Skip to main content

Capture Control Logs

This page describes each element of the Capture Control Log data table and the available features on the detail page.

Through the Capture logging feature of the MonitorDog Agent, capture events and programs occurring on the user's device are monitored and recorded.
All recorded logs can be viewed on this page.

MonitorDog detects two types of events: keyboard-based capture and capture software. When an event is detected, the capture action or program execution is blocked, and logs are recorded according to the policies configured at the organization and user levels.

Q. How are capture commands and capture programs managed?

A. Capture commands are controlled based on a predefined list managed by the MonitorDog team. Capture programs are controlled based on the programs registered by MonitorDog, as well as additional programs manually added by administrators.

If you would like to add a new capture command, please contact the MonitorDog team. To add a capture program, go to [Settings → Unapproved Software → New Blocked Request].

Log Table

You can review all recorded logs. Each row includes one screen capture and one webcam image, along with brief log information.

capture log table

Table Filters

Use the filters at the top of the table to narrow down the list by date range and user.

Filter Features

  • Date Range: View logs generated within a specified period.
  • User Search: Search logs for a specific user.

Log Detail Page

Clicking a log entry in the file capture log table navigates you to its detail page. On this page, you can review detailed log information and share the event with other administrators.

Attempt Type

Indicates the method the user used to attempt a screen capture. There are two types of capture attempts: keyboard shortcuts and capture software. If the attempt is made using a keyboard shortcut, the specific capture command is displayed. If the attempt is made using capture software, the name of the application is shown.

capture log detail

Event Images

You can view screenshots and webcam images captured at the time of an event. By default, all images are set to private. To view these images, you must submit a Security Audit request.

event image

Clicking on a private image will open a security audit request modal. You can start a security audit by entering the target period and audit time along with the reason for the request.

audit modal

Once the audit begins, a countdown timer will appear at the top right based on the configured audit time, and the images will be made accessible. Any image viewed from the event detail page will be added to the security audit list, and you can review the events and images later via the security audit detail page.

audit timer

Q. I can’t submit an audit request!

A. Only administrators with Viewer or higher permissions can submit a security audit request. If you want to view the images and proceed with the audit, please contact a higher-level administrator to request a permission change.

Sharing

There are two ways to share an Capture Control Log:

  • Copy Link: Useful for sharing outside the system.
  • Direct Share: Share with specific admins within MonitorDog.
    You can share with multiple users at once. This action generates a notification for recipients.

Capture Control Log share

Delete Log

If the log deletion feature is enabled in the Organization Settings, the log deletion button will be activated.

Header Log Deletion Button

Q. Can anyone delete logs?

A. Only the Owner tier can enable the log deletion feature. Once enabled, log deletion is restricted to Owner and Manager tiers.

Log Deletion Modal

Clicking the log deletion button will open a deletion modal. You must select a reason and provide detailed comments to proceed with the deletion.

Types of Deletion Reasons

  • Retention Period Expired
  • Personal Data Disposal
  • Storage Space Optimization
  • Error/Abnormal Log Cleanup
  • User Deletion Request
  • Others
Log Deletion Confirmation Modal

After reviewing the notice in the re-confirmation modal, click the delete button to process the deletion. You will then be redirected to the Capture Control Log table.

Q. Can deleted logs be recovered?

A. Once a log has been deleted, it cannot be recovered. Please be careful to avoid data loss when deleting logs.