Leave a comment

USB Devices: “Analyzing security”: “what is happening in my environment” using Excel Charts

02/08/2019 – secRMM is Windows security software that records all the events related to USB storage devices.  This includes thumb/flash drives, external hard drives, SD-Cards and mobile devices.  With secRMM, you see the who, what, when, where and how about all the USB storage in your computer environment.

secRMM comes with a utility to help you analyze the data in an easy way.  The utility is called the secRMM Excel Add-In.  As the name implies, it extends Excel.  Microsoft offers Office Add-Ins for most of the programs in the Office suite.

secRMM Excel Add-In Ribbon Bar

secRMM Excel Add-In Ribbon Bar (click to enlarge screenshot)

As you can see in the screenshot above, Excel has a tab in the ribbon bar named secRMM.  The secRMM section contains various methods for you to pull the secRMM data into the Excel Worksheets.  Once you have loaded the secRMM security data, you can use all the native Excel features (filtering, finds, macros, etc.).

We have added a new feature into the secRMM Add-In.  This is the “Charts” feature.  While you can manipulate the data in any way you want to make your own Charts, we made an automated way for you to see the most common scenarios with just a couple of mouse clicks.

secRMM Charts button

secRMM Charts button (click to enlarge screenshot)

Once you have some secRMM data loaded and you click the Charts button, you will be presented with a dialog (see below) that will let you specify the start/end times and the chart(s) you want to generate.  You can also specify what type of Excel chart to create for each chart.  Microsoft offers many Excel chart types.  The Excel chart type is totally up to you.

secRMM Charts input form

secRMM Charts input form (click to enlarge screenshot)

Once you specify your time range, which charts and chart type, you will see the charts on the “Charts” worksheet (see below).

Currently, the automated charts are for:

  1. secRMM events
  2. Users
  3. Computers
  4. USB Devices

As you can see in the screenshots below (btw, the data at the axis has intentionally been chopped), you can easily see the: who (users), what (events), when (via time range), where (computer) and how (devices) of USB security activity occurring in your environment.

We hope the secRMM charts help you easily analyze your USB security data.  Please let us know if you have any questions.  You can reach us at support@squadratechnologies.com.

secRMM Events Chart

secRMM Events Chart (click to enlarge screenshot)

secRMM Users Chart

secRMM Users Chart (click to enlarge screenshot)

secRMM Computers Chart

secRMM Computers Chart (click to enlarge screenshot)

secRMM Devices Chart

secRMM Devices Chart (click to enlarge screenshot)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: