Employee Monitoring Software
Today's marketplace demands on network and internet usage by companies around the world. Our employee monitoring software has taken that direction to help improve the ability for companies to utilize how their networks, computers and systems are being accessed and used to maximize employee efficency. Do you know how many times and days your employees are checking Facebook or YouTube?
With our employee monitoring software we will give you an affordable solution that bundles solutions for automating the computer access credentials for activities and what is reported to your administrator.
Have a large network? Volume discounts are available. Click here to drop us an email.
SentryPC has a very large list of features. Below is a list of NetVizor's extensive features, organized by category for easy browsing. Click on a category to view its feature-set.
Activity Monitoring & Recording Time (click here to view additional information)
SentryPC includes extensive activity monitoring and recording of virtually everything users may do on the computer. Every activity recorded includes the exact date and time the event occurred as well as the duration of the activity. This detailed reporting system is necessary for preventing harmful and/or unwanted use of the computer and Internet all while showing you exactly what users were doing while using the computer.
Alert Logging
Every alert that occurs will be recorded along with the activity blocked and its type. Types include application, website, and keystroke. These are actions that are blocked due to the content filtering rules you have in place for the user.
(View Screenshot)
Application Usage Logging
Log every application or game a user runs, as well as how long they actually interact with each application so you can determine if a user is actually using a program they have opened, or if it is just running in the background idle.
(View Screenshot)
Chat Conversation Logging
Log all AOL, AIM, ICQ, MSN Messenger, Skype, and Yahoo chat conversations made by users of your computer. Includes the messenger name, sender, length of the chat, and timestamp.
(View Screenshot)
Events Timeline
The events timeline includes all types of different events performed by users in one listing. Easily view what users did what in chronological order. Events include applications, websites, windows, blocked activities, location changes, idle activity, monitoring activity, and much more.
(View Screenshot)
File Activity Logging
All file activity is recorded including the action, filename, and timestamp. Actions include copied, created, deleted, modified, printed, and renamed.
(View Screenshot)
Keystrokes Typed
Record all keystrokes made by the user along with the window title they were typed in, how many total keystrokes were typed, and when it occurred.
(View Screenshot)
Location (IP) Logging
Record the IP address and approximate location of the computer. Includes IP address, latitude, longitude, city, state, country, postal code, and timestamp. You can also view the locations on a map for easy viewing.
(View Screenshot)
(View Map)
Print Job Logging
All print job activity is recorded along with the filename that was printed.
(View Screenshot)
Screenshot Capturing
SentryPC can take snapshots of your desktop at set intervals of time, allowing you to visually see what is happening. The screenshot viewer also has a built in slideshow and controls for easy viewing.
(View Screenshot)
Session Logging
Every computer session is recorded along with the total session time, active time, idle time, and when it was started and stopped.
(View Screenshot)
Website Usage Logging
Every website visited is recorded along with the start time, stop time, and how much time the user interacted with the website during that time.
(View Screenshot)
Window Usage Logging
Log the title of each window users interact with while using your computer.
(View Screenshot)
Content Filtering & Restriction(click here to view additional information)
Another important aspect of SentryPC is its extensive content filtering features. Filter applications, games, chats, keywords, and websites on a per user basis. Select on what days, and what specific hours of the day, the filter you define is allowed or blocked. All content filtering features have their own additional options such as enable/disable, alert user, close browser, etc. You can even setup automatic alerts by email to notify you instantly when a user activity has been blocked.
Alert Notifications by Email
If you wish, SentryPC can automatically alert you instantly via email whenever an 'alert' activity happens such as blocked applications, chats, keywords, and websites. Select which activities you want to be alerted by email, and how often, for each user.
(View Screenshot)
Application Filtering
Filter any application or game for any user. Select what hours on what days it is allowed or blocked.
(View Screenshot)
Example
Chat Filtering
Block or filter many of the popular messaging applications available today. SentryPC supports AIM, AOL, Excite, gTalk, ICQ, mIRC, MySpace IM, Odigo, Skype, Trillian, XFire, and Yahoo.
(View Screenshot)
Keyword and Phrase Filtering
Enter specific words or phrases that cannot be entered by users. For instance, enter your children's name, address, phone number, etc. and whenever they are typed the window will be closed instantly. This ensures confidential information cannot be shared with others through email, websites, and other forms of communication.
(View Screenshot)
Security Options
Security options allow you to enable or disable access to various activities for each user. These include : disable access to the computer entirely, bootkeys, clipboard, clock, control panel, desktop, external drives, logoff, mouse, network, run, start menu, start menu change, shutdown, taskbar, and task manager.
