Total Network Monitor 2 is a program for continuous monitoring and administration of a local network, individual computers, Internet resources, network and system services. TNM will notify you in advance of the occurrence of problems through various means and generate a detailed report on what happened and when.

Network monitoring

you create monitors- objects that periodically check one or another aspect of the operation of a service, server, or file system. The monitors are flexibly configured and display the network status in real time.

If any indicators deviate from the norm, the monitor executes the script described in advance actions: e.g. beep, e-mail or IM notification with detailed description incidents, reboot remote computer, application launch, etc.

Turning to magazine network monitoring, you can always see the history of readings of all monitors and a list of performed actions.

Download for free and start using right now and without functional limitations!

Health checks and problems

Checks- connection of Total Network Monitor 2 with the outside world. They provide monitors with data for analysis. In our network monitoring utility you will find many checks for all occasions. Queries over network protocols to monitor servers, check services, event log and keys Windows Registry, searching for a string in a file on a remote computer, and much more - TNM does all this with ease.

List of checks

Internet: ICMP TCP HTTP FTP SMTP POP3 IMAP Telnet

Windows: Event Log Service Status Registry Status System Performance

File-based: File existence File size File comparison Number of files CRC32 file Content of file Disk space

Alerts and event history

Actions triggered when something doesn't go according to plan. They notify you so you can fix things in time. They can provide first aid in administering a local network: restart a service or a remote computer, launch an application, execute a script. Or they can just add an entry to a separate journal.

Action List

Warnings: Message Box Notification Sound signal Write to file

Alerts: E-mail Jabber Event Log

Action: Run the application Run the script Restart the service Restart the computer

All actions performed and all changes in observed parameters are continuously logged, forming a clear picture of the state of the network.

Logging Checks to the Monitor Log

Total Network Monitor 2 monitors all running monitors and records the necessary information about the operation of checks. Any change in the state of the monitor is captured in Monitor Log:

Statistics and Activity Chart

Statistics include the time when the selected monitor was started and last scanned, the total number and number of green, red, and black monitor states. A separate tool can be called activity chart, which graphically displays the results of checking the selected monitor.

Monitoring actions in the log

TNM logs every action performed and non-performed in Activity log, showing the timecode and the name and IP address of the target equipment:

Convenient map of network devices

Build a visual plan for your monitoring project with network maps: place icons of computers, devices and servers on a plant diagram or world map, and depict the structure of a network using connections.

Color indication next to each device on the network map allows you to quickly determine their status.

Online tracking and remote control

How to follow the child if you are not nearby? Easily. There are programs that allow you to view the screen via the Internet, by linking to an account. Moreover, in addition to the tracking function, each of these programs has a lot of additional features. Let's take a look at the most popular tracking and remote control software.

NeoSpy - software for remote tracking behind the user PC with the function online viewing screen via the Internet (linked to an account). With the help of this software product you can always view the screen of your home or work PC not only from another computer, but even from your phone or tablet via the Internet. The program is easy to install: you download the installation wizard from the official website, which downloads the program itself and installs it (by the way, there are no advertising and intrusive toolbars that even large software companies have been guilty of lately in the distribution kit). Further, after installation, go to the settings and link the program to your account, after which the function of viewing the screen online will be available.

NeoSpy Spy Software


In addition to normal viewing, you can choose what to watch: windows that open, text typed on the keyboard, sites visited by the user, as well as correspondence in instant messengers installed on the user's PC.

As you can see from the screenshot of the settings, the program provides a lot of opportunities, which everyone chooses for himself, based on his goals and objectives.

Linking an account is very easy. Select the "View via Internet" item, enter the username and password, click "Connect". Turn on tracking.

Now go to the program's website, enter your username and password, go to the "Account" tab and click on "Your computers".


Online tracking in the account


In addition to viewing the screen itself, you can connect to your webcam, which will help you monitor not only the actions on the computer, but also around it. You can see if your child is doing their homework.

If the program is installed on a portable device, the program shows on the map the geographical location of your device at the time of use.

