Computer Monitoring Software
SpytechSpyAgent is a powerful computer and internet monitoring solution with tons of features and configuration options and support for dual monitor screen logging. SpyAgent Professional records keystrokes, windows opened, applications ran, passwords used, internet connections, websites visited, emails sent and received and even captures desktop screenshots that can be viewed as a slideshow to replay desktop activity.The program keeps detailed activity logs and can be configured to automatically email a log file to a specified address every X minutes. An easy to use and fully featured software package.
Monitoring Features (click here to view additional information)
Spy Agent's monitoring abilities are unmatched in the industry. Spy Agent can monitor and record everything from keystrokes typed to who user email and what they say including many more activities listed below. All activities recorded include the time and date they occurred and can easily be saved, archived, or exported into reports for later use.
Keystrokes Typed
All keystrokes typed are recording along with the date, time, and window they were typed in on the computer. Passwords typed are flagged for easy viewing. You can also format the keystrokes to remove system keys such as backspace to see exactly what was intended. If you have screenshot capturing enabled as well then related screenshots will be shown next to the keystroke log entries.
Emails Sent & Received
All POP3/SMTP emails sent and received by users of the computer will be recorded including any attachments to those emails.
Events Timeline
View all events users performed in chronological order - the Events Timeline lets see what events the user performed in the exact order they did them. Events logged include program starts / stops, keystrokes typed, website visits, email and chat messages, documents viewed or printed, how long users were active or idle during a session, and more.
Chat Conversation Logging
Log all AOL (including 9.0 and Optimized), AIM, AIM Triton, GoogleTalk, Skype, XFire, ICQ, Yahoo, Excite, and MSN Messenger chat conversations made by users of your computer.
Website Activity
All websites accessed and online searches made by the user are recorded along with the website address and duration of the visit. Spy Agent supports the latest versions of the following web-browsers : Internet Explorer, Netscape, Opera, Mozilla, Firefox, Flock, Google Chrome, and America Online.
Application Usage
Log every application a user runs as well as how long they actually interact with the application. This is useful to determine if they are using an application or it is just running in the background not being used.
Webmail and Website Content
Monitor and record all incoming and outgoing webmail messages from most major webmail providers such as Gmail, Yahoo Mail, and MySpace. All website content visited will be recorded as well.
Computer Usage
Log when each session started and ended along with how long the user was active and inactive during it. System shutdowns and user changes are also recorded.
Screenshot Capturing
Spy Agent can take snapshots of your desktop at set intervals of time, whenever the mouse is clicked, or whenever websites are visited - allowing you to visually see what is happening on the computer at all times. You can play back these screenshot in a VCR-style playback for easy viewing. Screenshots are categorized by content as well - social networking, webmail, website usage, and more. You can also increase the capturing frequency when window captions containing specific keywords are interacted with so vital information is not missed.
Internet Traffic
All internet traffic that is sent or received by the computer will be recorded including emails, website requests and contents, FTP sessions, passwords, chat conversations, and more.
Internet Connections
All internet connections made on the computer are recorded including FTP, HTTP, POP3, Chat Messenger, and any other TCP connections.
Files Downloaded / Uploaded
All files downloaded or uploaded by users of the computer through the web, email, or FTP are recorded along with the user, where they downloaded from / uploaded to, and when it occurred. These transfer logs can also be sorted by content-type for easy viewing.
Files / Documents Accessed
Record all files and documents accessed from Windows Explorer including links to view the documents.
File System Usage
All system file activity including that on portable / removable drives is recorded such as modifications, creations, and deletions. Each activity includes the time it occurred and by what user.
Print Jobs
Record all files printed including what was printed, who printed it, what printer was used, and when it happened.
Window and Mouse Activity
Record all windows that users directly interacted with including the mouse actions performed by them.
Clipboard Activity
Record all text copied to the Windows Clipboard by users.
Activity Logging
Record all system shutdowns and user logons including how long the user was active during the session. Spy Agent actions are also recorded including start / stop of monitoring, setting changes, when logs were accessed, and failed attempts to start / stop monitoring of Spy Agent.
