Use the Administrative Console to manage output traffic from the audit log.
For information leakage prevention, such as to prohibit the transmission of video, images, and attachments are available to suit your company’s policy.
You can set policy, such as a password, use characters and validity period.
Read and Unread
“Read information does not display any” and can be flexibly set up to “already 読数 and who will display whether to read”, are available to suit your company’s policy.
Registering, editing, and deleting users
Administrators can register, edit, and delete users. Only pre-registered members can use these functions and can register a group of users all at once by using CSV file.
★Optional Service (additional charge applied)
You can link the system with your company’s user database, such as LDAP or ActiveDirectory, for user authentication. You can cut down the cost of managing and updating user information even when you register tens of thousands of users.
User Permission Settings
You can grant user-specific permissions at the time of the user’s registration. (Administrators, Auditor, Guests, API) Standard/Guest users can register their name, photo, or the group they belong to in their profiles.
You can check the number and percentage of exchanged messages within specified periods by type (text, image, or file) in the Administrator Console.
In addition, you can check the registered InCircle users’ login and log out data.
Only the audit user can send out all types of messages via CSV.
IP Restrictions, Device Authentications
★ Optional service (additional charge applied)
Use Device Authentication to restrict the access of certain IP addresses or give access only to the authorized devices.
Users authorized as auditors can specify period and user names and print out all messages (texts, images, or files) stored in InCircle that are necessary for internal auditing.