It should be noted that of the programs of this kind considered, it is NeoSpy that makes it possible to conduct covert online tracking and allows you to save video from the screen in your account. It is also possible to scroll, rather than watch the entire video. Unlike NeoSpy, other programs do not save video, and tracking requires you to be constantly connected to the screen.

An important difference between NeoSpy and other presented programs is completely hidden surveillance, that is, the user does not see messages about your connection on his screen, as, for example, in TeamViewer and other programs, thanks to this your child will not know about the surveillance of him.

What else can be done with NeoSpy?

Traffic encryption. All data transmitted through the server is securely encrypted. They are almost impossible to decipher. NeoSpy uses AES encryption of data transmitted over the network (image screen, motion pointer, keyboard signals, etc.). Double password protection. The first is the online account: the password that is used to log into the online system. This only allows you to view a list of computers previously added to online system but doesn't let you contact them. The second password (and the most important one) is the access password, which allows you to connect to your computer and see sensitive data.


Main window interface


Remote Access Alerts

When using the "Messages" option, you can notify the user about something. Other security features:
The user cannot remove or close the tracking module even through the task manager.

Remote Desktop

Controlling a remote PC displays the screen of that PC (via the Internet or LAN) on your own monitor. That is, you will be able to see everything on the remote PC as if you were sitting in front of it, regardless of the distance between the PCs.

The program allows you to work with different remote PCs simultaneously, from anywhere in the world.

How is Remote Desktop in NeoSpy different from other programs?

The main advantages of the NeoSpy remote control software are:
- Built-in keylogger;
- High speed and performance;
- Internet Gateway allows you to connect to a remote PC behind a firewall or when there is no IP address routing or the IP address changes dynamically - this is unique feature programs!
- Low network load due to optimized data compression algorithm. The encryption algorithm makes the use of the program absolutely safe;
- Multiple simultaneous connections. With this feature, the network administrator can effectively view various remote computers at the same time;
- GUI convenient and intuitive;
- Remote Desktop is easy to install. You do not need to be a computer expert to set up and operate this software.

UltraVNC is powerful and simple, and last but not least, it's free. It displays the desktop of a remote PC (via the Internet or LAN) on your computer screen. The program allows you to use your mouse and keyboard to control the remote computer you are connected to. You can manage this computer as if it were your own. For employees technical support this program will be especially useful because will help you quickly access the client's PC and carry out the necessary operations, wherever the client is. The program does not require particularly complex actions from the client and is launched from a file. UltraVNC works great under almost all operating systems (Windows: from Windows 95 to Windows8, Linux, Mac OS) x32 and x64. With the built-in viewer, you can share files between computers.


UltraVNC Interface


Who will benefit from UltraVNC - for those who need remote support Windows users. The products have been specially designed to meet the needs of:

  • Help Desk;
  • IT departments;
  • Users who want to help their relatives and friends, or access their home PCs from work or Internet cafes.

DameWare Mini Remote Control

Powerful PC remote control software that runs on Windows, Linux and Mac OS. DameWare Mini Remote Control (MRC) is one of the best software for remote control software. DameWare Mini Remote Control is available from DameWare Central Server and Administration Console for advanced management. MRC is licensed based on the number of vehicles in your organization. The program was created over 10 years ago and since then thousands of IT administrators have got a perfect connection to remote servers, PCs and laptops thanks to DameWare Mini Remote Control. DameWare MRC provides remote control for Mac systems OS X, Windows and Linux and includes many great features for remote PC control.

Intuitive control interface. You can receive information from remote computers that can be located anywhere: in the same building, on the other side of the city, or around the world. DameWare MRC makes remote desktop use incredibly fast.

Benefits of DameWare Mini Remote Control:

  • Remote control of Windows, Mac OS X and Linux systems. Connect via RDP, RDP or VNC from one console. A separate screen is created for each user, for easy remote troubleshooting. File transfer possible during remote control sessions Mini Remote Control can be deployed with a DameWare central server and administration console that provide advanced management capabilities from a single center. You can restart your computer and turn on sleeping computers, edit BIOS settings remotely, create Mount ISO images on remote PCs. It is possible to install or reinstall the OS remotely.

