Skip to main content

Troubleshooting and How-To

Quick troubleshooting and how-to articles

73 articles

How to install the Windows Agent remotely (Cloud)
How to install the Windows Agent remotely (On-Premise)
How to install the Mac Agent remotely using Jamf
How to configure the macOS permission settings
How to verify if the Agent is installed / uninstalled / running
How to uninstall the Agent
How to update the Teramind Agent remotely
How to protect your Agent installation from tampering
How to update a Protected Agent
How to uninstall a Protected Agent
How to check the type and version of the installed Agent
How to enable / disable auto-update of the Agent (Cloud)
How to obtain the Agent download links (Cloud)
Productivity Metrics FAQ: How is Work Time / Idle Time / Activity Percentage / Productive Time / Unproductive Time / Total Time determined
How to create productivity categories
How to create productivity profiles
How to classify activities into productive, unproductive or custom category
How to change a user’s access level / account type / role
How to change what an administrator can view or modify (admin type and access control)
How to configure access control rules, policies and permissions
How to customize Teramind to suit your preferences and brand
How to set up 2-Factor Authentication (2FA)
How to set up SSO (Single Sign On) authentication
How to set up Azure SSO (Single Sign On) authentication
How to use advanced rules techniques: multiple conditions, shared lists, regex, risk thresholds
What is End-to-End Encryption (E2EE) and how to use it (On-Premise)
How to delete data and adjust monitoring settings to reduce the storage requirements
How to remove user data to meet GDPR compliance (On-Premise)
How to generate your own / self-signed SSL certificates for use with an On-Premise deployments
How to switch between the Stealth Agent and the Revealed Agent
How to change an employee's password
How to reset your login password
How to export session recordings / video recordings
How to export or automatically deliver dashboards and reports
How to enable or disable monitoring for employees and computers
How to configure monitoring settings for employees and groups
How to turn off, disable, or suspend applications monitoring
How to turn off, disable, or suspend websites monitoring
How to find a computer's hostname and username
What is geolocation tracking and how to use it
How to change the application idle time threshold
How to use OCR to detect sensitive on-screen content
How to create a behavior policy
How to edit a behavior policy
How to create a behavior rule
Rule Example (OCR): Get notified when sensitive data is displayed on employee screens
Rule Example (Networking): Detect and block risky connections
Rule Example (Printing): Restrict large document printing
Rule Example (Schedule): Detect and warn when employees are idling
Rule Example (Schedule): Let employees know when they are being monitored
Rule Example (Webpages): Limit time on social media
Rule Example (Clipboard): Record clipboard copy/paste outside domain
Rule Example (Files): Prevent file exfiltration to external drives
Rule Example (Instant Messaging): Detect HR communications policy violations
Rule Example (Emails): Prevent sharing of internal files via emails
Rule Example (Applications): Prevent software installation
Rule Example (Registry): Detect attempt to disable UAC
Rule Example (Applications): Restrict access to specific features of an application
How to add an administrator or change a user's role to administrator
How to add or import employees into the Teramind Dashboard
Zero Trust Security: How to implement access control policies in Teramind
Data Loss Prevention: How to detect and prevent data leaks with Teramind
Data Privacy: How to set up Teramind for privacy-friendly monitoring