Oloid's Presence Detection is a security feature that tracks user presence at specific Windows endpoints, ensuring security and access control. It offers real-time desktop alerts to users and notifies admins of security-related events, allowing for effective monitoring and access control at each endpoint.
To enable Presence Detection, your Windows system must be configured from the Oloid Portal to support the Windows Lock functionality.
Installation and Configuration
The Windows Login app is installed and configured in the device using the Supervisor app.
Download and Install the Supervisor App
Configure the Supervisor App
Pair using the auto-config option, if auto-config fails use the manual pairing option
For details see, Setting up and using Supervisor App guide.
Platform Configuration
For an end-user to use the Windows Login app, the Tenant Admin must perform the following configuration in the Oloid Platform.
Set up Windows Login Application and Connection
For detailed instructions, see How to create and configure Windows Login application
Create user and assign user to connection
For detailed instructions, see User Onboarding for Oloid Portal.
Create and configure Windows Login endpoint
For detailed instructions, see How to add Windows Login endpoint guide, How to configure endpoint for Windows Login
Configure Windows Login endpoint for Presence Detection
For detailed instructions, see How to configure windows alert for presence detection
Monitoring Presence Detection
When a violation is detected, the Windows screen locks, disabling all interactions except for specific buttons displayed on the blocked screen. Alerts notify tenant admin/supervisors of the detected events, allowing them to take appropriate actions.
The tenant admin/supervisor can track user's activity and take appropriate actions using the following options in Oloid Portal.
Using Transactions tab
Using Windows Alert tab
For detailed instructions, refer How to unblock a user's blocked screen
Use
Presence Detection offers automated security actions that include login locks triggered by multiple faces, unauthorized gadgets, and face tracking violations.
For details refer to the following guides: