Spytech SentryPC

Spytech SentryPC enables you to control, restrict and record access and usage of your PC. You can control how long, and when users are allowed to use the computer, prevent the use of specific programs, block access to certain websites, restrict access to Windows functions, and more. In addition to access control, the program can also record all user activities, including keystrokes, website visits, applications ran, chats and more. Spytech SentryPC is perfect for parents wanting to protect their children, or employers wanting to control employee activities.

SentryPC has a very large list of features. Below is a list of SentryPC’s extensive features, such as Time Management Features, Activity Monitoring Features, Content Filtering Features, Security and Stealth Features, Ease of Use Features. You will find them extremely useful.


Time Management Feature

SentryPC’s logging capabilities are unmatched. SentryPC can log anything from what the user types, to the files they printed and programs they ran – all time stamped by date for easy viewing. All logs are easily saved and exported for later use. SentryPC can be configured to log all users on your computer with ease.

Remote Installation and Removal

Remote Installation without physical presence needed for installation. SentryPC can later be uninstalled and permanently disallowed from running on a remote computer, again without physical interaction with the remote computer.

Logging Access Anytime, Anywhere

24/7 access to the monitored PC, from any location via your personal website address given to you after you purchase! Activity logs are updated every half-hour for constant review.

Centralized User Logging and Tracking

Log and record MULTIPLE PC’s from ONE REMOTE LOCATION without any extra configuration – just click what user names you want to view logs for! Usernames are categorized by what PC they are logged under for easy user selection.

Works on Various Internet Connections

SentryPC can monitor any PC regardless of its Internet connection. Most other remote deployable monitoring solutions will not work behind a hardware firewall, router, LAN, or if they are on a dialup connection – but SentryPC will! No matter what Internet connection the remote PC uses, you will be able to view logs from your SentryPC webpage.

Advanced Stealth and Cloaking

SentryPC runs in COMPLETE STEALTH and cloaks itself to hide from the remote user! The file you send to the remote user is able to be discarded and deleted – without affecting SentryPC’s monitoring process! SentryPC is also invisible in the Windows task manager on all Windows platforms!


Content Filtering Features

SentryPC has a very powerful, extensive filtering engine. You can essentially choose a daily schedule of ‘allowable’ times for virtually any program on your computer. SentryPC can also filter website visits, intercept important keystroke phrases typed by users (like addresses, phone numbers, names), and restrict chat client usage.

Application Filtering

Filter any application on your computer by having SentryPC block it during specific time frames, or whenever the program is executed.

Website Filtering

Filter specific websites from being visited, or have SentryPC block all website visits – except for those you allow. Filters can be put into effect during specific time schedules, or whenever the website is visited.

Chat Filtering

Block AOL, AIM, AIM Express, AOL Chat, Yahoo, ICQ, MSN, Excite, Trillian, GoogleTalk, Skype, Xfire, Mirc, and Odigo for each user.


Activity Monitoring Feature

SentryPC also monitors and records important information for all users of the computer. You will have easy to read reports of all keystrokes, windows opened, applications used, websites visited, and all chat conversations. Each includes the time, date, and duration as well. This is imperative for preventing harmful and/or unauthorized use of the computer and Internet.

Keystroke Logging

Record every single keystroke typed by users – logged by the application they were typed in, and when.

Events Timeline Logging

Log all events users performed and view them in an organized chronically ordered listing. The Events Timeline lets you view what the events the user performed, in the order they did them. Events logged include Program Starts/Stops, Website Visits, Filtering Events, Window Viewings, and more.

Application Usage Logging

Log every application a user runs, as well as how long they actually interact with each application so you can determine if a user is actually using a program they have open, or if it is just running in the background.

Chat Conversation Logging

Log all AOL, AIM, ICQ, Yahoo, and Facebook Messenger chat conversations made by users of your computer.

Website Visit Logging

Log all website visits and online searches performed by the popular browsers used today. All website visits are logged by website address, username, and duration of the site visit. SentryPC also logs how long users visit each website so you can easily see what websites are visited the longest. SentryPC supports the latest versions of the following browsers: Internet Explorer, Netscape, Opera, Mozilla, Firefox, and America Online.

Screenshot Capturing

SentryPC can take snapshots of your desktop at set intervals of time, allowing you to visually see what is happening. The screenshot capture manager also has a built in Slideshow viewer for easy viewing.

E-Mail Log Delivery

Have recorded activity logs emailed to your email address, along with a current desktop screenshot. Guaranteed log delivery when combined with our Stealth Email Service!


Security Feature

Security options are also included with SentryPC. Choose to disable SentryPC’s system tray icon, or notify users they are being restricted. YOU are the only one with access to the main program, settings, and logs. It cannot be shut down or tampered with in any way shape or form by others. SentryPC also includes a large number of Windows security restrictions.

Optional Stealth Mode

If desired, you can set SentryPC to run in a totally invisible fashion – it will not appear to the user in any way.

Log File Encryption

All SentryPC activity logs can be encrypted for additional protection.

Hide from Taskbar

Choose whether or not t-o show SentryPC in the Mac taskbar.

Password Protected

SentryPC is password protected so only the owner can access settings, logs, and more.

Security Restrictions

SentryPC can be configured for each user to disable the Windows desktop, mouse movement, start menu, taskbar, control panels, and much more.


Easy-to-Use Feature

SentryPC was made with ease of use in mind. Our simple layout and interface will make using the program a snap for even novice users. Included is full support both online and offline.

Intuitive Interface

Easy to use, graphical user interface, with an easy access icon and menu system that allows you to quickly, and efficiently create and configure filtering and time management rules.

Easy-to-Read Settings and Activity Reports

SentryPC has a large set of reports at your disposal. SentryPC’s report generator can create Top 10 reports, log-specific reports, settings summaries, and overall usage summaries for viewing and printing.

Log Cross-Referencing

SentryPC’s built-in cross-referencing features can link together relevant log data for easy and efficient log browsing.

Log Searching

Quickly search all activity logs for specific keywords that may be contained in SentryPC’s logs.

Configuration Wizard

Quickly setup SentryPC with a guided installation wizard.


Spytech SentryPC monitoring software provides you with secure filtering, monitoring and access control, which makes monitoring much easier than before. It can be your top selection if you are seeking a secure monitoring program to keep an eye on the Mac computer usage of your children and employees.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Category: All-in-one PC Monitoring