Activity Reporter
Home >> Protegent Enterprise Security >> Activity Reporter
Gives you information of usage of resources on the network by logging system usage time, idle time, keystrokes, websites viewed, chat interactions, file transfer logging, cut/copy clipboard information, application usage monitoring. It also captures screenshots of full as-well-as working screens and alerts on usage of Blacklisted Applications. This module helps analyze exact system usage and hence optimize utilization of resources. It also helps access employee productivity, user surveillance, forensics, and can also help you optimize IT purchases.
Feature list of Activity Reporter
Captures Application activity. | With the help of application monitor time log can be maintained for specific applications. | |
Unique
feature of Blacklist and white
list
Blacklist: applications will get
identified and be visible
in alerts |
Captures clipboard contents | |
Captures Internet activity | Logs websites visited | |
Captures all keystrokes, in case sensitivity. | Option of showing system/non-printable keys is also available. | |
Take screenshots within the specified time interval or on every mouse click. | Option of different qualities of screenshot. | |
Option of capturing the desktop and capturing the foreground of the window. | Setting of report log size (Min 1 MB to Max 5 MB). | |
Manage the logs by setting log days (Min 1 day to Max 90 days). | Complete activity report w.r.t. user login if multiple users are working on same machine | |
Provides the details of the each user login and log out time | Logging of working hours and idle time. | |
Option to select the level of tracking. | Send the reports to the specified email (in the stealth mode). | |
Uploads all logs into the separate folders by FTP (in the stealth mode). | Sending of report logs in a specific time interval. | |
Password protected so only authorized personnel can access the reports. | Loaded with an intuitive interface and very easy to use, even for beginners. | |
Runs in absolutely invisible mode. | Remote installation/update/uninstall. | |
Captures ICQ, Miranda, Skype, Google Talk, MSN, AIM, AOL, Yahoo, QIP chats. | Detection and notification of the custom keywords (alerts). | |
Records contents of password protected web pages, including web mail messages. | Monitors windows clipboard. | |
Monitors computer activity only when user goes online (optional). | Invisible in the Windows startup list. | |
Monitors all users of the PC, even if you don't know their passwords. | Intercepts DOS-box and Java-chat keystrokes. | |
Instant install from a memory card or a flash drive. | Reports of application activity, clipboard activity, working log, Internet activity, keystrokes, screenshots all in HTML format. |