Operations of client (CT) and smart device (agent) users will be saved on the server as various logs. The system administrator or department administrator confirms operation content of CT and smart device (agent) users as daily operations via the log viewer.
Special processing is not required when the user operates in accordance with operation guidelines. However, it is required to investigate what client (CT) and smart device (agent) users want to do and whether these operations may result in possibilities of information leakage when any operation suspected to violate operation guidelines or invalid operation is detected.
The file names left in the log can be used to trace file operation by the user or search the information of the CT that performed the invalid operation.
If it is required to review policies according to investigation results, the policy corresponding to the client (CT) and smart device (agent) users should be modified. Thus, violation can be prevented from happening again and system operation will protect internal information more safely.