weu-usage-control

Web Usage Control

Surveillance

Surveillance

Work-Time-Tracking

Work  Time  Tracking

Other-Features

Other Features

Web Usage Control

Web time usage analytics

Our powerful analytics engine will give you a wealth of stats on how web surfing time at your company is distributed between users, computers, user groups, departments, sites, website categories and even by days of the week, dates and hours!

Unlike other Internet monitoring tools, Work Examiner not only collects data about the website address and the date of access, but it also calculates the amount of time that the user spent on the site (including active and idle time).

Web time usage analytics will give you answers to numerous questions such as these:

What-websites-

What websites do your employees devote the most time to?

 

Which

Which of your employees spends the most time online?

 

Between

 Between which website groups is time online distributed?

 

 Thanks to the huge website content database, you do not need to organize sites by groups — this is done automatically. If you still desire to anyway, you can arrange sites using 80 customizable built-in categories.

Web-Usage

Detailed web access reports


Work Examiner logs all HTTP/HTTPS requests, including them in a detailed web usage report with several parameters: user, computer, start time, end time, website, URL, window title and active/inactive/total time. Thanks to this report, you will always know who has visited which URL and when.

Detailed-web-access-reports
1

Web filtering

Web filtering works with any type of Internet connection. Web filtering rules allow you to:

  • Block sites by URL, content keyword, built-in category or URL mask

  •  Use auto-updatable website content database with 2.300.000+ domains and 80+ categories

  • Block all sites except for specified ones

  • Specify users, user groups, computers and departments to apply the rule to

  • Apply web filtering rules to some or all employees

  • Show a custom “Access Denied” page

  • Redirect to your corporate website (or any other URL) instead of showing the “Access Denied” page

  • Apply a filtering rule with a delay

  • Do not block a site, but display an alert instead

  • Close TCP ports

  • Filter requests from specified programs only

  • Block HTTPS websites

  • Do not block a site, but display an alert instead
  • Close TCP ports
  • Filter requests from specified programs only
  • Block HTTPS websites
filter

Web Access Alerts and Messages


Get-e-mail-Get e-mail notifications when specified web sites are accessed, including the username, computer, time, URL and web filter action description (was the request blocked or not). The e-mail message text can be customized.

EmployeesEmployees can also view a visible, customizable message when they access a restricted page. This is useful when a page is not blocked but you want to alert the user.

Any-webAny web rule can be applied with a delay and custom “before apply” messages can also be used. For example, every five minutes, users can see a message such as “You have 30 minutes of free web surfing remaining for today,” “You have 25 minutes of free web surfing remaining for today,” “...20 minutes...” and so on.
alert

Surveillance

Screenshots

Work Examiner allows you to view screenshots from a user's computer in real-time mode with constant refresh, almost like a spy cam. It can also take screenshots at regular intervals (every XX seconds) and save them in the database for later viewing. Then watch the saved screenshots just like a movie!

All screenshots can be exported as image files Black-and-white, 16-color and 256-color compressed JPEG formats are supported. When the user is idle, no screenshots are taken, in order to avoid excessive data capture Recorded screenshots include the active website, application name, window title and time info for quick searching.

Surveillance

Email capture

Our-emaiOur email recording tool helps to reduce leaks of critical information and get a better idea of employee e-mail communications.

 

Work-ExaminerWork Examiner can capture and save every email message sent or received through the SMTP and POP3 protocols, as well as MS Exchange messages from MS Outlook.

 

All-e-mail-informationAll e-mail information — Time, From, To, Subject, Body and even Attachments — is captured. You can filter captured emails by any parameter or search messages for keywords.

 

email

Keystroke recording

Keystroke recording captures every key that is pressed by the user. You will see what was typed in any program, whether it's IM chat, on a website, webmail or MS Word. You can even capture the passwords typed in many programs and websites!

All of the necessary items (User, Computer, Website/Application Name, Window Title and Date/Time) are recorded and available for quick searching and data filtering.

You can specify a list of programs to capture keystrokes from, such as web browsers, email clients and MS Office apps.

Both letters/numbers and special keys are recorded and displayed in a useful, easy-to-read style in the report.

Keystroke-recording

 

keyb

IM recording


Our instant messaging capturing tool can record the most popular IM programs and protocols: Windows Live Messenger 2011, MSN, Google Talk, AIM, Yahoo Mesenger, ICQ and XMPP.

The User, PC, Date/Time and Message are all included in the report. You may search through all messages by keywords to discover what your employees are sharing.

i'aaam

 

i'am

100% stealth

Work Examiner Client works in stealth mode by default. This means that there are:

No-icons

No icons in the taskbar

 

No-icons

No entries in Start – Programs

 

No-icons

No entries in Add/Remove Programs

 

No-icons

No items in Task Manager – Applications

 

No-icons

and even no items in Task Manager – Processes!

 

What's more, hidden WE Client modules are protected from being stopped.

Stealth technology works in both 32-bit and x64 environments.

 

stealth

User activity reports

Find out what activities take up the most time at your company. Work Examiner allows you to combine or separate applications and web activities.

You will receive comprehensive, easy-to-read data on:

who

Who of your employees spends the most time on chat and playing games?

 

what

What part of the company's working time goes to employee fun and games?

 

are

Are employees using the computer...or are they distracted by other business?

