Welcom to IMonitor EAM
IMonitor EAM is an application for real time network computer monitoring and content filtering, and for employees' work time tracking.
IMonitor EAM allows you invisibly monitor your entire network from one centralized position, such as Email(POP3, SMTP, web based email), screenshots, instant message, keystrokes, print Jobs, FTP file transfer, websites visited, applications used, computer devices, softwares, system hotfixes, system services etc. IMonitor EAM also can log file operations on employee's computer, such as copy, delete, create, rename, open, copy file to removable disk, etc. Send alarm to console computer when employee do a file operation on removable disk, add or remove a removable disk, open an unwanted website, send or receive mail, transfer file with FTP protocol, etc. You can also see live screenshots of multi network computers and take a control of a remote computer by controlling it's mouse and keyboard, this is especially useful when you need to assist the person who uses the remote computer, and you can edit file, open file, download file and upload file remotely. IMonitor EAM also can restrict remote computer's browsing in web browser, restrict remote computer's application using, send instant message and command (e.g. shut down, restart, run program, open website) to remote computer. Additionally IMonitor EAM provide a powerful remote task manager, allows you view all processes on remote computer and end any of them.
Do you know? IMonitor EAM is not like other monitoring software, it stores important logs on centralized database on server computer, such as keystrokes, mail logs, file logs, clipboard logs, website logs, ftp logs, print job logs, instant message, etc. The Agent Program uploads collected logs to server computer AUTOMATICALLY at interval of X minutes you specified.
IMonitor EAM is the best choice for your business!
|IMonitor EAM main features|
How To ...
|Install IMonitor EAM agent|
|Scan network computers|
|Move agent(s) to another department|
|Modify remote computer's TCP/IP property|
|Restrict employee's browsing in web browser|
|Block game, IM or other unwanted application|
|View live screenshots and take a control of a remote computer|
|Edit files on remote computer, transfer file between remote computer and local computer.|
|Send program file or document to employee's computer and open it|
|Use searching bar|
|Export list to HTML or EXCEL document|
|Monitor printer which is assigned with the unique IP address|
|Change database folder|
|Disable controversial log , such as keystrokes|
|Use IMonitor Time Tracker (For professional version only)|
|Uninstall IMonitor EAM|
|Uninstall IMonitor EAM agent.|
|Hardware & Software|