Staffcop Enterprise 5.7

01.12.2025

The release makes the incident investigation and internal risk detection system even more effective by strengthening control over communication channels—from corporate email and messengers to audio recordings.

Key Features

Speech Recognition
The Windows agent displays watermarks on the user’s screen when web services or applications that match the configuration rules are open.

Staffcop Enterprise 5.7 introduces a built-in speech recognition server. Agents record audio from workstations, and the server converts it into text for further analysis. Now you can choose: use cloud recognition services or deploy your own server for complete data control.
  • Data is not transmitted outside the company;
  • Savings on external service licenses;
  • Flexible priority settings: speed or quality;
  • Ability to configure multiple servers for balanced audio and image recognition;
  • Data filtering for processing;
  • Policies for searching by text triggers in recognized recordings.
Asynchronous Grabber
A multi-threaded grabber for analyzing large volumes of correspondence. Enables the system to be used in large corporate sectors.
  • Collection of email messages from the corporate mail server;
  • Ability to deploy on multiple servers or a separate host;
  • Efficiency through multi-threaded data transfer to the server—up to 100,000 emails per day.
Remote Installation Utility
Updates accelerate the deployment of Windows agents in corporate networks.
  • Automated installation on large PC fleets;
  • Group installation of agents—up to 64 simultaneous threads;
  • Retry attempts through cyclic installation if the PC is unavailable;
  • Full export and import of computer lists in CSV;
  • Encryption of passwords in export files;
  • Cancellation of installation via the Cancel button;
  • Saving the current list of PCs and settings;
  • Removal of the local agent database when agents are uninstalled;
  • Ability to update protected agents.

Server

Separate Ports for Agent and Server in a Cluster
It is now possible to use different ports for agent connections and administrator access in a multi-server cluster.
This approach:
  • Enables access rights segregation;
  • Enhances the overall security level of the infrastructure.
Accelerated File Processing
An improved processing algorithm accelerates content extraction from files that are repeatedly transmitted through different communication channels within the organization.
  • Faster analysis of identical files — up to 1.5 times;
  • Optimized system load;
  • Increased efficiency when working with standard documents and templates.

Windows Agent

Screenshot Packet Compression
Added management of screenshot packet compression by configuring the number of threads.
  • Control over data processing speed;
  • Optimization of workload on workstations;
  • Resource savings on terminal servers.

Linux Agent

Tracking Participation Time in Video Conferencing Control (VCC)
Added analysis of employee activity in video conferences.
  • Recording participation time in VCC;
  • Creation of alert events with data on time and participants;
  • Based on event correlation, it is possible to identify which VCC an employee participated in and what occurred during them;
  • Generation of separate reports for VCC; VCC time is not included in the total working time tracking.
New Website Blocking Mechanism
Blacklist and whitelist blocking features are now available for Linux agents.
  • Control visited resources;
  • Centralized access policy management.
File Interception in POST Requests
Monitoring file uploads to web applications.
  • Intercepting files in HTTP POST requests;
  • Interception at the network monitoring level requires enabling network monitoring and web traffic monitoring.
Intercepting the Web Version of Telegram
  • Intercepting messages in the web version;
  • Maintaining functionality when migrating to Linux.

MacOS Agent

Version 5.7 adds support for macOS Tahoe.

Neutral Agent Icon
This change reduces risks during SCE implementation in organizations.

Command Line Terminal Monitoring
The command line terminal is the least controlled tool. Monitoring the terminal expands capabilities for controlling privileged and technically skilled offenders.
  • Intercepting commands in the terminal and SSH;
  • Identifying risks and incidents among employees with privileged access;
  • Detects configuration changes, file editing and moving, script execution, and privilege escalation attempts.

Interface Updates

New Interface
In the version 5.7, the new interface is enabled by default, but you can always switch back to the old one. In the new interface, the navigation panel can now be pinned in a collapsed state to save screen space.
Report Rebuilding
The Report Rebuilding button has been removed from the Admin menu. The operation can now only be launched via the terminal. The updated report rebuilding mechanism allows for data actualization for a specific month.
  • Prevents accidental triggering of this resource-intensive operation by unprepared administrators;
  • Reduces system load by enabling selective data processing for a specific period.
Expanded View for Combined Report
When the Expanded Report View option is disabled, the full list of users is now displayed.