CN209218137U - Computer desktop monitoring system - Google Patents

Computer desktop monitoring system Download PDF

Info

Publication number
CN209218137U
CN209218137U CN201821899606.3U CN201821899606U CN209218137U CN 209218137 U CN209218137 U CN 209218137U CN 201821899606 U CN201821899606 U CN 201821899606U CN 209218137 U CN209218137 U CN 209218137U
Authority
CN
China
Prior art keywords
host computer
monitoring
monitoring host
computer
desktop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201821899606.3U
Other languages
Chinese (zh)
Inventor
许胜军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hua Bo Science And Technology Development Co Ltd
Original Assignee
Shenzhen Hua Bo Science And Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hua Bo Science And Technology Development Co Ltd filed Critical Shenzhen Hua Bo Science And Technology Development Co Ltd
Priority to CN201821899606.3U priority Critical patent/CN209218137U/en
Application granted granted Critical
Publication of CN209218137U publication Critical patent/CN209218137U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The utility model relates to monitoring technology fields, disclose a kind of computer desktop monitoring system, including multiple stage computers, core switch, server group and the monitoring host computer being connect with internet, the monitoring host computer is connect with the internet, the monitoring host computer is connect with the core switch, and the multiple stage computers and server are connect with the core switch respectively.The technical solution of the utility model monitors the working condition of desktop by monitoring host computer, logger computer desktop user behaviors log, it watches, control, manage remote resource, it can promote to improve office efficiency, by the way that monitoring rules, monitor operation behavior, to take precautions against the safety of operational risk, the system that ensures information safety, improves is arranged, and long-range management, support maintenance ability are provided, reduce management cost.

