We currently offer the following reports : activities, alerts, applications, applications usage , clipboards, events, events type , files, keystrokes, locations, online searches, portable drives, print jobs, screenshots, sessions, websites, websites domain , websites usage , and windows. Create visual charts of your account's logs.
All charts can easily be printed or downloaded in the following formats csv, jpg, pdf, png. Another important aspect of SentryPC is its extensive content filtering features. Filter applications, games, keywords, and websites on a per user basis. Select on what days, and what specific hours of the day, the filter you define is allowed or blocked. You can even setup automatic alerts by email to notify you instantly when a user activity has been blocked or a custom alert has been triggered.
Create custom activity alerts by keyword or phrase. If any of these keywords are found in a newly added activity log, SentryPC will create an alert with the activity's details. These are non-blocking alerts and will not affect the user of the computer in any way. For example, you could add your phone number as a keyword and an alert would be created every time your phone number is found in any newly added activities for that user. You also have the option to be notified by email when these custom activity alerts are triggered.
If you wish, SentryPC can notify you instantly via email whenever an 'alert' activity happens such as blocked applications, games, keywords, websites, and your own custom activity alerts you have setup.
Select which activities you want to be notified by email, how often, and for each user. Filter any application or game for any user.
Select what hours on what days it is allowed or blocked. Enter specific words or phrases that cannot be entered by users. For instance, enter your children's name, address, phone number, etc. This ensures confidential information cannot be shared with others through email, websites, and other forms of communication. Security options allow you to enable or disable access to various activities for each user.
Options available vary between Windows and Mac. For quick and easy website filtering we offer category filtering. Filter entire categories of websites for specific users in one click. We currently offer the following categories : aggressive, dating, drugs, file sharing, gambling, gaming, job search, media, porn, sex, shopping, social, violence, weapons, and web mail.
We also offer word categories which will block the website when offending words are found on the page. These categories include : adult, profane, and racism. The sensitivity of this filter number of offending words found that triggers a block is controlled by you.
In addition to category filtering you can also specify your own website urls to allow or block during specific hours of each day of the week.
Enter any website address you wish. One of the most important features of SentryPC is its time management ability. For each user account of the computer you can specify on what hours on what days they can access the computer. In addition to this schedule you may also set a 'maximum allowed' time for each day and the week as a whole. For instance, you can allow access to the computer on Monday from 8am to 8pm, but only allow a maximum of 4 hours of use between those times.
Enable or disable time management for any user. Specific maximum hours of allowed usage for each day of the week and the week as a whole. Choose what day your scheduling will reset as well as if you wish to alert the user their time is running out.
You can schedule what hours the computer can be used for every day of the week. SentryPC operates in complete stealth by default and can be remotely installed without physical presence needed for installation.
The install happens instantly and the computer and its users will be available in your online account where you can view logs and change settings. You can also remotely uninstall SentryPC through your online account, again, without physical presence necessary. SentryPC is designed to be invisible and secure.
If you selected the confirmation option when you downloaded the install file you will be presented with the confirmation dialog as shown below. After clicking 'Yes' the software will be installed. You will now be presented with the following popup requiring your admin password. Enter your admin password to continue. You may need to do this twice depending on your Mac version.
Click the 'Privacy' tab at the top then 'Accessibility' from the side list as shown in the image below. For newer operating system releases you will repeat this same process, but choosing 'Screen Recording' from the side list.
You must hover over the side list with your mouse to allow scrolling of the list. Repeat steps for each user on the Mac you wish to monitor and record with SentryPC. You can now begin setting your options, activity filters, time management options, and more for the users of these computers.
If, while downloading or installing SentryPC, you receive an alert from your antivirus or security software do not be alarmed. SentryPC is not a virus, is not harmful, and it cannot damage your computer. Your antivirus scanner is being triggered by the monitoring and control abilities of SentryPC. The majority of antivirus scanners today alert you when just about any application that could be potentially used in a malicious or privacy-invasive manner is installed — this includes keystroke loggers, activity monitoring software, remote administration tools, and many others… whether they are commercially available and well-known or not.
The antivirus scanner is doing its job — it is reporting something with powerful monitoring and control abilities over the computer. Imagine if you thought you were downloading a song, video, game, etc, but in reality it had monitoring and control abilities over your computer. You would want your antivirus scanner to warn you right?
That is the same thing happening here, but those abilities are why you purchased SentryPC — you want to monitor and control the activity of your computer.
By excluding SentryPC from your antivirus scanner you are essentially saying 'yes, I know what SentryPC is, what it does, and wish to allow it to operate'. Without exclusion your antivirus scanner will assume you do not have knowledge of SentryPC or its abilities and can prevent it from operating.
If you are receiving a message that your SentryPC installer is damaged then please follow the steps below :. Remember me? Login Now. Installation Guide Choose your operating system :. Step 1 : Before downloading your install file you will want to temporarily disable any antivirus scanners you have on your system. Step 2 : Now you can go ahead and download your install file. Step 3 : It is time to install. Step 4 : Now that the file has been executed you 'may' be shown a Windows Smart Screen warning similar to the image below depending on what version of Windows the computer has.
Step 5 : If you selected the notification option when you downloaded the install file you will be presented with the confirmation dialog as shown below. Step 6 : Now that SentryPC is installed on the computer you will want to exclude SentryPC's files from any antivirus scanners on the computer s. Step 7 : You have just installed SentryPC! Step 2 : Open the SentryPC. Step 4 : If you selected the confirmation option when you downloaded the install file you will be presented with the confirmation dialog as shown below.
Step 5 : You will now be presented with the following popup requiring your admin password. Step 9 : You have just installed SentryPC! We are extremely pleased with SentryPC — it is proving to be a tremendous asset for us! You guys did a fantastic job with the online account — love the features and options!
Remember me? Login Now. Mac OS X Featured in :. Remotely monitor, filter, and control all user activity SentryPC is a completely cloud-based computer monitoring, content filtering, and time management software wrapped into one.
Record their activities Every activity your users perform on the computer and Internet is recorded in real-time and in full detail for viewing — you will know exactly what they did and when they did it. Activity Monitoring ». Content Filtering ». Schedule their usage Control when your users can use the computer by creating daily schedules — select what hours of each day usage is allowed and set maximum usage limits for each day or the week.
Time Management ». Easy to use interface accessible from anywhere Login to your secure cloud-based account from any web-enabled device, at any time, from anywhere. Keystrokes Log. Events Log. Screenshots Log. Screenshots Log detail. Activities Overview. Locations Overview. Websites Chart. Sessions Chart. Applications Chart top hours. Website Filtering categories. Time Management weekly schedule. Feature packed with everything you need and more Stop guessing and start knowing exactly how they use the computer and Internet in full detail.
Overview Activity Monitoring Content Filtering Time Scheduling Cloud-based account Login to your secure online account from any web-enabled device to remotely view activity logs and change settings of any user.
0コメント