 

Which

Which users/departments are the most productive?

tabless

 

A number of user-friendly features will make the use of reports a snap:

Automatic
Automatic activities categorization

 

Tree-style
Tree-style reports

 

Charts
Charts/bars/lines with drill-down support

 

date
Date navigation panel

 

program
Program and website icons

 

quick
Quick popup actions (block activity, see detailed data)

 

quick-report
Quick report actions (search, create scheduled report, print preview, export)

 

Powerful data filtering capabilities can manage such report parameters as days, hours, days of the week, users, computers, departments, user groups, applications and websites, and display settings. Any parameter can be included or excluded from the report.

 

work
worker

Attendance tracking

Work Examiner allows monitoring the attendance of your employees and their daily, hourly or weekly activity at the computer. Thus you can find out if anyone comes late, is absent from work, misuses the computer or leaves the workplace if their work should be carried out at the computer.

Get instant answers to the following questions:

who-comes

Who comes late for work, who leaves early?

 

who-andWho and when used the computer without proper authorization?

 

on-whatOn what days does a particular employee spend more time at work, and what are the days the employee spends less time there?

 

at-what-times

At what times are employees the most efficient?

 

How-many-hours

How many hours a week has the employee worked?

 

attendance-tack

Application Filter

Application filtering allows blocking the start of applications for employees. You can block the start of certain applications or block running all applications except for specified applications. You can easily create a rule according to which employees will be able to start games only during breaks.

The Application Filter rules allow you to implement the following:

  • Forbid running certain applications or categories (for example, games and instant messaging programs)
  • Allow starting only specified applications or categories (for example, allow only MS Office applications to run)
  • Specify the users, user groups, computers and departments to apply the rule to
  • Forbid running applications at specified times (for example, during working hours)
  • Show a custom message when restricted apps are launched
  • Apply a filtering rule with a delay
  • Specify an application name mask to filter all versions of a program (versions are usually a part of the name)
  • Send an email alert to the admin or manager
  • Alert only, without blocking
 

app-filter

Current Activity

With the Current Activity feature, you can see which employees are working at the moment, what websites they are visiting, and what applications are being used. You can also view the status of each employee: whether the employee is working at the computer at the moment or not, and if not, for how long the employee has been away.

The organizational structure tree will help to easily find the employee that you are looking for.

 

current-act

Dashboard


Just run Work Examiner and instantly see the most important data!

The Dashboard shows charts of the most critical reports. You can see any combination of reports in brief, add/remove reports, edit their advanced settings, drill down into the full report, export and print.

Each report bar can show a hint with detailed time usage information on the active, inactive and total time.
 

dashboard

Search

There are many reports in Work Examiner. Most of them support search: just enter a keyword or text to look through all report items – users, computers, programs, websites, window titles, URLs, emails, keystrokes and chat messages.

Search1

 

Search

Security (Pro version only)

Work Examiner Professional allows multiple users to work with the WE Console simultaneously from different computers. Access rights can be set for each user, allowing the user to see only the information that he or she has access to.

For example, you can set Work Examiner Professional so that every manager can view Internet and application usage statistics for only his or her own employees.

 

Security

Data export

Work Examiner reports can be exported into 10 file formats:

Data-export

 

 

 

 

 

 

The appearance of the exported report can be customized with numerous display options (show/hide charts, tables, columns, sorting preferences, etc.)

 

data

Print preview

Work Examiner stands out from the pack with a powerful printable reports viewer that offers the most common office program features: print, thumbnail view, zoom support, find, enhanced export, sending via email and more.

Print-preview

 

print

Scheduled Reports

Make Work Examiner work autonomously!

With Scheduled Reports you can:

configureConfigure the reports so that they cover a certain period: for example, managers will get the corresponding reports at the end of each week or month.

 

GenerateGenerate reports for specified users: for example, each manager will get reports on his or her employees' online and application activity.

 

Set-theSet the format of reports: your managers will be able to get reports in a format that is useful for them and view the reports on any computer at a convenient time.

 

scheduled

Extended data filtering

Any Work Examiner report can be sorted by:

Schedule: date range, days of week, hours

Activities: included and excluded applications, websites, activity categories (e.g., “Entertainment -> Adult”, “Business -> Sales”)

Users: included and excluded users, user groups, departments

Computers: included and excluded computers, departments

Display: manage view of charts, tables, columns, sorting and print preview page size.

 

Extended

AD Integration (Pro version only)

No more manual entering of organizational structure data! Work Examiner will reflect your security groups and their contents automatically.

AD Integration can periodically synchronize and reflect a great deal of valuable data:

  • Create WE users from AD data
  • Update user display names
  • Create user groups based on AD security groups
  • Update user group members from the associated AD security group
 

AD

Remote client installation

Install Work Examiner clients in two clicks, remotely!

Work Examiner is a client-server application. WE Client must be installed on the employee’s PC. It can be easily and quickly distributed over the network. You can install client modules remotely and do not need to be present on the computers where the program is being installed.

If you have no admin rights, there is another solution: Client Builder.

Remote

 

Remote-client

Database optimization

Database issues become more and more important when the amount of data increases from month to month. Here are a few ways to optimize database storage:

Size-colorSize control: Configure WE to delete all logs older than a specified number of days/months.

SmartSmart data deletion: When you delete an object, the object is processed by a foreground service in parallel. This means no lags in the UI.

 

Lord-managerementLoad management: Control the frequency of activity data updates and set the frequency of sending and size of client logs.

Using these options, you can enjoy a lightning-quick solution even when monitoring 1000+ PCs!

 

screeen

Client Builder

If you do not have admin rights, there is another solution to speed up deployment: build a custom WE Client setup package that already includes a WE Server address. The user simply runs it and WE is done!

This feature can also be used together with Active Directory group policies to deploy WE Client for many users.

 

Client