Capture Control Logs
This page describes each element of the Capture Control Log data table and the available features on the detail page.
Through the Capture logging feature of the MonitorDog Agent, capture events and programs occurring on the user's device are monitored and recorded.
All recorded logs can be viewed on this page.
MonitorDog detects two types of events: keyboard-based capture and capture software. When an event is detected, the capture action or program execution is blocked, and logs are recorded according to the policies configured at the organization and user levels.
Q. How are capture commands and capture programs managed?
A. Capture commands are controlled based on a predefined list managed by the MonitorDog team. Capture programs are controlled based on the programs registered by MonitorDog, as well as additional programs manually added by administrators.
If you would like to add a new capture command, please contact the MonitorDog team. To add a capture program, go to [Settings → Unapproved Software → New Blocked Request].
Log Table
You can review all recorded logs. Each row includes one screen capture and one webcam image, along with brief log information.

Log Detail Page
Clicking a log entry in the file capture log table navigates you to its detail page. On this page, you can review detailed log information and share the event with other administrators.
Attempt Type
Indicates the method the user used to attempt a screen capture. There are two types of capture attempts: keyboard shortcuts and capture software. If the attempt is made using a keyboard shortcut, the specific capture command is displayed. If the attempt is made using capture software, the name of the application is shown.

Event Images
You can view screenshots and webcam images captured at the time of an event. By default, all images are set to private. To view these images, you must submit a Security Audit request.

Clicking on a private image will open a security audit request modal. You can start a security audit by entering the target period and audit time along with the reason for the request.

Once the audit begins, a countdown timer will appear at the top right based on the configured audit time, and the images will be made accessible. Any image viewed from the event detail page will be added to the security audit list, and you can review the events and images later via the security audit detail page.

Q. I can’t submit an audit request!
A. Only administrators with Viewer or higher permissions can submit a security audit request. If you want to view the images and proceed with the audit, please contact a higher-level administrator to request a permission change.