User Activity Monitoring

Spector360.com >>> Product Overview >>> Record Computer & Internet Activity

Record Computer & Internet Activity

Spector 360 incorporates SpectorSoft's award-winning employee monitoring technology that automatically records computer activity, giving you centralized visibility across devices! All this is performed silently, without the employees being aware they are being monitored.

The Spector 360 Recorder contains a series of powerful recording tools:

All of these tools record simultaneously, undetected by triple-level security. The Recorder is highly configurable and can be customized to record only those events of interest.

In addition to monitoring and recording, Spector 360 has an advanced Keyword Detection and Reporting system that will instantly notify you when a computer user being monitored has strayed from acceptable use of the computer or Internet.

Email Recorder

Spector 360 will stamp out abuse with cutting-edge email recording capabilities designed to ensure that you have a clear record of all email being sent and received from company premises. In addition to recording business standard MS Exchange and Outlook email, Spector 360 includes industry-first web mail capturing. This includes web mail services such as Hotmail, Yahoo Mail and AOL Internet Email.

Whenever an email is sent or received, Spector 360 creates a hidden duplicate (including file attachments) and stores it away for later review. Spector 360 also keeps a copy of deleted email.

Recorded email attachments can be securely transferred to the Data Vault using data encryption.

If you want to limit the amount of email recorded, this tool has a filtering capability so emails can be captured when they are sent or received or if there is a particular pattern detected in the To/From/Subject/Body. Other controls allow you to filter email based on the format used or if attachments are detected.  In addition, there are granular settings to filter based on attachment characteristics such as size.   If you only want to capture email from a specific source you can filter the emails received from designated account types such as MS Outlook, Hotmail, AOL, MS Exchange, or IMAP.

SMTP/POP
IMAP
Web
Exchange/MAPI
Exchange scan only inbox folder for pre-existing new emails
AOL Email
Check for Duplicate Emails
Scan Email for Keywords
Capture Attachments

View Tool Demo

Web Site Recorder

 

The Web Site Recording tool in Spector 360 will continually monitor every web page that is accessed by the computers on your network and save a record of those URLs and domain names.

Spector 360 will also track every file and program download that occurs over the Internet (such as file/music swapping services, software download sites, pornographic images, etc. …)

Spector 360 is significantly more sophisticated than the History feature of your web browser, providing you with important details including: Time of Last Visit, Duration of Time on the Web Site, Active Time on Web Site, Total Number of Visits to the Web Site, Page Title and more!

Additionally, you can use the Spector 360 Control Center to create a Whitelist of web sites that your employees are permitted to view. Any web site not included in this list will be blocked. Alternately, you can create a Blacklist of web sites that they are not allowed to visit. If the web site is not included in this list, they will be able to access it. These policies can be customized for different employees.

With Spector 360’s advanced and intuitive Web Site recording, you will get a quick yet exact picture of each employee’s web surfing behavior, which is also used by the Dashboard to formulate trend data across your organization.

Scan Web Site Addresses for Keywords
Scan Web Site Pages for Keywords
Capture Mozilla Browsers (i.e. Firefox)
Capture AOL Security Edition

View Tool Demo

 

Online Search Recorder

 

Online Search ActivitySpector 360 records online searches from any web site where known search techniques are used. Spector 360 looks for standard searching techniques, captures the search phrase entered by the employee, the search results URL, and other information. Using the Dashboard, you can tell whether the employee actually accessed the web site as a result of an online search. Use the information to understand why an employee is at a web site. For example, find out whether an employee is searching a job web site for professional growth information or to find a new job.

google.com
msn.com
yahoo.com
ask.com
altavista.com
gigablast.com
alltheweb.com
go.com
live.com
teoma.com
and more...

View Tool Demo

 

Chat/Instant Message Recorder

 

Spector 360 ensures that all Chat and Instant Messages are automatically recorded to provide you with an information trail of every computer-based conversation that is taking place within your company or with your customers. Spector 360 records the name of all parties involved in a Chat/IM session and saves a complete copy of the conversation. This information is recorded for AOL, MSN, ICQ, and various other Chat/IM programs.

Scan Chat and Instant Messages for Keywords
IRC Capture
MSN Capture
AIM/ICQ Capture
AOL Capture
Yahoo Capture
XMPP Capture
Capture Web IMs
Capture OSCAR80
Capture MSN Exchange

View Tool Demo

 

Keystroke Recorder

 

Spector 360 includes a sophisticated keystroke logger that saves keystrokes by application, date and time.

