alt=\"Mac Proxy\" class=\"wp-image-6822\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-proxy.png 1897w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-proxy-300x176.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-proxy-1024x602.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-proxy-768x452.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-proxy-1536x904.png 1536w\" sizes=\"(max-width: 1897px) 100vw, 1897px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Monitor the Modern Web by Intercepting IPv6 Connections<\/h3>\n\n\n\n<p>Before this release, the Mac Agent only supported network monitoring for IPv4 addresses. As a result, you might have noticed missing activities on the <strong>Network Monitoring<\/strong> or <strong>Applications &amp; Webpages<\/strong> reports. For the same reason, some of the Webpages or Networking-based <strong>Behavior Rules<\/strong> wouldn&#8217;t work either.<\/p>\n\n\n\n<p>From this version, we are adding support for filtering network activities over IPv6. This will allow you to track network activities, web browsing, etc. on sites that use IPv6 and apply behavior rules.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-ipv6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1627\" height=\"898\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-ipv6.png\" alt=\"Mac Network Monitoring\" class=\"wp-image-6823\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-ipv6.png 1627w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-ipv6-300x166.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-ipv6-1024x565.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-ipv6-768x424.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-ipv6-1536x848.png 1536w\" sizes=\"(max-width: 1627px) 100vw, 1627px\" \/><\/a><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Obfuscate the Agent by Changing Its Process Name<\/h4>\n\n\n\n<p>We are providing customers with the option to change the process name of the Hidden\/Silent Agent.<\/p>\n\n\n\n<p>The ability to change the process name will allow you to obfuscate the Agent so that it will not be obvious to a regular user that the Agent is running.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-process-name.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1972\" height=\"787\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-process-name.png\" alt=\"Mac Process List\" class=\"wp-image-6824\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-process-name.png 1972w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-process-name-300x120.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-process-name-1024x409.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-process-name-768x306.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/mac-process-name-1536x613.png 1536w\" sizes=\"(max-width: 1972px) 100vw, 1972px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Other New Features &amp; Improvements<\/h3>\n\n\n\n<p>There are a lot more improvements packed into this release with several general enhancements to the UI, security, and performance. Below are just a few of them. Check out the full list of improvements <a href=\"https:\/\/kb.teramind.co\/hc\/en-us\/articles\/19563301533971-Release-643-2023-08-10-#improvements-0-19\" title=\"\" rel=\"noopener\">here<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:41% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/prevent-bypass.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"314\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/prevent-bypass-1024x314.png\" alt=\"Custom Browser Name\" class=\"wp-image-6826 size-full\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/prevent-bypass-1024x314.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/prevent-bypass-300x92.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/prevent-bypass-768x236.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/prevent-bypass-1536x471.png 1536w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/prevent-bypass.png 1897w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\">Prevent Bypass of URL Logging<\/h4>\n\n\n\n<p>We are introducing a better method to detect browsers to prevent bypass of URL logging. The Agent is also now able to detect custom browsers that were modified.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:41% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/limit-idle-rule-alerts.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"355\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/limit-idle-rule-alerts-1024x355.png\" alt=\"Idle Rule with Alert Limitation\" class=\"wp-image-6827 size-full\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/limit-idle-rule-alerts-1024x355.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/limit-idle-rule-alerts-300x104.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/limit-idle-rule-alerts-768x266.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/limit-idle-rule-alerts-1536x532.png 1536w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/limit-idle-rule-alerts.png 1892w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\">Limit Alerts Generated by Idle Rules<\/h4>\n\n\n\n<p>We made changes to the Idle rule&#8217;s alert behavior so that it will generate a single alert &#8211; when the rule is violated. This will prevent unnecessary triggering of the rule.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:41% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/shared-list-upload.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"351\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/shared-list-upload-1024x351.png\" alt=\"Shared List Upload Error\" class=\"wp-image-6828 size-full\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/shared-list-upload-1024x351.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/shared-list-upload-300x103.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/shared-list-upload-768x263.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/shared-list-upload-1536x526.png 1536w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/shared-list-upload.png 1742w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\">Better Handling of Uploaded Files<\/h4>\n\n\n\n<p>We improved how file uploads are handled when importing employees, shared lists, etc. For example, now, the Dashboard will show an error if it encounters any invalid lines in a shared list and list which items caused the error.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:41% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/notifications-report.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"253\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/notifications-report-1024x253.png\" alt=\"Notifications Report\" class=\"wp-image-6829 size-full\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/notifications-report-1024x253.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/notifications-report-300x74.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/notifications-report-768x190.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/notifications-report-1536x380.png 1536w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/notifications-report-2048x506.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\">Faster Reports<\/h4>\n\n\n\n<p>Notifications report now comes with pagination. Both the Notifications and Alerts reports are also optimized to handle a large number of data sets better.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:41% auto\"><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/other-improvements-1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/other-improvements-1-1024x569.png\" alt=\"Other Improvements\" class=\"wp-image-6831 size-full\" title=\"\" srcset=\"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/other-improvements-1-1024x569.png 1024w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/other-improvements-1-300x167.png 300w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/other-improvements-1-768x427.png 768w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/other-improvements-1-1536x854.png 1536w, https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2023\/08\/other-improvements-1.png 1740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\">Other Improvements<\/h4>\n\n\n\n<p>More accurate event tracking, the ability to detect password fields without using a proxy certificate, cleaner reports, etc. are just a few improvements introduced in this release.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Check out the highlights from our most recent update, Platform Release 643. This is our biggest release so far with 433 features, improvements, and bug fixes. See the highlights below. For a full rundown, check out the complete Release Notes here. Activity Monitoring &amp; Business Intelligence Find Out Where Your Employees Are with Geolocation Monitoring [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[18],"tags":[],"ppma_author":[466],"class_list":["post-6811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product-updates"],"authors":[{"term_id":466,"user_id":8,"is_guest":0,"slug":"arickteramind-co","display_name":"Arick Disilva","avatar_url":{"url":"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2024\/07\/arick.png","url2x":"https:\/\/www.teramind.co\/blog\/wp-content\/uploads\/2024\/07\/arick.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/posts\/6811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/comments?post=6811"}],"version-history":[{"count":3,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/posts\/6811\/revisions"}],"predecessor-version":[{"id":6832,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/posts\/6811\/revisions\/6832"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/media\/6833"}],"wp:attachment":[{"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/media?parent=6811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/categories?post=6811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/tags?post=6811"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.teramind.co\/blog\/wp-json\/wp\/v2\/ppma_author?post=6811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}