CN209218137U - Computer desktop monitoring system - Google Patents
Computer desktop monitoring system Download PDFInfo
- Publication number
- CN209218137U CN209218137U CN201821899606.3U CN201821899606U CN209218137U CN 209218137 U CN209218137 U CN 209218137U CN 201821899606 U CN201821899606 U CN 201821899606U CN 209218137 U CN209218137 U CN 209218137U
- Authority
- CN
- China
- Prior art keywords
- host computer
- monitoring
- monitoring host
- computer
- desktop
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model relates to monitoring technology fields, disclose a kind of computer desktop monitoring system, including multiple stage computers, core switch, server group and the monitoring host computer being connect with internet, the monitoring host computer is connect with the internet, the monitoring host computer is connect with the core switch, and the multiple stage computers and server are connect with the core switch respectively.The technical solution of the utility model monitors the working condition of desktop by monitoring host computer, logger computer desktop user behaviors log, it watches, control, manage remote resource, it can promote to improve office efficiency, by the way that monitoring rules, monitor operation behavior, to take precautions against the safety of operational risk, the system that ensures information safety, improves is arranged, and long-range management, support maintenance ability are provided, reduce management cost.
Description
Technical field
The utility model relates to monitoring technology field, in particular to a kind of computer desktop monitoring system.
Background technique
With the popularization and application of computer information system, the level of informatization is improved rapidly, computerized information telesecurity prison
Control technology is developed so far, and has formd the typical effective skill such as physics monitoring technology, Intrusion Detection Technique, security sweep technology
Art scheme.At the same time, the operation of computer system monitored in real time using remote monitoring system, record the long-range industry of preservation
The operation of business personnel, to take precautions against computer crime and guarantee that the safety of information system, the requirement of even running are more and more prominent.
In order to ensure that computer information system is safely and smoothly run, it is widely used the method for video monitoring at present to being
System personnel activity is monitored in real time, is recorded, is saved.However, video monitoring system is difficult to comprehensively, clearly to institute in system
Some terminal screen pictures are monitored, and are easy to make to monitor using the methods of masking camera using video monitoring system
Thrashing.Meanwhile retrieval, the monitoring of video monitoring record are comparatively laborious, to monitor in real time to information system operation, need
Expending a large amount of manpowers takes manual mode to monitor, and is easier to slip.In addition, establishing such a set of video monitoring system
The expensive hardware of system.
Utility model content
The main purpose of the utility model is to propose a kind of computer desktop monitoring system, it is intended to solve existing video prison
The technical problem that system hardware is expensive, retrieval, monitoring of video monitoring record are more troublesome is controlled, is effectively realized to table for computer
Face operation behavior monitors automatically, audits and watches and record operation behavior, to take precautions against operational risk, ensure information safety, promotees
Into the continuous improvement of system administration efficiency and management level.
To achieve the above object, the utility model proposes computer desktop monitoring system, including what is connect with internet
Multiple stage computers, core switch, server group and monitoring host computer, the monitoring host computer is connect with the internet, described
Monitoring host computer is connect with the core switch, and the multiple stage computers and server are connect with the core switch respectively.
Optionally, be provided with firewall device in the monitoring host computer, the firewall device be separately connected internet and
Core switch.
Optionally, gateway is equipped in the monitoring host computer, the monitoring host computer is connect by the gateway with internet.
Optionally, the monitoring host computer shell is rectangular-shape.
Optionally, the monitoring host computer shell has multiple connection jaws.
Optionally, the two sides of the monitoring host computer shell have thermovent.
Using the technical solution of the utility model, the technical solution of the utility model is had the advantages that, pass through prison
The working condition of the monitoring software monitoring desktop built in host is controlled, logger computer desktop user behaviors log is watched, controls, managed
Remote resource can promote to improve office efficiency;By the way that monitoring rules, monitor operation behavior, to take precautions against operational risk, protect is arranged
The safety for hindering information security, improving system;And long-range management, support maintenance ability are provided, reduce management cost.
Detailed description of the invention
In order to illustrate the embodiment of the utility model or the technical proposal in the existing technology more clearly, below will be to embodiment
Or attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only
It is some embodiments of the utility model, for those of ordinary skill in the art, in the premise not made the creative labor
Under, the structure that can also be shown according to these attached drawings obtains other attached drawings.
Fig. 1 is the connection schematic diagram of the computer desktop monitoring system of an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of the monitoring host computer of the computer desktop monitoring system of an embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, functional characteristics and advantage of the utility model aim.
Specific embodiment
The following will be combined with the drawings in the embodiments of the present invention, carries out the technical scheme in the embodiment of the utility model
Clearly and completely describing, it is clear that described embodiment is only a part of the embodiment of the utility model, rather than all
Embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, fall within the protection scope of the utility model.
It is to be appreciated that the directional instruction (such as up, down, left, right, before and after ...) of institute in the utility model embodiment
It is only used for explaining in relative positional relationship, the motion conditions etc. under a certain particular pose (as shown in the picture) between each component, such as
When the fruit particular pose changes, then directionality instruction also correspondingly changes correspondingly.
It in addition, the technical solution between each embodiment can be combined with each other, but must be with ordinary skill
Based on personnel can be realized, this technical side will be understood that when the combination of technical solution appearance is conflicting or cannot achieve
The combination of case is not present, also not within the protection scope of the requires of the utility model.
The utility model proposes a kind of computer desktop monitoring systems.
Referring to Figures 1 and 2, in an embodiment of the utility model, which includes and internet 4
Multiple stage computers 2, core switch 1, server group 3 and the monitoring host computer 5 of connection, the monitoring host computer 5 and the interconnection
Net 4 connects, and the monitoring host computer 5 connect with the core switch 1, the multiple stage computers 2 and server group 3 respectively with institute
State the connection of core switch 1.
The technical solution of the utility model is provided with Desktop Monitoring software in monitoring host computer 5, and monitoring host computer 5 passes through desktop
Monitoring software forms monitor audit platform, and monitoring host computer 5 applies component technology, safety management, security audit technology, uses
The method of behavioural characteristic audit, the heart can realize the collection to all Computer display desktops for being distributed in each place in the information
Middle monitoring and management construct a safe and reliable behavior monitoring platform except video monitoring, mention for system manager
The long-range monitor audit tool for having supplied a prevention violation operation shows desktop to computer operating system to effectively realize
Operation behavior monitoring and watch and record desktop operation, prevention operational risk, ensure information safety, promotion system management
The continuous improvement of efficiency and management level.The system not only has the characteristics that management is conveniently, safely flexible, but also has good
Operability is easily installed, operation and maintenance.
The working condition that computer desktop is monitored by monitoring host computer 5, watches, controls, manages remote resource, can promote
Improve office efficiency;By the way that monitoring rules, monitor operation behavior, to take precautions against operational risk, ensure information safety, improve system is arranged
The safety of system;And long-range management, support maintenance ability are provided, reduce management cost.
The computer desktop monitoring system monitors automatically, logger computer desktop behavior, centrally stored, centralized management.Entirely
Face records all kinds of internet behavior logs of user, as website visiting, mail transmission/reception, forum post, microblogging blog, long-range reply, account
It number logs in, the terminal operation of recording is accurate, clear, may be used as post-mordem forensics.Remote assistance, remote support function, energy are provided
Enough real-time synchronization remote terminal pictures are to help user to solve the problems, such as.With enough safeties, there is anti-usurp to the data of acquisition
Change measure.And then fundamentally prevent and prevent computer crime, it is ensured that the safety of information system.
Further, it is provided with firewall device (not shown) in the monitoring host computer 5, the firewall device connects respectively
Connect internet 4 and core switch 1, firewall device diversification security protection.
Further, be equipped with gateway (not shown) in the monitoring host computer 5, the monitoring host computer 5 by the gateway with
Internet 4 connects.
Further, the shell of the monitoring host computer 5 is rectangular-shape.
Further, the shell of the monitoring host computer 5 has multiple connection jaws 51, the load balancing of multiple connection jaws 51.
Further, the two sides of the shell of the monitoring host computer 5 have thermovent 52, and thermovent 52 can promote monitoring host computer
5 heat dissipation performance.
The above is only the preferred embodiment of the present invention, and therefore it does not limit the scope of the patent of the utility model,
Under all utility models in the utility model are conceived, equivalent structure made based on the specification and figures of the utility model
Transformation, or directly/be used in other related technical areas indirectly and be included in the scope of patent protection of the utility model.
Claims (5)
1. a kind of computer desktop monitoring system, including monitoring host computer, the multiple stage computers being connect with internet, core switch
And server group, Desktop Monitoring software is provided in the monitoring host computer, monitoring host computer passes through Desktop Monitoring software composition prison
Control audit platform, which is characterized in that the monitoring host computer is connect with the internet, and the monitoring host computer is exchanged with the core
Machine connection, the multiple stage computers and server group connect with the core switch respectively, are provided in the monitoring host computer
Firewall device, the firewall device are separately connected internet and core switch.
2. computer desktop monitoring system according to claim 1, which is characterized in that be equipped with net in the monitoring host computer
It closes, the monitoring host computer is connect by the gateway with internet.
3. computer desktop monitoring system according to claim 1, which is characterized in that the shell of the monitoring host computer is length
Cube shape.
4. computer desktop monitoring system according to claim 1, which is characterized in that the shell of the monitoring host computer has
Multiple connection jaws.
5. computer desktop monitoring system according to claim 1, which is characterized in that monitoring host computer shell two sides tool
There is thermovent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201821899606.3U CN209218137U (en) | 2018-11-16 | 2018-11-16 | Computer desktop monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201821899606.3U CN209218137U (en) | 2018-11-16 | 2018-11-16 | Computer desktop monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN209218137U true CN209218137U (en) | 2019-08-06 |
Family
ID=67460040
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201821899606.3U Active CN209218137U (en) | 2018-11-16 | 2018-11-16 | Computer desktop monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN209218137U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111757058A (en) * | 2020-06-18 | 2020-10-09 | 浪潮金融信息技术有限公司 | Method for monitoring non-existing equipment screen |
-
2018
- 2018-11-16 CN CN201821899606.3U patent/CN209218137U/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111757058A (en) * | 2020-06-18 | 2020-10-09 | 浪潮金融信息技术有限公司 | Method for monitoring non-existing equipment screen |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105139139B (en) | Data processing method and device and system for O&M audit | |
CN102111440B (en) | Real-time information safety service method and system for supporting dynamic interaction | |
US9167047B1 (en) | System and method for using policies to support session recording for user account management in a computing environment | |
CN104700024B (en) | A kind of method and system of Unix classes host subscriber operational order audit | |
CN103051692B (en) | Support the mobile operating system works platform of limit network environment | |
CN101901315A (en) | Security isolation and monitoring management method of USB mobile storage media | |
CN105474225A (en) | Automating monitoring of computing resource in cloud-based data center | |
CN205507061U (en) | Radar is synthesized and is taken notes appearance | |
CN106503524B (en) | A kind of computer network security guard system | |
CN101958897A (en) | Correlation analysis method of security incident and system | |
CN105759247B (en) | Radar integrated recorder and radar data recording method | |
CN103166777A (en) | Operation method and device for equipment remote operation and maintenance | |
CN103326883A (en) | Uniform safety management and comprehensive audit system | |
CN209218137U (en) | Computer desktop monitoring system | |
CN105871642A (en) | Machine room unattended operation remote equipment management system | |
CN110381047A (en) | A kind of method, server and the system of the tracking of network attack face | |
CN109213657A (en) | A kind of grid operation data cloud storage device | |
CN106447813A (en) | Intelligent office platform | |
KR102139062B1 (en) | Security Service system based on cloud | |
KR20020012855A (en) | Integrated log analysis and management system and method thereof | |
CN1561037A (en) | Desk monitoring audit system based on structure | |
CN102624541A (en) | Whole network managing and monitoring system based on virtual private network (VPN) technology | |
CN203206283U (en) | IDC information monitor system based on data transparent scan | |
CN113709140A (en) | Cloud big data intelligent safety management and control system based on comprehensive audit | |
CN112541030A (en) | Intelligent patrol management tool based on mobile platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |