Spytech SentryPC enables you to control, restrict and record access and usage of your PC. You can control how long, and when users are allowed to use the computer, prevent the use of specific programs, block access to certain websites, restrict access to Windows functions, and more. In addition to access control, the program can also record all user activities, including keystrokes, website visits, applications ran, chats and more. Spytech SentryPC is perfect for parents wanting to protect their children, or employers wanting to control employee activities.
SentryPC has a very large list of features. Below is a list of SentryPC’s extensive features, such as Time Management Features, Activity Monitoring Features, Content Filtering Features, Security and Stealth Features, Ease of Use Features. You will find them extremely useful.
Time Management Feature
SentryPC’s logging capabilities are unmatched. SentryPC can log anything from what the user types, to the files they printed and programs they ran – all time stamped by date for easy viewing. All logs are easily saved and exported for later use. SentryPC can be configured to log all users on your computer with ease.
Remote Installation and Removal
Remote Installation without physical presence needed for installation. SentryPC can later be uninstalled and permanently disallowed from running on a remote computer, again without physical interaction with the remote computer.
Logging Access Anytime, Anywhere
24/7 access to the monitored PC, from any location via your personal website address given to you after you purchase! Activity logs are updated every half-hour for constant review.
Centralized User Logging and Tracking
Log and record MULTIPLE PC’s from ONE REMOTE LOCATION without any extra configuration – just click what user names you want to view logs for! Usernames are categorized by what PC they are logged under for easy user selection.
Works on Various Internet Connections
SentryPC can monitor any PC regardless of its Internet connection. Most other remote deployable monitoring solutions will not work behind a hardware firewall, router, LAN, or if they are on a dialup connection – but SentryPC will! No matter what Internet connection the remote PC uses, you will be able to view logs from your SentryPC webpage.
Advanced Stealth and Cloaking
SentryPC runs in COMPLETE STEALTH and cloaks itself to hide from the remote user! The file you send to the remote user is able to be discarded and deleted – without affecting SentryPC’s monitoring process! SentryPC is also invisible in the Windows task manager on all Windows platforms!
Content Filtering Features
SentryPC has a very powerful, extensive filtering engine. You can essentially choose a daily schedule of ‘allowable’ times for virtually any program on your computer. SentryPC can also filter website visits, intercept important keystroke phrases typed by users (like addresses, phone numbers, names), and restrict chat client usage.
Filter any application on your computer by having SentryPC block it during specific time frames, or whenever the program is executed.
Filter specific websites from being visited, or have SentryPC block all website visits – except for those you allow. Filters can be put into effect during specific time schedules, or whenever the website is visited.
Block AOL, AIM, AIM Express, AOL Chat, Yahoo, ICQ, MSN, Excite, Trillian, GoogleTalk, Skype, Xfire, Mirc, and Odigo for each user.
Activity Monitoring Feature
SentryPC also monitors and records important information for all users of the computer. You will have easy to read reports of all keystrokes, windows opened, applications used, websites visited, and all chat conversations. Each includes the time, date, and duration as well. This is imperative for preventing harmful and/or unauthorized use of the computer and Internet.
Record every single keystroke typed by users – logged by the application they were typed in, and when.
Events Timeline Logging
Log all events users performed and view them in an organized chronically ordered listing. The Events Timeline lets you view what the events the user performed, in the order they did them. Events logged include Program Starts/Stops, Website Visits, Filtering Events, Window Viewings, and more.
Application Usage Logging
Log every application a user runs, as well as how long they actually interact with each application so you can determine if a user is actually using a program they have open, or if it is just running in the background.
Chat Conversation Logging
Log all AOL, AIM, ICQ, Yahoo, and Facebook Messenger chat conversations made by users of your computer.
Website Visit Logging
Log all website visits and online searches performed by the popular browsers used today. All website visits are logged by website address, username, and duration of the site visit. SentryPC also logs how long users visit each website so you can easily see what websites are visited the longest. SentryPC supports the latest versions of the following browsers: Internet Explorer, Netscape, Opera, Mozilla, Firefox, and America Online.
SentryPC can take snapshots of your desktop at set intervals of time, allowing you to visually see what is happening. The screenshot capture manager also has a built in Slideshow viewer for easy viewing.
E-Mail Log Delivery
Have recorded activity logs emailed to your email address, along with a current desktop screenshot. Guaranteed log delivery when combined with our Stealth Email Service!
Security options are also included with SentryPC. Choose to disable SentryPC’s system tray icon, or notify users they are being restricted. YOU are the only one with access to the main program, settings, and logs. It cannot be shut down or tampered with in any way shape or form by others. SentryPC also includes a large number of Windows security restrictions.
Optional Stealth Mode
If desired, you can set SentryPC to run in a totally invisible fashion – it will not appear to the user in any way.
Log File Encryption
All SentryPC activity logs can be encrypted for additional protection.
Hide from Taskbar
Choose whether or not t-o show SentryPC in the Mac taskbar.
SentryPC is password protected so only the owner can access settings, logs, and more.
SentryPC can be configured for each user to disable the Windows desktop, mouse movement, start menu, taskbar, control panels, and much more.
SentryPC was made with ease of use in mind. Our simple layout and interface will make using the program a snap for even novice users. Included is full support both online and offline.
Easy to use, graphical user interface, with an easy access icon and menu system that allows you to quickly, and efficiently create and configure filtering and time management rules.
Easy-to-Read Settings and Activity Reports
SentryPC has a large set of reports at your disposal. SentryPC’s report generator can create Top 10 reports, log-specific reports, settings summaries, and overall usage summaries for viewing and printing.
SentryPC’s built-in cross-referencing features can link together relevant log data for easy and efficient log browsing.
Quickly search all activity logs for specific keywords that may be contained in SentryPC’s logs.
Quickly setup SentryPC with a guided installation wizard.
Spytech SentryPC monitoring software provides you with secure filtering, monitoring and access control, which makes monitoring much easier than before. It can be your top selection if you are seeking a secure monitoring program to keep an eye on the Mac computer usage of your children and employees.
Tags: activity recorder, Application Scheduling and Filtering, Chat Filtering, cheating spouse, Complete Time Management, computer monitoring, Easy to Read Activity Reports, employee monitoring, internet monitor, keylogger, Keystroke Filtering, Keystroke Logger, Logs Application Usage, Logs Chat Conversations, Logs Keystrokes Typed, Logs Website Visits, Logs Windows Viewed, Network surveillance, Parental Control, PC monitoring, pc spy, Powerful Security Features, Receive Activity Logs via Email, recorder, remote administration, Remote Spy, SentryPC, spy, Spy Software, Spytech, spytech sentrypc, Stops Unwanted Computer Usage, surveillance, Website Scheduling and Filtering
Category: All-in-one PC Monitoring