(View Screenshot)
Website Filtering (categories)
For quick and easy website filtering we offer category filtering. Filter entire categories of websites for specific users in one click. We currently off the following categories : adult, dating, drugs, file sharing, gambling, gaming, porn, profane, racism, sensitivity, sex, shopping, social, and weapons.
(View Screenshot)
Website Filtering (user-defined)
In addition to category filtering you can also specify your own website urls to allow or block during specific hours of each day of the week. Enter any website address you wish.
(View Screenshot)
(View Screenshot)
Time Management & Scheduling (click here to view additional information)
One of the most important features of SentryPC is its time management ability. For each user account of the computer you can specify on what hours on what days they can access the computer. In addition to this schedule you may also set a 'maximum allowed' time for each day and the week as a whole. For instance, you can allow access to the computer on Monday from 8am to 8pm, but only allow a maximum of 4 hours of use between those times.
Time Management
Enable or disable time management for any user. Specific maximum hours of allowed usage for each day of the week and the week as a whole. Choose what day your scheduling will reset as well as if you wish to alert the user their time is running out.
(View Screenshot)
Daily Scheduling
You can schedule what hours the computer can be used for every day of the week.
(View Screenshot)
Remote Installation & Stealth Operation (click here to view additional information)
SentryPC can be remotely installed without physical presence needed for installation. The install happens instantly and the computer and its users will be available in your online account where you can view logs and change settings. You can also remotely uninstall SentryPC through your online account, again, without physical presence necessary.
Remote Deployment & Installation
You have a few different options when it comes to installing SentryPC :
- Email Deployment
Send the install file by email to the remote computer. It only needs to be executed for installation to occur - there is no confirmation, dialogs, or anything else required. - LAN / Network Deployment
Easily deploy over a network through network shares or logon scripts. - Physical Deployment
Physically install yourself by executing the install file on the desired computer(s).
Remote Uninstall
Uninstall SentryPC remotely through your online account from anywhere in the world. Just choose the computer and click uninstall.
(View Screenshot)
Cloaked Installation
The installation module that is executed on your PC will install a copy of itself that is hidden so it cannot be disrupted/removed. The created module file you use to install SentryPC on the computer is able to be discarded and deleted - without affecting the installation.
Invisible / Stealth Operation
SentryPC is designed to be invisible and secure. Using minimal CPU processing cycles, SentryPC is not visible in any way to the user, and records and updates all logs and settings without any user notification. SentryPC does not reveal itself to the user on your desktop or Program Files folder and will continue to run when your computer is restarted. It is important to note that for 'true' stealth operation you should not enable the optional 'user alerts' in your settings such as alerting a user their allowed time is about to expire.
Ease of Use (click here to view additional information)
SentryPC was created with ease of use in mind. Our simple layout and interface will make using the program a snap for even novice computer users. We include full support with the purchase of the software as well as resources here on this site as well as your online account. If for any reason you are having trouble installing or using SentryPC you can always contact our staff for assistance.
Intuitive Interface
Easy to use, graphical user interface, with an easy access icon and menu system that allows you to quickly, and efficiently view logs and configure filtering and time management rules.
(View Screenshot)
Always Updateable
You will always have access to the latest version. At any time, you can download the latest version of SentryPC from within your online account. We will notify you whenever a new version is released - all you need to do is download the latest version and update your computer(s).
(View Screenshot)
Log Downloading & Archiving
On every log page and reports page you have the ability to download the information. Just click on the 'download' button where you can select the date range and users you want to download. Your download will be in .csv (comma-separated values) format for easy storage and importing into your favorite software. You can also download these logs all at once using our 'create archive' function which will create the logs you choose and download in a compressed .zip file.
(View Screenshot)
Searching and Sorting
Every log, report, and settings page allows you to sort columns by ascending or descending order, search all values, and enter a date range for which you want to view logs. This allows you to easily filter results to only those you wish to see.
(View Screenshot)
Subscription Management
You have full control over your subscription. Edit your contact information, change your amount of licenses or plan, turn on/off automatic renewal, and purchase additional screenshot storage all from your account.
(View Screenshot)
Suggested Uses
Network Monitoring
Employee Monitoring
Remote Monitoring
Remote Administration
Network Surveliance
System Requirements
Windows 8, 7, Vista, XP, NT, 200x (both 32-bit and 64-bit OS supported)
Pentium Class PC (133mhz or higher)
1MB of hard disk space
Windows TCP/IP Network
Testimonials
“I appreciate your team’s support in getting me deployed with Netvizor. It has been amazing to see the amount of Facebook and YouTube activity that our office is using without our Manager’s knowledge. This program has been very enlightening during reviews with our employees. Please extend this testimonial to anyone skeptical of purchasing your software. ”
- email from IT Director