Skip to main content

How-To Articles

How-to Articles

49 articles
How to install the Windows Agent remotely (Cloud)
How to install the Windows Agent remotely (On-Premise)
How to install the Mac Agent remotely using Jamf
How to configure the macOS permission settings
How to verify if the Agent is installed / uninstalled / running
How to uninstall the Agent
How to update the Teramind Agent remotely
How to protect your Agent installation from tampering
How to update a Protected Agent
How to uninstall a Protected Agent
How to check the type and version of the installed Agent
Productivity Metrics FAQ: How is Work Time / Idle Time / Activity Percentage / Productive Time / Unproductive Time / Total Time determined
How to classify activities into productive, unproductive or custom category
How to change a user’s access level / account type / role
How to change what an administrator can view or modify (admin type and access control)
How to customize Teramind to suit your preferences and brand
How to set up the SSO (Single Sign On) authentication
How to set up the Azure SSO (Single Sign On) authentication
How to obtain the Agent download links (Cloud)
How to enable / disable auto-update of the Agent (Cloud)
How to use advanced rules techniques: multiple conditions, shared lists, regex, risk thresholds
How to get computer details using the API
What is End-to-End Encryption (E2EE) and how to use it (On-Premise)
How to delete data and adjust monitoring settings to reduce the storage requirements
How to remove user data to meet GDPR compliance (On-Premise)
How to generate your own / self-signed SSL certificates for use with an On-Premise deployments
How to switch between the Stealth Agent and the Revealed Agent
How to change an employee's password
How to reset your login password
How to export session recordings / video recordings
How to export or automatically deliver dashboards and reports
How to enable or disable monitoring for employees and computers
How to find a computer's hostname and username
What is geolocation tracking and how to use it
How to change the application idle time threshold
How to use OCR to detect sensitive on-screen content
How to edit a behavior policy
Rule Example (OCR): Get notified when sensitive data is displayed on employee screens
Rule Example (Networking): Detect and block risky connections
Rule Example (Printing): Restrict large document printing
Rule Example (Schedule): Detect and warn when employees are idling
Rule Example (Webpages): Limit time on social media
Rule Example (Clipboard): Record clipboard copy/paste outside domain
Rule Example (Files): Prevent file exfiltration to external drives
Rule Example (Instant Messaging): Detect HR communications policy violations
Rule Example (Emails): Prevent sharing of internal files via emails
Rule Example (Applications): Prevent software installation
Rule Example (Registry): Detect attempt to disable UAC
Rule Example (Applications): Restrict access to specific features of an application