- Advanced Rules Techniques: Multi-Level Conditions, Shared Lists, Regex, Risk Thresholds
- Zero Trust Security: Implementing Access Control Policies in Teramind
- How to Set Up and Use Teramind's OCR (Optical Character Recognition) Features
- How to Set Up Teramind for Remote Work
- How to Detect and Prevent Data Leaks with Teramind
- How to Setup Teramind for Privacy-Friendly Monitoring
- How to Customize Teramind to Suit Your Preferences and Brand
- Attaching, Mounting and Expanding Recording Volumes
- How to find the Computer Hostname and Username
- How to use the Dashboards and Widgets for a quick snapshot of your organization
- How to use the business intelligence reports (BI Reports)
- [Deprecated] How to use the Monitoring Reports to view employee activities
- How to use the Session Player (session recorder/video player) for live view, history playback and remote control
- [Deprecated] How to conduct vulnerability analysis with the Risk report
- How to create behavior Policies and Rules to detect insider threats, prevent data loss and improve productivity
- [Deprecated] How to view rule violation Alerts and behavior anomalies
- How to create behavior Anomaly Rules
- How to add new Employees and manage employee profiles
- How to manage the monitored Computers and remotely configure agent installations
- How to configure Departments / groups / teams
- How to configure employee Schedules and day offs
- How to configure Positions / titles and manage position schedules
- How to configure Access Control Policies and user privileges
- How configure Productivity Profiles to classify productive / unproductive apps and websites
- How to use Shared Lists to create lists of keywords, network addresses and regular expressions
- How to search for missing users and computers
- How to view and download exported videos from the Video Export screen
- How to use the System Log to view the activities of the administrators
- How to configure the Monitoring Settings and create monitoring profiles
- How to integrate with SIEM (Security Information & Event Management) and PM (Project Management) systems