Application Specific Monitoring
Spy Agent can be optionally configured to monitor only specific applications you select - all other application usage will not be recorded as is the default setting.
Email Log Delivery
All activity logs can be emailed to an email address you choose every 'xxx' minutes. Email logs and chat conversations cannot be sent via the email delivery method.
FTP Log Delivery
All activity logs can be uploaded to an FTP account you choose every 'xxx' minutes. Please note PC Spy Software will not set these settings up.
Content Filtering Features (click here to view additional information)
Along with the powerful monitoring features mentioned above, Spy Agent can also filter websites, programs, and chat messengers you select from being accessed by users.
Application Filtering
Prevent applications you select from being used and accessed on the computer.
Website Filtering
Select what websites can and cannot be accessed by users of the computer.
Chat Filtering
Select what chat messengers can and cannot be used by users of the computer.
Activity Triggered Logging
Spy Agent can be configured to start monitoring only when specific actions occur such as specific keywords being typed, programs being ran, websites being visited, certain windows being viewed, and more.
Instant Email Alerts
Spy Agent can be configured to send you instant email alerts notifying you when a user runs a filtered website, chat client, or application you have set. Additionally alerts can be sent when the computer is started/shutdown, when spyware detectors are installed, when certain programs or windows are used, and even when a user types a trigger keyword! A screenshot of the desktop is sent along with each alert email so you can visually see what was going on when the alert happened.
Security and Stealth Features (click here to view additional information)
Spy Agent includes numerous security and stealth features. Spy Agent is undetectable under all versions of Windows and can circumvent most popular third-party 'spyware' detectors for ultimate stealth. Aside from this, it also uses log file encryption to prevent viewing of logs from unauthorized users, log file backdating, lockdown and logging scheduling options, and includes an optional startup warning if you choose to notify your computer users they are being monitored.
Complete Stealth Mode
Spy Agent will be completely undetectable to your users. It will NOT show up in the task manager, registry, or Windows startup utilities.
Log File Encryption
All log files created by Spy Agent are encrypted. This prevents viewing the logs without first logging into the Spy Agent application and using its built in viewer (only you will have access to view the logs).
Security Settings
Advanced security features allow you to prevent time/date changes as well as access to the Windows Task Manager. This is simply extra protection to make sure Spy Agent cannot be tampered with by unauthorized users.
Spyware Detector Disabling
Spy Agent can be configured to disable most popular third-party spyware detectors which might tamper with its operation and monitoring of the computer.
Log File Backdating
Spy Agent can be configured to backdate all log files its creates so they appear much older than they are. This makes it impossible to search for and find created log files through recently modified files on the computer.
Force Hidden Files
Spy Agent can be configured to force hidden files within Windows - if a user attempts to change the setting to allow hidden file viewing - it will immediately be reverted back to hidden.
Scheduled Monitoring
You can configure Spy Agent to only monitor the computer during the times you tell it to.
Scheduled Lockdown
You can configure Spy Agent to lockdown the computer from use during the times you tell it to.
Warning Screen (optional)
You can optionally set Spy Agent to warn users they are being monitored through a 'splash' screen along with a custom message to them which you set. This warning is optional and can be turned on/off by you in the settings.
Password Protected
Spy Agent utilizes a hotkey and password combination to gain access to its logs and settings. You must first enter the hotkey (user set combination of keys pressed at the same time) to open the password prompt. You must then enter the correct password. This is the ONLY way to gain access to the logs and settings.
Idle Timeout
Spy Agent can be configured to go into an idle state when a user has been inactive for a set amount of time. When the user resumes activity on the computer Spy Agent will begin monitoring again.
Instant Log Retrieval with Portable or USB Drive
Quickly retrieve activity logs when time is an issue by inserting an authorized USB or portable drive into your computer - Spy Agent will then copy activity reports to - all without having to stop Spy Agent and access it. An optional notification sound plays when the copy process is finished.