With Spector 360, you will know what was typed, where and when it was typed, and you will also know WHO typed it because Spector 360 keeps a record of who is logged into the computer.

The Spector 360 Keystroke Recording tool will document every key typed on the computer keyboard. Spector 360 not only captures standard alphanumeric keystrokes, but also records "hidden" characters and keystroke combinations, such as the Shift and Ctrl key, as well as those keystrokes that aren’t typically displayed on the screen such as when a password is typed echoing back asterisks on the screen.


Scan Keystrokes for Keywords
Capture Character Information

View Tool Demo

 

Program Activity Recorder

 

Spector 360 includes a monitoring tool that provides a clear and concise overview of the programs being used on your office computers. Spector 360 will track the day and time a program is launched and the total duration of activity in that program. Program specific information is also recorded including the window title.

Set Inactivity Timeouts

View Tool Demo

 

Network Activity Recorder

 

Spector 360 records information about all Internet connections made on a computer. You will be able to see at a glance which applications are connecting to the Internet, when the connections are made, the Internet address they connected to, what ports are being used, and the amount of network bandwidth consumed by those connections.

This Internet connection activity can provide valuable insight into:

  • Which employees may be violating company policy by consuming network bandwidth with streaming media, file downloads, or other Internet activity.
  • Applications connecting to the Internet which you may not have been aware of and which could have security implications.
  • Which Internet resources are most often connected to.

Armed with this information you may decide to block access to TCP ports or Internet domains, remove offending applications from computers, or tighten your company’s Acceptable Use Policy (AUP).

Include/Exclude specific programs
Include/Exclude specific IP addresses and ports

View Tool Demo

 

File Transferred Recorder

 

There are multiple serious security concerns for businesses when employees use company computers to download files from the Internet, transfer files across the Internet and access peer-to-peer services which are loaded with pornographic images, Spyware, Adware, and pirated music, video and software.

One major concern is whether employees are sending company confidential information over the Internet.

Another concern is whether employees are placing the company at legal risk by downloading copyrighted materials, like music, movies and commercial software. In addition, there is potential risk when an employee downloads pornographic images that will reside on company computers and may be viewed by another employee who would consider such material highly offensive.

Finally, any time a file is downloaded, there is great risk that Spyware and/or Adware will be installed, especially where P2P services are involved. (Dell Computer Corporation has identified Spyware as its single biggest source of technical support incidents, because Spyware will redirect web browsers and eventually slow computers down to a crawl, not to mention the potential for security breaches. Most Spyware enters into computers via downloads from the Internet.)

Spector 360 records Files Transferred over the Internet by keeping track of HTTP, FTP and P2P file transfers. You will be able to see who is downloading or uploading files, what file protocol is being used, which service is being used, the name of the file being transferred and the type of file being transferred (audio, image, video, software, document).

Capture HTTP Uploads

View Tool Demo

 

Document Tracking Recorder

 

Intellectual Property Theft and the leaking of Company Confidential information has become an increasing security threat for companies in recent years as technology has made it relatively easy for employees to copy files to floppy disks, Zip disks, CDs, DVDs, USB drives, memory sticks or to simply print out these documents and transport them off company premises.

Spector 360 includes a Document Tracking feature which allows you to determine whether files/documents may be exiting your company via removable media such as floppy, zip, CD, DVD or USB storage devices and memory sticks. The Document Tracking feature also allows you to track documents that are printed and who is copying or printing potentially sensitive files or documents.

Trigger tracking when creating a new file
Trigger tracking when writing to an existing file
Trigger tracking when deleting a file
Trigger tracking when renaming a file
Trigger tracking when destination is the CD ROM
Trigger tracking when destination is the local drive
Trigger tracking when destination is a Network drive
Trigger tracking when destination is removable media
Trigger tracking when destination is other
File name filter support
Track Printed Documents
Track WinXP CD/DVD Burning (IMAPI)

View Tool Demo

 

Snapshot Recorder

 

Online Search ActivityImagine surveillance cameras pointed directly at every computer on your company network, filming all Internet and general computer activity, and storing this in a secure area for later review. That is the idea behind the Snapshot Recorder tool in Spector 360.

Spector 360 takes hundreds of snapshots every hour on each networked computer, very much like a surveillance camera. Snapshots are taken of whatever is on the computer screen at the frequency you choose – as often as once per second.

That means you get detailed visual recordings of all chat conversations, instant messages, emails typed and read, all web sites visited, all programs run, all keystrokes typed – all activity on all computers.

Snapshot Recording is the most powerful way to visually record and review everything they do online and offline.

