Capstan System Monitoring provides best-in-class issue detection with limited access the monitored computer. The software uses read-only commands to perform its duties. Only the minimum amount of information is required to identify the computer from which reports are sent.
The following information is gathered about a computer:
- A random identifier is generated during installations and used to sort reports.
- An arbitrary group is chosen by the installer, and is used in sorting the computers into Groups.
- The computer’s serial number is used for identification.
- The name of the computer, visible in Sharing PreferencePane (Mac), System Control Panel (Windows), or Hostname (Linux)
- The ‘short name’ of the user who last logged into the computer
In some cases, the email address associated with online backup systems will be reported. This can be disabled by a computer administrator, however the status of that online backup would not be reported.
The Monitoring Client software does not track the following types of information:
- There is no tracking of screen or keyboard activity
- There is no tracking of browser history, or other similar user actions.
- The agent does not read or report on the content of user-created data (screenshots, photos, documents, spreadsheets, etc)
- Rather than sending full log files, the software only sends the results of the health checks.
- Computer’s physical location is not readily available, but in cases where a computer is considered stolen or missing, administrators can request a one-time notification of the reporting IP address.