    With DameWare MRC's chat feature, you can chat online with remote users to set up their computer. DameWare MRC allows you to define rules for accessing remote PCs for various types users: require non-administrators to get permission for remote connections; allow administrators to connect without permission; manage access rights using group policy. Automatically Deploy Remote Control: DameWare MSI Builder is included with MRC, allowing you to create an MSI package to install MRC customer service agent, including any custom settings. DameWare Mini Remote Control supports identification and remote connection using a smart card. MRC is part of the DameWare Remote Support (DRS) system administration tool. In addition to RTOs, the DRS software suite includes DameWare Mobile, Windows administration, Active Directory, management, configuration and export tools. However, please note that in order to download the trial version, you will need to fill out a registration form.

Radmin 3 is a program for remote control of your PC running Windows. The program makes it possible to work on several computers at once quite fully, simply by connecting to the desktop of a remote PC. The software allows you to use many languages, share files. The ability to work in Telnet mode makes it possible to manage a large organization remotely without problems.


Radmin remote control


Program features:
- The program is compatible with all versions of Windows.
- Excellent speed.
- Secure connection.
- Supports Intel® AMT features.
- Works under Windows 8 x86 and x64.
- Support for multi-user chats, both text and voice.
- Work with multiple monitors.
- Easy and simple to install.
- File transfer is protected.
- Does not require a lot of system resources.
- Supports multiple connections at the same time.
- Technical support is free.
Additional features:

The ability to select the screen color transmission mode: from 2 thousand to 16 million colors.
- Mouse wheel support.
- Support for keyboard shortcuts.
- There is no limitation on the screen resolution of the remote PC.
- The viewer is compatible with Wine (works under Linux OS).
- Clipboard support.
- Unlimited address book.
- Built-in search for Radmin servers.
- Excellent reference.
- Work in TelNet mode.
- Ability to remotely shutdown the PC.
- Logging of all connections.



Another program that allows you to easily connect to any computer that has Internet access is TeamViewer. Just an ID and a password are enough, because the program has the ability to run even without installation. TeamViewer - PC management software, demos specific window from your screen to other users, which helps to train employees, hold meetings, listen to employees' reports, and simply discuss and plan work without leaving your computer.


Remote control via TeamViewer


You can create an account on the program's website and add any computer to your address book. Lists inside the book are supported, which will allow you to connect to the right computer in just two clicks by simply selecting the desired PC name from the list. For persistent connections, you can set permanent password and save it in your address book. This will allow you to quickly connect to the desired computer without entering a password. Advantages of TeamViewer: The program has a conference mode (but there is a limit of 25 participants). There is support for mobile devices. You can take screenshots in real time. TeamViewer guarantees the security of the connection. The program is shareware and has limitations of free use. Paid features are more suitable for large companies. However, there are some connectivity issues between different versions. A user with version 9 will no longer be able to connect to a user with version 4.



Anyplace Control is a remote control program. The program displays the client's remote desktop on your screen and allows you to control it remotely using your own mouse and keyboard. Some of the software's popular applications include remote support within a corporate environment or simply work from home with remote access to office computers.

Transfer files between PCs Anyplace Control provides an easy and secure option for transferring files between PCs using an interface that is similar to Windows XP Explorer. The Anyplace Control file transfer software is very fast and reliable. Even in the event of a network failure, it will resume transmission at the location where the failure occurred. Thus, there is no need to start the procedure again. There is no need to set up a router or firewall. You will be able to connect to Remote Desktop with three different ways: "Connection IP", "Account Connection" and "Computer Connection ID" Anyplace Control provides access to remote PCs over the Internet that do not have external IP addresses. You can easily connect to other PCs with dynamic IP addresses or internal (192.168.xx) addresses without any additional network configurations. You will be able to easily connect to your PC via the Internet, even if it is behind a router, firewall or proxy server. You don't need to open firewall ports or configure your router.


Anyplace Control Interface


You can connect to your client in a few clicks. Anyplace Control does not require special computer skills. If a standard installation host module is too complex, then the remote user can manually download software by clicking on a special link that has a pre-configured host module (does not require installation or any additional configuration).