Capture Secondary Monitors
Set Snapshot Capture Format
Set Snapshot Frequency
Set Inactivity Timeout

View Tool Demo

 

User Activity/Inactivity Recorder

 

Online Search ActivityThis Spector 360 Recorder collects information on the activity and inactivity of the employee. Events such as when they log in, when they use the mouse and keyboard, and when they are not active on the computer are all recorded. Events that could potentially skew this information are also recorded such as an explicit clock change.

Time Sheet format
User and Daily Time Sheets
Indicator for Logged In and Active
Indicator for Logged In and Inactive
Indicator for Clock Change
Indicator for Interrupted Recording

View Tool Demo

 


Keyword Detection & Reporting

 

Keyword DetectionKeyword Detection & Reporting allows you to specify words or phrases that might signal an immediate threat to the safety and integrity of your network systems, intellectual property, employees or customers. Keywords can also be used to indicate when an employee might be involved in an activity that is not condoned by your company or is in direct violation of an Acceptable Use Policy (AUP).

Create a list of "on alert" words or phrases and Spector 360 will continually monitor keyboard typing, URLs, incoming and outgoing emails, chat conversations and instant messages for these terms.

When a keyword or phrase is detected, Spector 360 immediately jumps into overdrive. Snapshot frequency is automatically increased to ensure that every detail of the offender’s actions is captured as evidence. Additionally, Spector 360 collects information regarding the offense and sends an instant keyword alert via email to the specified IT administrator or appropriate compliance manager.

Each keyword alert contains the following information:

  1. The keyword that was detected
  2. The time the keyword was detected
  3. The current user logged in
  4. Additional detailed information

Spector 360 also reports on the top keyword alerts issued and the top employees violating the keyword alert policy.

Import Keywords
Export Keywords
Set Keyword Alert Action (i.e.: Email)
Set regularity of Alert Action
Set Email Server Type (Direct SMTP, Relay SMTP, Exchange Folder)
Capture Snapshots on Alert with interval and duration settings

View Tool Demo

 

 

Additional Features


Stealth Mode

The Spector 360 Recorder can be placed into Stealth Mode, ensuring that the program cannot be detected by unauthorized users. Once in Stealth Mode on a Windows PC, Spector 360 will not appear in an employee's System Tray, Task Manager or in the Add/Remove Program Menu. When in Stealth Mode on a Mac, Spector 360 will not appear in the Dock, Desktop, Applications Folder, Force Quit Applications menu, or the Menu Bar.

 


Spector 360 Client Configuration Options and Parameters

The Recorder is responsible for logging all activities and screen snapshots from the monitored computer and relaying that information to the Data Vault. The Recorder is highly configurable and can be fine tuned for each deployment. Typically the Recorder is configured and then deployed by the Spector 360 Control Center. Please visit the Architecture Section for additional information on all of the Spector 360 software components.

 


Additional Options and Parameters:

Set Recording Parameters:

Set specific recording times
Set users to record on this computer
Set programs to record on this computer
Set Inactivity Timeout
Set Record Hotkey sequence
Set Snapshot Hotkey sequence

Security:

Set password
Set Hotkey sequence
Enable stealth mode
Include viewer with client installation
Remove references from Internet Explorer
Allow Limited Users UI Access
Enable Automatic Error Transmissions
Enable Spector when Windows starts
Enable Browser Extensions
Enable Logon Warning
Set Warning Text
Enable logging with detail level
Use Enhanced Security
Set File Security (None, Block, Stealth)
Set Network Initialization Delay
Set Service Monitoring Credentials
Set Data Files Folder (Random or Explicit)
Set file extension
Set password
Delete snapshot data files after <n> days
Set maximum snapshot data file size
Delete other data files after <n> days
Set maximum other file data size

Block Internet Access:

Block All Internet Access
Block Web Sites via HTTP/HTTPS
Block SMTP/POP Email
Block File Transfer via FTP
Block AOL and HTTP/HTTPS
Block AOL Instant Messenger (AIM)
Block ICQ
Block ICQ Lite
Block MSN Messenger
Block Trillian
Block Windows Messenger
Block XMPP (Jabber)
Block Yahoo Messenger
Block Other Chat/IM and HTTP/HTTPS
Block Kazaa
Block Kazaa Lite
Block specific Outgoing ports
Block specific Incoming ports
Block specific Web Sites (Blacklisting)
Allow access to specific Web Sites (Whitelisting)
Import Web Site Access List
Export Web Site Access List
Block during schedule times
Block specific users

Server Communication:

Set Primary Server IP address and port
Set Data Vault IP address and port
Set send interval
Set max send period
Set client port