Description

Computer desktop monitoring system
Technical field
The utility model relates to monitoring technology field, in particular to a kind of computer desktop monitoring system.
Background technique
With the popularization and application of computer information system, the level of informatization is improved rapidly, computerized information telesecurity prison Control technology is developed so far, and has formd the typical effective skill such as physics monitoring technology, Intrusion Detection Technique, security sweep technology Art scheme.At the same time, the operation of computer system monitored in real time using remote monitoring system, record the long-range industry of preservation The operation of business personnel, to take precautions against computer crime and guarantee that the safety of information system, the requirement of even running are more and more prominent.
In order to ensure that computer information system is safely and smoothly run, it is widely used the method for video monitoring at present to being System personnel activity is monitored in real time, is recorded, is saved.However, video monitoring system is difficult to comprehensively, clearly to institute in system Some terminal screen pictures are monitored, and are easy to make to monitor using the methods of masking camera using video monitoring system Thrashing.Meanwhile retrieval, the monitoring of video monitoring record are comparatively laborious, to monitor in real time to information system operation, need Expending a large amount of manpowers takes manual mode to monitor, and is easier to slip.In addition, establishing such a set of video monitoring system The expensive hardware of system.
Utility model content
The main purpose of the utility model is to propose a kind of computer desktop monitoring system, it is intended to solve existing video prison The technical problem that system hardware is expensive, retrieval, monitoring of video monitoring record are more troublesome is controlled, is effectively realized to table for computer Face operation behavior monitors automatically, audits and watches and record operation behavior, to take precautions against operational risk, ensure information safety, promotees Into the continuous improvement of system administration efficiency and management level.
To achieve the above object, the utility model proposes computer desktop monitoring system, including what is connect with internet Multiple stage computers, core switch, server group and monitoring host computer, the monitoring host computer is connect with the internet, described Monitoring host computer is connect with the core switch, and the multiple stage computers and server are connect with the core switch respectively.
Optionally, be provided with firewall device in the monitoring host computer, the firewall device be separately connected internet and Core switch.
Optionally, gateway is equipped in the monitoring host computer, the monitoring host computer is connect by the gateway with internet.
Optionally, the monitoring host computer shell is rectangular-shape.
Optionally, the monitoring host computer shell has multiple connection jaws.
Optionally, the two sides of the monitoring host computer shell have thermovent.
Using the technical solution of the utility model, the technical solution of the utility model is had the advantages that, pass through prison The working condition of the monitoring software monitoring desktop built in host is controlled, logger computer desktop user behaviors log is watched, controls, managed Remote resource can promote to improve office efficiency;By the way that monitoring rules, monitor operation behavior, to take precautions against operational risk, protect is arranged The safety for hindering information security, improving system;And long-range management, support maintenance ability are provided, reduce management cost.
Detailed description of the invention
In order to illustrate the embodiment of the utility model or the technical proposal in the existing technology more clearly, below will be to embodiment Or attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only It is some embodiments of the utility model, for those of ordinary skill in the art, in the premise not made the creative labor Under, the structure that can also be shown according to these attached drawings obtains other attached drawings.
Fig. 1 is the connection schematic diagram of the computer desktop monitoring system of an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of the monitoring host computer of the computer desktop monitoring system of an embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, functional characteristics and advantage of the utility model aim.
Specific embodiment
The following will be combined with the drawings in the embodiments of the present invention, carries out the technical scheme in the embodiment of the utility model Clearly and completely describing, it is clear that described embodiment is only a part of the embodiment of the utility model, rather than all Embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, fall within the protection scope of the utility model.
It is to be appreciated that the directional instruction (such as up, down, left, right, before and after ...) of institute in the utility model embodiment It is only used for explaining in relative positional relationship, the motion conditions etc. under a certain particular pose (as shown in the picture) between each component, such as When the fruit particular pose changes, then directionality instruction also correspondingly changes correspondingly.
It in addition, the technical solution between each embodiment can be combined with each other, but must be with ordinary skill Based on personnel can be realized, this technical side will be understood that when the combination of technical solution appearance is conflicting or cannot achieve The combination of case is not present, also not within the protection scope of the requires of the utility model.
The utility model proposes a kind of computer desktop monitoring systems.
Referring to Figures 1 and 2, in an embodiment of the utility model, which includes and internet 4 Multiple stage computers 2, core switch 1, server group 3 and the monitoring host computer 5 of connection, the monitoring host computer 5 and the interconnection Net 4 connects, and the monitoring host computer 5 connect with the core switch 1, the multiple stage computers 2 and server group 3 respectively with institute State the connection of core switch 1.
The technical solution of the utility model is provided with Desktop Monitoring software in monitoring host computer 5, and monitoring host computer 5 passes through desktop Monitoring software forms monitor audit platform, and monitoring host computer 5 applies component technology, safety management, security audit technology, uses The method of behavioural characteristic audit, the heart can realize the collection to all Computer display desktops for being distributed in each place in the information Middle monitoring and management construct a safe and reliable behavior monitoring platform except video monitoring, mention for system manager The long-range monitor audit tool for having supplied a prevention violation operation shows desktop to computer operating system to effectively realize Operation behavior monitoring and watch and record desktop operation, prevention operational risk, ensure information safety, promotion system management The continuous improvement of efficiency and management level.The system not only has the characteristics that management is conveniently, safely flexible, but also has good Operability is easily installed, operation and maintenance.
The working condition that computer desktop is monitored by monitoring host computer 5, watches, controls, manages remote resource, can promote Improve office efficiency;By the way that monitoring rules, monitor operation behavior, to take precautions against operational risk, ensure information safety, improve system is arranged The safety of system;And long-range management, support maintenance ability are provided, reduce management cost.
The computer desktop monitoring system monitors automatically, logger computer desktop behavior, centrally stored, centralized management.Entirely Face records all kinds of internet behavior logs of user, as website visiting, mail transmission/reception, forum post, microblogging blog, long-range reply, account It number logs in, the terminal operation of recording is accurate, clear, may be used as post-mordem forensics.Remote assistance, remote support function, energy are provided Enough real-time synchronization remote terminal pictures are to help user to solve the problems, such as.With enough safeties, there is anti-usurp to the data of acquisition Change measure.And then fundamentally prevent and prevent computer crime, it is ensured that the safety of information system.
Further, it is provided with firewall device (not shown) in the monitoring host computer 5, the firewall device connects respectively Connect internet 4 and core switch 1, firewall device diversification security protection.
Further, be equipped with gateway (not shown) in the monitoring host computer 5, the monitoring host computer 5 by the gateway with Internet 4 connects.
Further, the shell of the monitoring host computer 5 is rectangular-shape.
Further, the shell of the monitoring host computer 5 has multiple connection jaws 51, the load balancing of multiple connection jaws 51.
Further, the two sides of the shell of the monitoring host computer 5 have thermovent 52, and thermovent 52 can promote monitoring host computer 5 heat dissipation performance.
The above is only the preferred embodiment of the present invention, and therefore it does not limit the scope of the patent of the utility model, Under all utility models in the utility model are conceived, equivalent structure made based on the specification and figures of the utility model Transformation, or directly/be used in other related technical areas indirectly and be included in the scope of patent protection of the utility model.