Automatic Log Clearing
You can configure Spy Agent to clear its logs after every 'xxx' keystrokes have been typed, after 'xxx' actions have taken place, or when the log file reaches a specific size. This prevents the log files from becoming larger in size than you may wish.
Quick Installation with Portable Drive
You can duplicate a copy of Spy Agent including its settings onto a portable drive for quick installation on another computer.
Automatic Archiving
You can configure Spy Agent to automatically archive (backup) at set time intervals to a location you specify. Optionally you can also have it clear the logs after the backup process is completed.
Automatic Uninstall
You can configure Spy Agent to automatically uninstall itself from the computer on a set date you specify. You can also tell it to clear all settings and logs when this is done.
Configurable Hotkey Prompt and / or Key Phrase
The hotkey is a combination of keys pressed at the same time to open the password prompt. You then enter the password to gain access to Spy Agent. This hotkey can be changed to whatever combination of keys you wish. You may also disable the hotkey access and use a 'key phrase' you select. Simply type the phrase on your keyboard in any window to open the password prompt.
Deploy Utility
Spy Agent has a built in deploy utility that prevents it from being task-ended from the task list and any other process manager.
Pre-Configured Installer
The Stealth Version includes a pre-configured installer which requires no interaction from the user whatsoever as all settings for complete stealth operation have already been set. There is virtually no chance a monitored user will be able to detect or remove the software.
No User Interaction Required
When the install file is executed on the computer you wish to monitor it installs instantly with no windows, popups, or user interaction required, with pre-configured stealth settings. There is no mention or trace of 'Spy Agent' mentioned or shown during the installation. The install process takes seconds and monitoring begins immediately.
Remote Install Capable
The Stealth Version can also be remotely installed. The install file can be emailed (or transferred in any other way) to the computer you wish to monitor and when executed will invisibly install the software and begin monitoring immediately.
Log Management Features (click here to view additional information)
Spy Agent records virtually everything a user does on the computer - this results in large amounts of information being recorded. To make viewing recorded activities easier Spy Agent has built-in Top 10 report generators, summary reports, log cross-referencing, filtering, and search features.
Report Generator
Spy Agent's report generator can create a Most Popular Activities Summary, graphical Top 10 reports, and specific log reports for viewing and printing. A log summary report can be displayed whenever monitoring is stopped - detailing the last session's total user activity time, total inactivity / idle time, how many events were captured, and more. Reports can be generated for all logged dates, a single date, or a range of dates as well.
Spy Agent can create the following types of reports :
- Most Popular Activities Summary
- Top 10 Email Senders
- Top 10 Applications Used
- Top 10 Websites Visited
- Top 10 Files Accessed
- Individual Log Summaries
- Top 10 Email Recipients
- Top 10 Active / Idle Users
- Top 10 Online Searches
- Top 10 File Transfers
Log Cross Referencing
Spy Agent has a built-in cross referencing engine which links together relevant log information for efficient browsing.
Log Searching
Quickly and easily search all logs for keywords you are looking for.
Log Filtering
Use the 'sort by day' feature to easily view activities that occurred on a specific day rather than all activities at once.
Easy to Use! (click here to view additional information)
Spy Agent was designed to be easy to use yet extremely powerful. With the built in configuration wizard you can install and begin using Spy Agent in no time!
Intuitive Graphical Interface
The interface was designed with labeled buttons and icons for a visually easy navigation experience.
Easy Configuration Wizard
Quickly and easily setup Spy Agent with the built-in configuration wizard that guides you through the setup process.
Suggested Uses
Small Business
Single Desktop Monitoring
Home
Parental Monitoring
System Requirements
Windows NT4, 200x, XP, Vista, 7, and the new Windows 8 compatible
Pentium Class PC (133mhz or higher)
3MB of hard disk space
Email and Traffic Data Logging not supported for Dialup users
Testimonials
“I appreciate your team’s support in getting me deployed with Netvizor. It has been amazing to see the amount of Facebook and YouTube activity that our office is using without our Manager’s knowledge. This program has been very enlightening during reviews with our employees. Please extend this testimonial to anyone skeptical of purchasing your software. ”
- email from IT Director