Real-time screen monitoring & screen history recording
View multiple real-time screen snatshops simultaneous just like you are on the sport. You can view 1*1, 2*2, 3*3 and 4*4 screenshots and capture individual screen snapshot and save as pictures.
Create a screen recording policy to record any employee's screen history for reviewing later, play the recorded history like a video, or export to *.wmv video format.
Record all website visits and block unwanted websites
Record a complete copy of website list that your employees have visited, including URL, title, time and more, no matter whether website history is removed on the PC or not. Support Firefox, IE, Chrome, Opera, Maxthon and many other popular web browsers.
Create a web policy to block any unwanted websites like porn, gamble, games, SNS, shopping, etc. You can assign different policies and set time range to different users flexibly.
Record chatting and instant messages from both sides
Record a full copy of conversations from both sides with participants, time, contact ID and contact nickname, support various IM tools like Skype, Yahoo Messenger, ICQ, Tencent QQ, Google Talk and more.
Create an IM file policy to control sending files via IM. In the policy, you can block any files containting keywords, block sending pictures, restrict file size and back up the file your employees want to send.
Track operated documents and control document usage
Record any operated document like PDF, Word, Excel, Pictures, Archive and more, record operation type, user, source file with extension, file size, path, disk type and applications.
Create a document policy to restrain operation types like Create, Copy, Move, Rename, Restore, Delete, Access, Modify, Upload, Download and Burn as well as disk types including fixed drive, floppy, DVD/CD-ROM, removable drive and network drive.
Record application usage and block unwanted applications
Record detailed application logs once the application is launched. Start time, stop time, application name, appliation installation path, window title and more information will be recorded.
Create an application policy to block any unwanted applications, games or executable files. You can sort applications into categories and block the entire category.
Record and control incoming and outgoing emails.
Record incoming SMTP/POP3, Exchange, web-based and Lotus Notes emails, as well as outgoing SMTP/POP3 and Exchange emails. Sender, recipient, CC list, BCC list, subject, content and attachment copy will be recorded.
Create an email policy to control email sending and receiving by domain, email address, attachment, email size, etc. This help to prevent spammers and reduce the possibility of data leakage via email.
Manage network and bandwidth, limit file download and upload
Record a full list of shared files with operation type, remote host, source file and shared file path, enable or disable remote control and remote file transfer.
Create a bandwidth policy to limit file download and upload speed, create a network policy to block IP range and/or port range and create an upload control policy to disable uploading files to website or FTP.
Record and control file printing
Record detailed information of printed task, support local printer, shared printer, network printer and virtual printer. You can also automatically add text or picture watermark to any printed files.
Create a printing policy to control what files can be printed, what printers can be used, who can print and what applications can be used to print.
Manage and control hardware easily
Record software and hardware changes as well as operation types including Add, Delete or change.
Create a device policy to decide what kind of hardware can be used, support storage devices, communication interface devices, USB devices, dial-up devices, network devices and other devices. It's an efficient way to prevent copying files with remmovable drive and USB memory.
Set warnings, alerts and take actions
You can remotely notify, shutdown, restart, log off or lock any monitored computers. You can also set warning messages for any policy violance and set alerts for IT managers.
You can decide whether to automatically lock any computer which is trying to violate the policy. Besides, you can send email notification to specific email address when policy is being violated.
View and manage real-time PC status
View real-time PC status, inicluding running applications, processes, PC performance, device manager, services, disk management, shared folders, scheduled tasks, users and groups, software management, remote control and remote file transfer.
Remotely close applications, end processes, disable or enable hardwares, start or stop services, stop sharing folders, stop scheduled tasks and uninstall software.
Provide statistics and tools for easier management
Provide statistics for applications, websites and traffic using pie chart or bar chart, filtering the top ones.
View all the basic information of monitored computers, assign different priviledges for different users, provide offline agent clear tool and many other pratical features.