System Configuration
Remote Security Rules
4 min
overview remote security rules define what happens when a given event is detected by the secure work from home app running on an agent's computer as the diagram below shows, remote security rule sets are associated with roles an agent's role(s) identify the rule set(s) that are used for that agent this allows different groups of agents to have different behaviors for the same events (e g what happens if the agent walks away from their desk) features enable/disable/configure capabilities and possible events docid\ m7mjn8sylcnypukjurckb these represent code running on the agent's desktop that are looking for certain situations to happen and if/when they happen generate events what events and how those events are generated are controlled by feature settings for that agent (see docid hzx326waemkarm7abbhg for more information) docid\ s23f0cykfbpfdxtjjyq4h these are the generated events that represent the core data generated by secure work from home generated events kick off event actions generated events are displayed to supervisors generated events are stored in the database (if configured via event actions) for use in reporting and analysis docid\ optzjprncpihjn juzm7y these are the configured actions that are to be taken when a given event is generated actions are typically some combination of logging the event for supervisor/reporting purposes and, if desired, putting the agent's screen to sleep or locking it until a one time passcode (otp) is entered managing remote security rules to manage remote security rules, open ocm (operation control manager) and click on the admin modules button in the upper right (icon looks like a computer screen) then select agent then click on remote security rules if you don't see this on your menu, then it is likely that your user has not been granted access to this module clicking on "remote security rules" will open the remote security rules module the first thing you have to do is select the role for which you want to define (or update) remote security rules select from the drop down in the upper right and pick the appropriate (already defined) role if you haven't yet defined the role for which you want to define rules, see docid\ fsya bvujbjw2wgch3erv once you select a role, you will see the rule set defined for that role if none has yet been defined, a default rule set is presented since it all starts with events, see docid\ s23f0cykfbpfdxtjjyq4h for more details if you haven't already the first thing you see when you open up remote security rules is the list of event sources see docid\ m7mjn8sylcnypukjurckb for more details the primary area you will work with is on the event action tab see docid\ optzjprncpihjn juzm7y for more details