Summing up, we can say that most programs support the most necessary functions - direct control of a remote PC. Some are free, some you have to buy. Some programs support the creation of accounts, which greatly simplifies remote management in the future. Often you can just view the screen of a remote computer without taking control of the latter. However, not all programs are multiplatform. Some work exclusively under the control of only one operating system, which is not very convenient in a large organization. For such purposes, it is much more expedient to use paid global products that support the creation of accounts and PC lists, save passwords, work under the control of most of the most popular operating systems and which are easily integrated into a larger organization. If all you need to do is periodically monitor the screen of your home PC remotely, there is no point in buying expensive software, most of the functions of which you will not need. It is also worth paying attention to the very operation of the program: some clearly show your remote presence on the computer, and some do not manifest themselves in any way, which will be very useful for covert monitoring of the computer.

Programs that might interest you

- a program for monitoring the computer.

— Verification of fidelity of spouses;
— Control of children on the Internet;
— Calculation of negligent employees at work.

NeoSpy intercepts and sends all correspondence, screenshots, visited sites and passwords to your email.

passwordspy- a program for recovering saved passwords from browsers and email programs.

— Recovery of lost passwords;
- Support for more than 100 programs (ie, chrome, opera, firefox, outlook, the bat! and others) ;
- The portable version can be run from a flash drive.

Browsers, email programs, instant messaging programs store information about the passwords you use and PasswordSpy can recover them.

voicespy- program for hidden entry Skype conversations.

- Quick installation and permanent recording of all conversations;
- Completely hidden mode of operation;
- Sending recorded conversations in mp3 to e-mail.

Internet Sheriff- a program blocking unwanted sites.

– Protecting the child from harmful and corrupting information;
- Block entertainment and social networks from employees;
- Ready-made lists of porn sites, social networks, entertainment sites.

Reprinting materials from the site site is allowed only if all indexed links are saved, including links to the program page in the site catalog

The previous article compiled a list of 80 monitoring tools Linux systems. It also made sense to make a selection of tools for the Windows system. Below is a list that serves only Starting point, there is no rating.


1.Task manager

well-known dispatcher Windows tasks- utility for displaying a list running processes and the resources they consume. But do you know how to use its full potential? As a rule, it controls the state of the processor and memory, but you can go much further. This application is pre-installed on all Microsoft operating systems.

2. Resource Monitor

A great tool to evaluate CPU usage, random access memory, networks and drives in Windows. It allows you to quickly get all the necessary information about the status of critical servers.

3.Performance Monitor

The main tool for managing performance counters in Windows. Performance Monitor, earlier Windows versions known to us as System Monitor. The utility has several display modes, displays performance counters in real time, saves data to log files for later study.

4.Reliability Monitor

Reliability Monitor - System stability monitor, allows you to monitor any changes in computer performance, you can find the stability monitor in Windows 7, in Windows 8: Control Panel> System and Security> Action Center. Using Reliability Monitor, you can keep track of changes and failures on your computer, the data will be displayed in a convenient graphical form, which will allow you to track which application and when caused an error or hung, track the appearance blue screen Windows death, the reason for its appearance (another Windows update or software installation).

5.Microsoft SysInternals

SysInternals is full set programs for administering and monitoring computers running Windows. You can download them for free on the Microsoft website. Sysinternals tools help you manage, troubleshoot, and diagnose applications and operating systems. Windows systems.

6. SCOM (part of Microsoft System Center)

System Center is a complete set of tools for IT infrastructure management, with which you can manage, deploy, monitor, configure Microsoft software (Windows, IIS, SQLServer, Exchange, and so on). Alas, MSC is not free. SCOM is used for proactive monitoring of key IT infrastructure objects.

Monitoring Windows Servers with the Nagios Family

7. Nagios

Nagios has been the most popular infrastructure monitoring tool for several years (for Linux and Windows). If you are considering Nagios for Windows, then install and configure the agent on windows server. NSClient++ monitors the system in real time and provides output with remote server monitoring and more.

