Best practices to catch mouse mover software

Best practices to catch mouse mover software

To protect against the potential for data manipulation through the use of mouse manipulation software or physical devices that mimic computer activity, it is essential to be aware of these potential sources of inaccuracy.

Through BrowseReporter you can easily search your data and be aware of commonly used software names.

Some of the keywords you can search in your application usage would be:

  • Mouse
  • Move
  • Jiggler

The applications that are most commonly used are:

  • Mousejiggle.exe
  • Mousemove.exe
  • Movemouse.exe
  • Xumouse.exe
  • Mousemover.exe
  • Minimousemacro.exe

There are many other potential software that works as a mouse moving utility, so when investigating report data, we can see a common keyword to look for would be “mouse”.

To use the Dashboard

  1. Go to the “Application” tab
  2. Scroll to the bottom and search the “Activity Log
  3. Try looking up “mouse“, “move” or “jiggle” to see if any users have been caught using these applications.

Use the search bar at the top of the activity log to filter results

To use the Static Reports

  1. Go into the BrowseReporter “Manage” page
  2. Select “Run Reports” 
  3. Scroll to the Application reports near the bottom and select “Specific Application(s) Usage
  4. Click the “Select Applications” option and enter “mouse”,” move” and “jiggle” as entries.
    • These results will wildcard before and after your search terms to match the keywords
  5. Apply the changes and run the report

If you are looking to block these programs, check out our BrowseControl best practices related to mouse movers.


    • Related Articles

    • Best practices to block mouse mover software

      Employers have a common concern with productivity when employees are working remotely A common occurrence with remote working is having employees fake mouse and keyboard movements to avoid getting an “idle” or “away” status with related work apps. ...
    • Security & SQL Database Best Practices

      Security and Workflows Connection to the Web Console Starting with v8.0.1, the CurrentWare web console will have a preconfigured self-signed SSL certificate that is enabled by default. This will ensure that network communication to and from the ...
    • BrowseControl Filter Configuration – Best Practices

      Here are some quick tips that are best practices when dealing with your BrowseControl filtering setup: URL Filtering List (Allow & Block Lists) When adding URLs there are automatically wildcards(*) before and after the entries. Entering “site.com” ...
    • CurrentWare Security Practices

      CurrentWare is committed to the security of its platform, its customers, and their data. Here’s an overview of the security measures we take to keep the CurrentWare Suite safe. Authentication Security Password Protected: The admin console cannot be ...
    • How does the Subscription plan work?

      All of CurrentWare’s solutions are available on a minimum 1 year subscription plan. The solutions can be purchased individually for the most flexibility or as the full CurrentWare Suite for the best value and capabilities. When purchasing ...