REFOG Terminal Monitor 6.4.2.1160 |
Monitor employee activities on the Terminal Server and halt security issues
Publisher: |
REFOG |
|
Downloads: |
431 |
Software Type: |
Shareware, 69.95 |
File Size: |
7.02M |
OS: |
Windows All |
Update Date: |
10 November, 2011 |
A surveillance software to monitor employee activities on the Terminal Server, prevent security breaches and dictate how much time employees spend for work and for fun. Ensuring staff obedience is the main task of REFOG Terminal Monitor (http://www.refog.com/surveillance-software.html). Tracking and logging what, when and how has been used while connected to the Terminal Server allows administrators manage users more efficiently. REFOG Terminal Monitor records all activities of Terminal Server users, allowing administrators to monitor user obedience to company policies. The available time monitor tracks how much time employees spend in front of their PC, while the application tracker logs which applications were used and for how long. The chat control module logs all talks occurring in popular instant messaging programs such as ICQ, AOL, MSN and Windows Live! Messengers. Finally, full keystroke logging gives system administrators the possibility to see what the users were typing while connected to the Terminal Server. In keystroke monitoring, all languages and encodings are allowed for, including hieroglyphs, left-to-right and right-to-left, Arab, Hebrew and Cyrillic among many others. REFOG Terminal Monitor helps stop security problems by instantly telling administrators when the users type particular key phrases. The alerts can be sent instantly by email if the user types one of the words or phrases from a pre-defined list. All users can be monitored individually. Thorough or filtered log views are available, allowing glancing at a summary of user activities or investigating a specific issue in full detail. Printable HTML reports are available. The logs can be easily stored on the Terminal Server, emailed, or uploaded to another location over FTP. Built-in access rights management confines log access to authorized people only. It is possible to set up a password to protect access to the log files.
|