8. Cacti

Usually used together with Nagios, it provides the user with a convenient web interface to the RRDTool utility, designed to work with circular databases (Round Robin Database), which are used to store information about changes in one or more values ​​over a certain period of time. Statistics in network devices are presented in the form of a tree, the structure of which is set by the user, you can build a graph of channel usage, HDD partition usage, display resource latency, etc.

9. Shinken

Flexible, scalable open source monitoring system source code, based on the Nagios kernel written in Python. It is 5 times faster than Nagios. Shinken is compatible with Nagios, you can use its plugins and configurations without making adjustments or additional configuration.

10. Icinga

Another popular open monitoring system that checks hosts and services and reports their status to the administrator. Being a fork of Nagios, Icinga is compatible with it and they have a lot in common.

11. OpsView

OpsView was initially free. Now, alas, users of this monitoring system have to fork out.

Op5 is another open source monitoring system. Graphing, data storage and collection.

Alternatives to Nagios

13. Zabbix

Open source software for monitoring and tracking the status of various services computer network, servers and network equipment, used to obtain data on the processor load, network usage, disk space and the like.

14. Munin

A good monitoring system that collects data from several servers at the same time and displays everything in the form of graphs, with which you can track all past events on the server.

15.Zenoss

Written in Python using the Zope application server, data is stored in MySQL. With Zenoss you can
monitor network services, system resources, device performance, the Zenoss core analyzes the environment. This makes it possible to quickly deal with a large number of specific devices.

16. Observium

Monitoring and surveillance system network devices and servers, although the list of supported devices is huge and is not limited to network devices, the device must support SNMP.

17. Centreon

A comprehensive monitoring system that allows you to control the entire infrastructure and applications containing system information. Free Alternative Nagios.

18. Ganglia

Ganglia is a scalable distributed monitoring system used in high performance computing systems such as clusters and grids. Tracks statistics and real-time calculation history for each monitored node.

19.Pandora FMS

Monitoring system, good performance and scalability, one monitoring server can control the work of several thousand hosts.

20. NetXMS

Open source monitoring software computer systems and networks.

21.OpenNMS

OpenNMS monitoring platform. Unlike Nagios, it supports SNMP, WMI and JMX.

22.HypericHQ

A component of the VMware vRealize Operations suite, used to monitor OS, middleware, and applications in physical, virtual, and cloud environments. Displays availability, performance, usage, events, logs, and changes at each layer of the virtualization stack (from the vSphere hypervisor to guest OSes).

23. Bosun

An open source monitoring and alert system from StackExchange. Bosun has a well-thought-out data schema, as well as a powerful processing language.

24. Sensu

Sensu is an open source alert system similar to Nagios. There is a simple dashboard, you can see a list of clients, checks and triggered alerts. The framework provides the mechanisms that are needed to collect and accumulate server statistics. On each server, the Sensu agent (client) is launched, which uses a set of scripts to check the health of services, their status, and collect any other information.

25. CollectM

CollectM collects statistics about system resource usage every 10 seconds. It can collect statistics for several hosts and send it to the server, the information is displayed using graphs.

28. Performance Analysis of Logs (PAL) Tool

34.Total Network Monitor

This is a program for continuous monitoring of the local network of individual computers, network and system services. Total Network Monitor generates a report and notifies you of any errors that have occurred. You can check any aspect of a service, server, or file system: FTP, POP/SMTP, HTTP, IMAP, Registry, Event Log, Service State, and more.

35.PRTG

38. Idera

Supports multiple operating systems and virtualization technologies. There are many free tools with which you can monitor the system.

39.PowerAdmin

PowerAdmin is a commercial monitoring solution.

40. ELM Enterprise Manager

ELM Enterprise Manager - full monitoring from "what happened" to "what's going on" in real time. Monitoring tools in ELM include - Event Collector, Performance Monitor, Service Monitor, Process Monitor, File Monitor, PING Monitor.

41.EventsEntry

42. Veeam ONE

Efficient monitoring, reporting and resource planning solution for VMware, Hyper-V and Veeam Backup & Replication infrastructure, monitors the health of your IT infrastructure and diagnoses problems before they interfere with user experience.

