F. A. Q. Free Team Behavior Analytics.Is it invisible Yes.Unless you want a user to know, Activ.Trak is completely invisible.It does not appear in the AddRemove programs list and is not recognizable from the Task Manager.However, if you download and install the Agent on the users device, the browser history will keep that activity.If you do not want users to know you have installed the Activ.Trak Agent, we suggest copying the Agent onto a USB memory stick and install from that, or install from a local network location.Back to Top. Does Activ.Trak affect computer performanceThis guide shows how to make a bootable USB of Windows operating system to quickly install Windows from a USB drive instead of DVD.LoRaWAN looks great, but I dont want to pay a subscription.Whats the alternative Can two RN2483 or RN2903 modems communicate pointtopoint P2P without a gatewayWriting udev rules by Daniel Drake dsd Version 0.The most recent version of this document can always be found at httpwww.USB-drive-deny-write-access1.jpg' alt='Block Usb Access Active Directory' title='Block Usb Access Active Directory' />No.Up to date and virus free computers have no issues running Activ.Trak. It will not slow your computer down.Back to Top. How do I spy on someone Activ.Trak is not a spy tool.Its a productivity monitoring and team behavior analytics service.You are only allowed to install the Activ.Trak Agent on a computer that belongs to you or your company where you have network administrative rights.Please read the User Conduct section of our Terms of Use for more details.Back to Top. Can I install Activ.Trak on a mobile phone Access your Activ.Trak account and view your data anywhere, anytime with our i.Phone app available from the Apple App store.The Activ. Trak app does not currently monitor mobile phones.For now, Activ. Trak only collects data from Windows, Mac OS, Chrome OS and a Chrome browser installed on any desktop operating system, including Linux, Free.BSD, and others. Download the app here.Back to Top. Can I capture passwords or keystrokes with Activ.Trak No. Activ. Trak does not have a keylogger feature.Internet Monitoring Software that keylogs is sometimes classified as a virus by antivirus programs.We want things to run smoothly for you, so Activ.Trak intentionally does not record or monitor keystrokes.This allows us to stay on the safe lists of all popular antivirus software.Instead of recording keystrokes, we utilize fully customizable Screenshots to capture a clear and quick visual of what users are doing.Screenshots show you exactly what users see on their screens.We are currently working on building a Content Analysis tool for Screenshots that will allow you to search Screenshots by keyword.For example, you will be able to type in games, and this new Content Analysis tool will find all the Screenshots that have that text in them.Back to Top. How do I uninstall an Activ.Trak Agent To uninstall the Agent from a computer, just download and run the latest installer file on you Account Dashboard.If the Agent is already installed, it will ask if you want to remove the Agent.Alternatively, you can right click on the downloaded file and select Uninstall.You can also delete all collected data from ReportsAgents tab.This will release your limit, so you can install an Agent on other computers.Back to Top. If Activtrak is uninstalled will it be shown in the reports If the Agent is uninstalled, old data will continue be shown in the reports, but no new data will be collected.Use the ReportsAgents tab to delete data from the agent.Back to Top. Do I have to be logged in for Activ.Trak to monitor No, you do not have to login for the Activ.Trak Agent to monitor activity.Once installed, the Agent starts collecting data automatically and continuously sends that data to the cloud.Log in to your account any time from any computer or laptop to see the data.However, by logging in to your account, you can take advantage of Real Time Monitoring.Real time Monitoring lets administrators view a live data stream of the active window on any monitored devices screen and monitor user activity as its being transmitted to the system without having to navigate through reports.Back to Top. How many days of Activity Reports can be stored in my free account You can store virtually years of logs using 3.GB of free storage.However, keeping your screenshots takes up a lot of space.Based on our estimated averages, 3.GB is enough for storing 5,0.Its hard to get more accurate numbers, as it depends on how many users you have, how large your screens are, what is displayed on the screens, and how often do you take screenshots.You can change the number and frequency of when screenshots are captured in the Alarms tab.Back to Top. How does Screenshot timing work Screenshots are generated by Alarms.The Alarm criteria are evaluated every time there is a change in the active window title bar.The default Screenshot Alarm is set to take a screenshot 2.The free version of the product only allows one screenshot for each change in the active window title bar.The paid version allows multiple and continuous screenshots at a configurable time interval.Screenshots and Alarms, in general, can be targeted at specific types of activities.Alarms can be set to trigger based on any column in the Activity Log.The Activity Log keeps a running record of all active window titles and associated data.Back to Top. Can you disable tracking ScreenshotsQ I am concerned that sending screenshots may affect the performance of our workstations.Can we disable that feature A Yes, you can disable the Screenshots function, though capturing, storing and sending screenshots will not affect the performance of your computers.To adjust and control your Screenshot settings, go to the Alarms tab on your dashboard.You can now change how often Screenshots are captured and set keyword Alarms to alert the Agent when to take screenshots.Click here to read more about how Screenshots work.If you are worried about sensitive information getting into the wrong hands, you can add our Data Leak Prevention DLP technology to your account.Data Leak Prevention DLP is a strategy for making sure that end users do not send or view any sensitive or critical information they are not meant to see.The term is also used to describe software products that help a network administrator control what data end users can access and transfer.Click here to read more about how DLP works.To update to your account, call us at 8.Back to Top. How can I block a website There are two ways you can block a website.Go to the Blocking tab on your dashboard.Under Domain, type the domain name you want blocked.Once all domains with that name are listed, click the boxes on the left of the domains you want to block.You can block all computers or groups of computers.Click here to watch a quick start guide on how to block a website through the Blocking tab. Following Directions On A Map Activity For Kindergarten . If a user attempts to access a blocked website, they will see this message.You can Terminate a website or an application under the Alarms tab.Set your Alarm and then scroll all the way down to the bottom of the screen.At the bottom, click the box under Terminate and then click Save.This action will shut down the users browser.Click here to watch how to customize your Alarms.Back to Top. How do I configure custom AlarmsActiv.Trak comes with eight pre built Alarms, but they are completely customizable.To create an Alarm, go to the Alarms tab and click the Create New Alarm button on the right of the screen.From there, set your conditionswhich are certain activities you define that triggers the Alarm.Choose either Match Any or Match All and then click Add New Condition.Fill out the Field, Operator and Value tabs using the dropdown menus under each.After you have picked each, click Update.Next, under Actions, click the box that says Collect Screenshots if you want to take a screenshot of the activity that triggers the Alarm.Choose single or multiple Screenshots.You can send a pop up message to the user under Pop Up Message.Type your own message in the box.To send an email notification when an Alarm is triggered, click the box next to send email notification when the alarm is triggered under Email.You can also choose to have the website or application shut down by clicking the box under Terminate.To set a USB Alarm, start on the main Alarms Tab and click Create New USB Alarm.The next page will give you options to trigger the alarm when the USB is inserted, written or both.Also under the USB Alarm button, you can activate webhook notifications.Click the Send JSON webhook when the alarm is trigger and then enter the URL.To finish up setting your custom Alarms, click the Activate box at the top and then click Save.Click here to watch a how to on setting up Alarms.Back to Top. Users at my company work on multiple workstations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
October 2017
Categories |