SentryPC has a very large list of features. Below is a list of SentryPC’s extensive features, organized by category for easy browsing. Click on a category to view its feature-set.
SentryPC’s logging capabilities are unmatched. SentryPC can log anything from what the user types, to the files they printed and programs they ran – all time stamped by date for easy viewing. All logs are easily saved and exported for later use. SentryPC can be configured to log all users on your computer with ease.
- Remote Installation and Removal
Remote Installation without physical presence needed for installation. SentryPC can later be uninstalled and permanently disallowed from running on a remote computer, again without physical interaction with the remote computer.
- Logging Access Anytime, Anywhere
24/7 access to the monitored PC, from any location via your personal website address given to you after you purchase! Activity logs are updated every half-hour for constant review.
- Centralized User Logging and Tracking
Log and record MULTIPLE PC’s from ONE REMOTE LOCATION without any extra configuration – just click what user names you want to view logs for! Usernames are categorized by what PC they are logged under for easy user selection.
- Works on Various Internet Connections
SentryPC can monitor any PC regardless of its Internet connection. Most other remote deployable monitoring solutions will not work behind a hardware firewall, router, LAN, or if they are on a dialup connection – but SentryPC will! No matter what Internet connection the remote PC uses, you will be able to view logs from your SentryPC webpage.
- Advanced Stealth and Cloaking
SentryPC runs in COMPLETE STEALTH and cloaks itself to hide from the remote user! The file you send to the remote user is able to be discarded and deleted – without affecting SentryPC’s monitoring process! SentryPC is also invisible in the Windows task manager on all Windows platforms!
back to top
| Content Filtering Features
|SentryPC has a very powerful, extensive filtering engine. You can essentially choose a daily schedule of ‘allowable’ times for virtually any program on your computer. SentryPC can also filter website visits, intercept important keystroke phrases typed by users (like addresses, phone numbers, names), and restrict chat client usage.
- Application Filtering
Filter any application on your computer by having SentryPC block it during specific time frames, or whenever the program is executed.
- Website Filtering
Filter specific websites from being visited, or have SentryPC block all website visits – except for those you allow. Filters can be put into effect during specific time schedules, or whenever the website is visited.
- Chat Filtering
Block AOL, AIM, AIM Express, AOL Chat, Yahoo, ICQ, MSN, Excite, Trillian, GoogleTalk, Skype, Xfire, Mirc, and Odigo for each user.
- Keystroke Filtering
Enter specific words or phrases that cannot be entered by users. For instance, enter your children’s name, address, phone number, or credit card number and whenever they are typed the window will be closed instantly. This ensures confidential information cannot be shared with others through email, websites, etc.
- User Notification
You have the option to alert the user that they were restricted from doing a filtered activity, when the event arises.
back to top
| Activity Monitoring Features
|SentryPC also monitors and records important information for all users of the computer. You will have easy to read reports of all keystrokes, windows opened, applications used, websites visited, and all chat conversations. Each includes the time, date, and duration as well. This is imperative for preventing harmful and/or unauthorized use of the computer and Internet.
- Keystroke Logging
Record every single keystroke typed by users – logged by the application they were typed in, and when.
- Events Timeline Logging
Log all events users performed and view them in an organized chronically ordered listing. The Events Timeline lets you view what the events the user performed, in the order they did them. Events logged include Program Starts/Stops, Website Visits, Filtering Events, Window Viewings, and more.
- Application Usage Logging
Log every application a user runs, as well as how long they actually interact with each application so you can determine if a user is actually using a program they have open, or if it is just running in the background.
- Chat Conversation Logging
Log all AOL, AIM, ICQ, Yahoo, and MSN Messenger chat conversations made by users of your computer.
- Website Visit Logging
Log all website visits and online searches performed by the popular browsers used today. All website visits are logged by website address, username, and duration of the site visit. SentryPC also logs how long users visit each website so you can easily see what websites are visited the longest. SentryPC supports the latest versions of the following browsers: Internet Explorer, Netscape, Opera, Mozilla, Firefox, and America Online.
- Windows Logging
Log the title of each window users interact with while using your computer. Application paths are logged with the window as well.
- Screenshot Capturing
SentryPC can take snapshots of your desktop at set intervals of time, allowing you to visually see what is happening. The screenshot capture manager also has a built in Slideshow viewer for easy viewing.
- E-Mail Log Delivery
Have recorded activity logs emailed to your email address, along with a current desktop screenshot.
Guaranteed log delivery when combined with our Stealth Email Service!
back to top
|Security options are also included with SentryPC. Choose to disable SentryPC’s system tray icon, or notify users they are being restricted. YOU are the only one with access to the main program, settings, and logs. It cannot be shutdown or tampered with in any way shape or form by others. SentryPC also includes a large number of Windows security restrictions.
- Optional Stealth Mode
If desired, you can set SentryPC to run in a totally invisible fashion – it will not appear to the user in any way.
- Log File Encryption
All SentryPC activity logs can be encrypted for additional protection.
- Hide from Taskbar
Choose whether or not t-o show SentryPC in the Windows taskbar.
- Optional Startup Message
Choose whether to notify users that they are being controlled by SentryPC at startup.
- Password Protected
SentryPC is password protected so only the owner can access settings, logs, and more.
- Windows Security Restrictions
SentryPC can be configured for each user to disable the Windows desktop, mouse movement, start menu, taskbar, control panels, and much more.
back to top
SentryPC was made with ease of use in mind. Our simple layout and interface will make using the program a snap for even novice users. Included is full support both online and offline.
- Intuitive Interface
Easy to use, graphical user interface, with an easy access icon and menu system that allows you to quickly, and efficiently create and configure filtering and time management rules.
- Easy-to-Read Settings and Activity Reports
SentryPC has a large set of reports at your disposal. SentryPC’s report generator can create Top 10 reports, log-specific reports, settings summaries, and overall usage summaries for viewing and printing.
- Log Cross-Referencing
SentryPC’s built-in cross-referencing features can link together relevant log data for easy and efficient log browsing.
- Log Searching
Quickly search all activity logs for specific keywords that may be contained in SentryPC’s logs.
- Configuration Wizard
Quickly setup SentryPC with a guided installation wizard.
back to top
- Windows 200x, XP, Vista, 7
- 2MB Hard disk space