43. CA Unified Infrastructure Management (formerly CA Nimsoft Monitor, Unicenter)

Monitors the performance and availability of Windows server resources.

44.HP Operations Manager

This infrastructure monitoring software performs proactive root cause analysis, reducing recovery time and operations management costs. The solution is ideal for automated monitoring.

45. Dell Open Management

OpenManage (now Dell Enterprise Systems Management) an all-in-one monitoring product.

46.Halcyon Windows Server manager

Management and monitoring of networks, applications and infrastructure.

Below is a list of (most popular) network monitoring tools

54. Ntop

55. NeDi

Nedi is an open source network monitoring tool.

54. The Dude

System Dude Monitoring, although it is free, but according to experts, it is in no way inferior to commercial products, monitors separate servers, networks and network services.

55. BandwidthD

Open source program.

56. NagVis

An extension for Nagios that allows you to create infrastructure maps and display their status. NagVis supports a large number of different widgets, icon sets.

57Proc Net Monitor

A free monitoring application that allows you to track all active processes and, if necessary, quickly stop them to reduce the load on the processor.

58.PingPlotter

Used to diagnose IP networks, it allows you to determine where the loss and delay of network packets occur.

Small but useful tools

The list would not be complete without mentioning several options for hardware monitoring.

60Glint Computer Activity Monitor

61.RealTemp

Temperature Monitoring Utility Intel processors, it does not require installation, tracks the current, minimum and maximum temperatures for each core and the start of throttling.

62. SpeedFan

A utility that allows you to control the temperature and speed of rotation of fans in the system, monitors the performance of sensors motherboard, video cards and hard drives.

63.OpenHardwareMonitor

LanAgent - a program for monitoring computers in the local network of an enterprise

Any leader knows for sure that there is no employee in this world who is ready to selflessly engage in his direct duties at work, to forget about his interests, hobbies, albeit the most harmless or useful, for the time being. Lazybones were, are and will be. Why not install hidden cameras? In every office? Unlikely. A competent leader probably knows about "agent programs" that are installed on a computer and collect visual information about the activities of employees. Now it’s something you can calmly and confidently present to a lazy person, as strong evidence of his guilt.
The program is very effective in this role. A very serious argument in the eternal confrontation "severe boss - cunning employees." And here the point is not even to bring a negligent employee to clean water and deprive him of his bonus, but to anticipate, predict such acts. Once caught, our lazy person, believe me, is unlikely to play solitaire or wander around the expanses of the network in the absence of superiors. Prevention - the best treatment. Let's start with the fact that LanAgent, being completely invisible (even for a self-described "advanced user"), monitors the user's actions completely: remembers all programs running on a particular computer, intercepts visited sites, monitors the contents of the clipboard and takes screenshots (screenshots). This data is transferred to the administrator's computer and stored in database, inaccessible to other users.

Main window of LanAgent 1.8


A little about how LanAgent software works. The program consists of 2 parts - the user part (agent) and the administrator part. The administrator part is installed on the administrator's computer, and the agents on the user's computers. Agents monitor all user actions on each computer, and the administrator part collects information centrally over the network (polling agents), so that the administrator can then view all the data on his computer and make a report. Using the Report Wizard, you can select users for whom to make a report , the period for which to select data, as well as the types of logs that need to be included in the report. The report will be generated in html format.


The main program window is divided into several tabs:


Keyboard - here is information on pressed keys. Recording is carried out on the windows of the programs in which the keys were pressed. List of windows - in a table, sorted by time. At the bottom of the tab is the title of the window, the path to the program, the user who worked with it, and, of course, all the keys that he pressed. The program can be configured so that only symbols are shown and the system keys are hidden. For example, if the following keys were pressed:


Screenshots - hidden agents can periodically, with an interval specified in the settings, take screenshots of the entire screen or the active this moment windows (this is again indicated in the settings). All pictures taken are stored in the database along with the creation time, window title and username. Thus, the owner of the computer can only select the entry of interest to him and double-click on it with the mouse in order to clearly see what was happening on his PC.

Programs - this tab is designed to view information about who and when started and closed certain programs. Moreover, the screen displays not only the path to the used software, but also the title of its window.

Clipboard -as data appears in the buffer, information about this is entered into its table. Here it is noted in which window the operation was performed and who performed it. When you select an entry in the table, the contents of the buffer are displayed at the bottom of the tab. It must be borne in mind that you can save the contents of the clipboard not completely, but partially. To do this, you can set the maximum amount of stored information.

Files and folders -all changes in the file system will also be fixed: creation, deletion and renaming of folders or files. You can follow all file system, or you can specify only a specific folder for monitoring.

A computer- this tab is designed to view information about who turned on and off the computer and when.

Internet connections - all moments of access to the Internet, as well as disconnections, will be recorded and presented on this tab. You can also find out which connection was used to access the Internet.

Sites visited - hidden agents remember all the sites visited by the user. You will be able to see both the page link itself and its title.


What can be done with log files other than viewing them directly? Search them. To do this, select the entry from which the search will begin, and enter the search string. You can set the search mode to be case sensitive.


The program has the ability to remotely manage agent settings. The administrator can, without getting up from his computer, tell the agents which user actions to intercept, with what interval to take screenshots. It can remotely start or stop monitoring, send a text message to the user's computer, etc.



Managing hidden agent settings


The administrator part of the program can, at a certain interval, set in advance, automatically poll users' computers and receive information collected by agents from them.


Let's summarize: using the LanAgent program, you can effectively monitor the rational use of working time by employees, monitor them in real time. But, perhaps, it is not worth going too far, the point of the program is still not to catch as many “criminals” as possible, but to prevent such actions.

A hack employee is a disaster for any enterprise or company. Therefore, the question constantly arises of how to control an employee at his work computer and ensure that there are no unauthorized actions.

We note right away that the employee must be informed (in writing, with a signature) that a computer is being secretly monitored on the local network. Perhaps only this fact will already help to avoid violations and put the employee on the path of a “hard worker”. If not, then here is a solution for full control over computers on a local network.

Local network control program

So, the software is called "Mipko Employe Monitor" - a version specifically for corporate networks.

After installation and launch, and you can run it from the desktop or by pressing "ctrl + alt + shift + k", you need to configure user interface- what exactly needs to be monitored and controlled in the local network.

  1. 1. On the top left there is a section where you select a user from your network whose log is currently being monitored: when opened, a list of recorded actions will be displayed (depending on the settings).
  1. 2. Now directly about the functionality "Tools" - "Settings". For each user, the “surveillance” parameters can be configured individually.

Monitoring allows you to track the following actions:

  • - keystrokes;
  • - screenshots;
  • - activity in social networks;
  • - messaging in "skype";
  • - visited websites;
  • - saving the clipboard;
  • - program activity;
  • - pictures from the webcam;
  • - call recording;
  • - operations with files.

Pretty broad functionality. The main thing that usually interests an employer when monitoring users on a local network is screenshots and visited websites.

In order not to face claims for interference with personal information (for example, if you set browsing for visited web pages and saw personal correspondence on social networks), block all social networks and chats, as well as prohibit the installation of third-party software - only what is required for the job.

Remote monitoring of a computer on a local network

As a rule, the employer is only interested in two aspects - this is a screenshot of the user's computer on the local network and browsing the web (as mentioned above, employees are familiar with this information).

  1. 3. Screen capture settings include the following:

  • - selection of the time interval, indicated either in minutes or in seconds;
  • - take a picture when opening a window;
  • - take a picture at the click of a mouse;
  • - do not take a picture when not active;
  • - snapshot mode ( Full Screen, window);
  • - and image quality.
  1. 4. In the "visited websites" section, it's even easier: select the "interception type" and whether to save a screenshot.

  1. 5. Now about where all this will be saved or sent. In the settings section "Sending":

  • - first, set the "Type of log" and pop-up list;
  • - set in what format the report "HTML" or archive "ZIP" will be saved;
  • - select the type of sorting and the time interval for sending the report;
  • - the most important thing is where the report will be sent: to mail / ftp / folder on the computer.
  • - then enter your username and password, click "Apply".

That's it, now the employees, as they say, "Under the hood" - you can monitor the users of the local network.