• 0 Posts
  • 1 Comment
Joined 1Y ago
cake
Cake day: Jul 27, 2023

help-circle
rss

Generally security programs like this that do keylogging are context aware and don’t include passwords, plus if it’s a managed device they probably wouldn’t need keylogging to obtain passwords if that was the objective. Significant amount of endpoint protection software will allow for RAM capture, which would have your passwords as well.

Furthering this, if you’re accessing managed applications (say OneDrive or Sharepoint) it’s common to prevent access to a device that doesn’t have all of the monitoring software installed.