Claims (5)

1. a kind of computer desktop monitoring system, including monitoring host computer, the multiple stage computers being connect with internet, core switch And server group, Desktop Monitoring software is provided in the monitoring host computer, monitoring host computer passes through Desktop Monitoring software composition prison Control audit platform, which is characterized in that the monitoring host computer is connect with the internet, and the monitoring host computer is exchanged with the core Machine connection, the multiple stage computers and server group connect with the core switch respectively, are provided in the monitoring host computer Firewall device, the firewall device are separately connected internet and core switch.
2. computer desktop monitoring system according to claim 1, which is characterized in that be equipped with net in the monitoring host computer It closes, the monitoring host computer is connect by the gateway with internet.
3. computer desktop monitoring system according to claim 1, which is characterized in that the shell of the monitoring host computer is length Cube shape.
4. computer desktop monitoring system according to claim 1, which is characterized in that the shell of the monitoring host computer has Multiple connection jaws.
5. computer desktop monitoring system according to claim 1, which is characterized in that monitoring host computer shell two sides tool There is thermovent.
CN201821899606.3U 2018-11-16 2018-11-16 Computer desktop monitoring system Active CN209218137U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201821899606.3U CN209218137U (en) 2018-11-16 2018-11-16 Computer desktop monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201821899606.3U CN209218137U (en) 2018-11-16 2018-11-16 Computer desktop monitoring system

Publications (1)

Publication Number Publication Date
CN209218137U true CN209218137U (en) 2019-08-06

Family

ID=67460040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201821899606.3U Active CN209218137U (en) 2018-11-16 2018-11-16 Computer desktop monitoring system

Country Status (1)

Country Link
CN (1) CN209218137U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111757058A (en) * 2020-06-18 2020-10-09 浪潮金融信息技术有限公司 Method for monitoring non-existing equipment screen

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111757058A (en) * 2020-06-18 2020-10-09 浪潮金融信息技术有限公司 Method for monitoring non-existing equipment screen

Similar Documents

Publication Publication Date Title
CN105139139B (en) Data processing method and device and system for O&M audit
CN102111440B (en) Real-time information safety service method and system for supporting dynamic interaction
US9167047B1 (en) System and method for using policies to support session recording for user account management in a computing environment
CN104700024B (en) A kind of method and system of Unix classes host subscriber operational order audit
CN103051692B (en) Support the mobile operating system works platform of limit network environment
CN101901315A (en) Security isolation and monitoring management method of USB mobile storage media
CN105474225A (en) Automating monitoring of computing resource in cloud-based data center
CN205507061U (en) Radar is synthesized and is taken notes appearance
CN106503524B (en) A kind of computer network security guard system
CN101958897A (en) Correlation analysis method of security incident and system
CN105759247B (en) Radar integrated recorder and radar data recording method
CN103166777A (en) Operation method and device for equipment remote operation and maintenance
CN103326883A (en) Uniform safety management and comprehensive audit system
CN209218137U (en) Computer desktop monitoring system
CN105871642A (en) Machine room unattended operation remote equipment management system
CN110381047A (en) A kind of method, server and the system of the tracking of network attack face
CN109213657A (en) A kind of grid operation data cloud storage device
CN106447813A (en) Intelligent office platform
KR102139062B1 (en) Security Service system based on cloud
KR20020012855A (en) Integrated log analysis and management system and method thereof
CN1561037A (en) Desk monitoring audit system based on structure
CN102624541A (en) Whole network managing and monitoring system based on virtual private network (VPN) technology
CN203206283U (en) IDC information monitor system based on data transparent scan
CN113709140A (en) Cloud big data intelligent safety management and control system based on comprehensive audit
CN112541030A (en) Intelligent patrol management tool based on mobile platform

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant