Best practices to block mouse mover software

Best practices to block mouse mover software

Employers have a common concern with productivity when employees are working remotely A common occurrence with remote working is having employees fake mouse and keyboard movements to avoid getting an “idle” or “away” status with related work apps.

The use of these fake activity software are lowering overall employee productivity while employees could be doing personal tasks or unproductive activities while on company time. As a result, these software are costing companies valuable time and more importantly, money.

To protect against the potential for data manipulation through the use of mouse manipulation software or physical devices that mimic computer activity, it is essential to be aware of these potential sources of inaccuracy. Most of the programs that an employee will use, run silently on the computer.

Through BrowseControl, you can prevent the use of programs such as mouse movement replicators by using the app blocker and adding the corresponding .exe file to the blocked list.


To double down on security measures to ensure future employees don’t have access to these software’s, an administrator can future proof by blocking the webpages in which these services are being offered. This can be done through the use of BrowseControl’s URL blocking feature. To do this, all the administrator will have to do is add the sites URL to the blocked list


A more broad stroke approach would be to set up category filter within BrowseControl to hinder the searching of these applications. This can be done by selecting corresponding categories to the blocked list within “Category Filtering”.


There are countless different programs that an employee can use to simulate mouse and keyboard movement. The most common application an admin could run into include: MouseMover, MouseJiggler, caffeine, movemouse, XUmouse.

If you are looking to block these programs, check out our BrowseReporter best practices related to mouse movers.

You may also reach out to support@currentware.com for further information.


    • Related Articles

    • Best practices to catch mouse mover software

      To protect against the potential for data manipulation through the use of mouse manipulation software or physical devices that mimic computer activity, it is essential to be aware of these potential sources of inaccuracy. Through BrowseReporter you ...
    • Security & SQL Database Best Practices

      Security and Workflows Connection to the Web Console Starting with v8.0.1, the CurrentWare web console will have a preconfigured self-signed SSL certificate that is enabled by default. This will ensure that network communication to and from the ...
    • BrowseControl Filter Configuration – Best Practices

      Here are some quick tips that are best practices when dealing with your BrowseControl filtering setup: URL Filtering List (Allow & Block Lists) When adding URLs there are automatically wildcards(*) before and after the entries. Entering “site.com” ...
    • CurrentWare Security Practices

      CurrentWare is committed to the security of its platform, its customers, and their data. Here’s an overview of the security measures we take to keep the CurrentWare Suite safe. Authentication Security Password Protected: The admin console cannot be ...
    • How do I Control Internet access with BrowseControl

      With BrowseControl website access permissions can be customized for your network based on the user or machine used to access the website, giving you a flexible solution for blocking websites across your network. You will first need to install the ...