New video has been published – quick overview of Activity Monitor features.
Learn how to monitor employee computers in your organization. Protect your company from insider threats and improve employees’ performance.Read More
We’ve published a new demo video for Activity Monitor new version 11 with easy step-by-step instructions.
See how to quickly start monitoring computer users in your organization.
You provide a PC workstation for your employee to do actual work. How are they actually spending their time? Perhaps not all that surprisingly, Salary magazine reports that 69 percent of polled employees said they waste at least some time at work on a daily basis (even if a good portion of the other 31 percent just told the pollster what they wanted to hear, that’s bad enough). It’s not getting better, either. The problem is up 20 percent from last year.
Since its appearance, email still remains one of the most cost-efficient communication channels in the business environment. Billions of emails are sent and received every single day Globally to get in contact, share and exchange various information, papers, etc. and for marketing goals as well. Rather often, emails may contain sensitive corporate information, including trade secrets. That’s why, it is essential to keep track on the whole way your employees send and receive emails.Read More
Unlimited and unrestricted Internet access at home, school and work has many pros and some cons. As you will probably agree, we are getting more and more addicted to using the Internet for almost everything we do. Today we are getting any necessary information, communicate with other people irrespective of their geographical location, buy various products, order services, etc. just with a few mouse clicks. However, you should also know that the World Wide Web has made life easier for various cheaters looking for victims online.Read More
new: View screenshots in sync with reports in Central Logs Database [screenshot]:
select a program and view all screenshots for this program in Top Programs report [screenshot]
select a website and view a history of screenshots taken during visits of this website in Top Websites report [screenshot]
view screenshots at the bottom of the screen as you navigate through history of used programs, emails, chats, etc.
double click a screenshot thumbnail in the bottom panel to view it full size
zoom in/out screenshots, view as slide show [screenshot]
recommended setting now is to take screenshots from active window only instead of full desktop. It is now default
new: View History button added in every tab in the Monitoring window that opens Central Log Database for this computer and user
new: screenshots from remote computers are now downloaded together with logs. Get Agent Screenshots command removed. Click Get Agent Log instead
new: Options – Location tab: removed folders for screenshots and exports. Screenshots are now stored in the Central Log Database folder under SCR subfolder
new: Improved compatibility with antivirus products. Now it’s easy to exclude Agent folder from scans in your antivirus to avoid any positive detection
with future updates of your antivirus product
Fixes since version 6.5:
fix: database conversion error on some computers: “error in statement near s”
fix: Activity Monitor crashed on some computers when monitored PC’s IP address changes
fix: Adobe Reader hanged on some computers with Agent installed resulting in user unable to open PDF files
fix: compatibility issue with Microsoft Security Essentials antivirus caused extremely slow file downloads and copying
fix: rare crashes when displaying some HTML email messages
fix: on some monitored computers Administrator users could find recorded screenshots by searching for jpg files in Windows
improved: support of more than 65K rows for export to Excel 2007 or newer
fix: error message on computers with MS Outlook 2010 64-bit about no default email client
Technological change made almost any of modern businesses dependent on computer and Internet resources. However, some employees tend to abuse their computer use during working hours that results in overall decreased productivity and critical information leakage. That’s why, it’s highly important for business owners and managers to use LAN spy software solutions to monitor employee online activities and the whole computer usage.Read More
We use cookies for website functionality and security (necessary cookies). They are always enabled. We also use cookies for website analytics and personalized ads. By clicking ‘Accept’, you consent to the use of cookies on this website. To get more information or withdraw consent please check our Privacy Policy.