to Employee Monitoring Return
Back to Getting Started
The following information will assist you in your initial
setup and operation of the new Employee Monitoring software:
The software serves two principal business purposes:
It provides an incredibly informative real-time Corporate
Productivity and Analysis Tool of all employees' use of
their company's valuable network; It provides management
a method of observing the individual work performance
of each employee in detail, and preserves an irrefutable
record of it.
Operating the Software: Simple to Use:
Measurements: These begin when you open the Program
and continue until you end the Program, no matter the
length of time involved.
Pie Chart: It displays the percentages of use
by the 9 categories listed below it. It represents the
relative proportions of the various types of network and
web communications that all users are using. One of the
9 categories is "Other", which can be included
or excluded, at your election. Just check the "Other"
box on the "Settings" page. "Other"
includes all non-defined category usage. When "Other"
is not included in the chart, all categories are fully
Three Meter Charts: These display the average
number of Instant Messages, Downloads and Emails by each
user during the period being measured. You can set whatever
Threshold level you consider a reasonable usage for your
employees by clicking on "Settings" (or on the
"Check Mark" icon), and filling in the boxes
at the bottom. Then Save your settings. The default Threshold
in each box is 10.
Number of Current Users: This appears at the bottom of
Password: You can insert and lock a Password so
that whenever you minimize your screen no one else can
reopen it without entering your confidential password.
A "hint" is provided to remind you of your password.
IP Inclusion or Exclusion: These can be selected under
Watch List: You can select any number of words
or websites that you do not want your employees to access.
You simply enter your list of words, phrases or websites
on separate lines on the "Watch List" page,
under the "Binoculars" icon, and when they appear
on any page requested by a user, a "WL" for
"Watch List" appears beside the user's name
to alert you. The user's IP is also bolded.
Save Reports: Found under "File" or
click on the "Floppy Disc" icon.
Open Reports: Found under "File" or
click on the "Folder" icon.
Email Settings: Found under "Settings".
These must be set by the User before the Send Report Now
feature is operable.
Run Sniffer: Found under
"Actions". This displays all of the source data
for the Program.
Lock. When clicked on it will minimize the screen. The
screen can then be restored only by a right click on the
Paw logo, which then shows "Unlock." A left
click on it will display a notice that allows you to either
enter your Password to create a confidential control,
or you can click on the "UnLock" button to restore
the full screen.
Alert Notification Letters appear beside users names
W when they open Web sites
E when they use Email
WL when words on the Watch List appear on their
I when they use Instant Messages
D when they Download Files
The Icons can be identified by resting the cursor on
them after first clicking elsewhere on the page. They
Red/Green Button (The Pause Button.)
When Red: program is Running-- click to Stop.
When Green: Program is paused--click to Go.
Trash Can Clear Current Information
Binoculars Watch List
Check Mark Settings
Padlock Lock the Screen with a Password
Floppy Disc Save a Detailed Report
File Folder Open a previously saved
Chart Display a Detailed Report
Winged Envelope Email a Report Summary Now! ("Mail
Settings", under "Settings", must first
be setup for this to operate).
Head Icon Individual User Info
Minimize Mark Minimize Screen to Utility Tray
Question Mark Get Help
Individual User Info:
* Click on + to see Web Pages, Web Servers, Probable
Uses and Downloaded Files. Double click on the web page
to actually see the selected page.
* Click on "Head" icon, or Left click on Head
on users list then Right click, to display specific User
Info, including that user's Email, Passwords, Usernames
and Instant Messages