If you need assistance during implementation please contact Veriato Vision Tech Support.
Welcome to Veriato! We are very excited you have chosen Veriato as your trusted workforce behavior monitoring and risk management security software.
- Antivirus Exclusions
- Prior to installation, it is recommended that you setup Antivirus exclusions. If you are unfamiliar with what antivirus you are using or how to set exclusions you can use our guide by clicking here.
- Deployment
- The next step will be to deploy the software to the endpoints that you’d like to monitor. Depending on the device types, your IT infrastructure, and your accessibility to these machines, you will deploy the software in one of the following ways:
- Local Installation (typically used for accounts with 1-5 Licenses)
- Download the installer from the Veriato Dashboard and install while logged into the target device (requires physical or remote desktop access to install).
-
- Log into the Veriato Dashboard
- Click on “Available Licenses” in the main menu.
- Download the installation file for the appropriate operating system, (i.e. “Add New Mac”)(Your IT administrator can either remotely or physically access and install the software directly onto the machine.)
-
- Download the installer from the Veriato Dashboard and install while logged into the target device (requires physical or remote desktop access to install).
- Remote Deployment (typically used for accounts with 5+ Licenses, Available for Windows and Chromebook, not currently available for Mac)
- The next step will be to deploy the software to the endpoints that you’d like to monitor. Depending on the device types, your IT infrastructure, and your accessibility to these machines, you will deploy the software in one of the following ways:
-
-
- Windows PC
- Our silent installer will utilize an unattended executable file to install the monitoring software in the background of a user’s device. No interaction to complete the installation will be required.
- IMPORTANT: In order to remotely deploy the silent installer the following is required:
- For the machine you are deploying from: An administrator must be logged into Windows with full Domain Administrator credentials with permissions to install software on all machines that they wish to deploy to.
- For the machines you are deploying to: Computers that are selected to be deployed to must be powered on with a valid domain connection that can be pinged, either by having direct access to the company network or via a VPN. A user does not need to be currently logged into Windows for deployment to succeed.
- The installer can be deployed using a software deployment tool. If your organization does not already have a deployment tool, we recommend using our proprietary deployment tool, NetDeploy. Please reference this guide on how NetDeploy can be used with our unattended installer.
- You can download the NetDeploy installation file here and reference the guide for deployment.
- Our silent installer will utilize an unattended executable file to install the monitoring software in the background of a user’s device. No interaction to complete the installation will be required.
- Windows PC
- Chromebook
- Chromebook remote deployment requires device management via G-Suite.
- Chromebook remote deployment requires device management via G-Suite.
- End-User Installation
- If you don’t have physical or remote access to the machine you can contact support for an installation file that you can then send to the user(s) you plan to monitor. You will be given a silent installer link that you can email to the end-user or host on your intranet. The end-user can then click on the link to download and run the installer. The installation will then run in the background without any interaction from the end-user.
- If you don’t have physical or remote access to the machine you can contact support for an installation file that you can then send to the user(s) you plan to monitor. You will be given a silent installer link that you can email to the end-user or host on your intranet. The end-user can then click on the link to download and run the installer. The installation will then run in the background without any interaction from the end-user.
-
- Once you have finished installing the software on your devices it is recommended to restart the machine in order to start capturing all user data on Veriato Vision.
Administrative Settings
Once you have installed the software on all of the desired devices you are ready to begin establishing your administrative settings. You can view some of our detailed guides and tutorial videos on Employee Monitoring Settings here.
- Start by logging into the web interface at https://veriatocloud.com/en/Account/login
- The following are some of the recommended first steps to setting up Veriato Vision for employee monitoring:
-
- Creating Groups
- Groups allow you to organize your employees in a way that mirrors your corporate structure. Grouping will allow you the customize the recording and alert settings for various departments within your organization.
- We recommend grouping by the User versus grouping by Device since the majority of reports are user-centric data.
- Groups allow you to organize your employees in a way that mirrors your corporate structure. Grouping will allow you the customize the recording and alert settings for various departments within your organization.
- Creating Groups
-
- Admin Access
- User access allows you to assign administrative, manager, and limited-user roles to groups to view and access data. Administrators have full access to all groups and settings, Managers have limited administrative access to their assigned group and group settings, and Limited Users has viewing access to their group data.
- You can also edit account information and settings such as your email and password, as well as two-factor authentication by clicking on the edit icon.
- Admin Access
-
- Recording & Blocking
- Recording & Blocking settings allow you to toggle on and off the various data types that you would like to capture. You can also customize certain attributes for the settings, such as screen shot intervals, or specific webpages or programs that you want to block.
- Recording & Blocking
-
- Alert Words
- Create Alert Word categories, which allows you to create a list of customized alert words that you can utilize to monitor employee activity via screenshots and automated notifications.
- Alert Words
-
- Notifications
- Create automated notifications based on Alert Words, Website activity, User Behaviors, and Agent (User) Check-In.
- Notifications
-
- Productivity Settings
- This section allows you the categorize all of the programs and websites used by your employees. By default, all of the programs and websites will be tagged as neutral until you recategorize them as “Productive”, “Neutral”, or “Unproductive”. These settings can be customized by group. For example, Facebook may be productive for your marketing team but not your finance team.
- Productivity Settings
-
- Automated Reports
- Create automated reports that deliver daily or weekly data to your inbox. We offer some pre-made reports and we also offer you the ability create your own customized reports.
- Automated Reports
If you have any questions or need assistance during your implementation, please contact our support staff and they will be happy to assist you.