How to Monitor Employees Working From Home in 2022

Employee monitoring: How to Monitor Remote Workers - CurrentWare

BrowseReporter is a versatile computer user activity monitoring software that helps organizations enforce policies, meet compliance requirements, and understand how their users operate – no matter where they’re located.

BrowseReporter’s detailed user activity reports provide insights like…

  • Are our users following organizational policies? Are there any unwanted activities that need to be addressed?
  • How engaged are our users? Do they spend the majority of their time on-task? And…
  • Are our users making use of the software we’ve invested in? Should we reduce the number of licenses we pay for?

The computer activity data is collected by a software agent that is installed on your computers. The agent connects to a database on your organization’s network, allowing you to maintain complete control over the data.

BrowseReporter’s central console allows you to run reports on your user’s computer activities from the convenience of a web browser. 

There are dozens of reports to choose from, including…

  • User productivity reports with an overview of how much time was spent on websites that are productive, unproductive, or neutral. These classifications can be customized to match what is productive for your users.
  • There are also detailed internet activity reports that show you what websites your users have visited, how long they spent browsing each site, and the amount of bandwidth consumed.
  • And finally, the application usage reports show you what software is being used, how long it was used for, and who was using it.

BrowseReporter’s reports can be generated on-demand, on a set schedule, or automatically sent to your inbox to alert you of specific events.

Using the End-User Reports feature you can even provide your users with on-demand access to their own data. This lets them benefit from the insights that you have.

BrowseReporter can even be deployed with optional privacy-enhancing features.

You can…

  • Display a custom message to notify users that they are being monitored
  • Make the client visible in the system tray
  • Stop monitoring outside of standard operating hours, and…
  • Disable certain types of tracking altogether 

These optional features allow you to customize your BrowseReporter deployment to fit the needs of your organization.

BrowseReporter is best used in tandem with our web filtering software BrowseControl. Using both solutions provides you with the visibility and control you need to ensure that your organization’s computers are being used appropriately

Ready to make data-informed decisions? Get actionable insights into the activity of your users with a free trial of BrowseReporter.

Get started today by visiting CurrentWare.com/Download

If you have any questions during your evaluation our technical support team is available to help you over a phone call, live chat, or email.

Thank you!

Struggling to maintain accountability when your employees work from home? Monitoring remote employees gives you the data you need to ensure your remote workforce is successful.

In this article you will learn how to track web activity, application usage, bandwidth consumption, and more with our remote employee monitoring software solutions.

Ready to get started right away? Download a free 14-day trial of our remote employee monitoring software solutions; no credit card required.

Our customer support team is here to help you. We will help you get set up and provide ongoing support during your time as a CurrentWare customer.

Table of Contents



Considerations For Using Remote Employee Monitoring Software

California Consumer Privacy ActBefore monitoring employees that work from home you should consult with your legal counsel regarding remote worker monitoring laws in your jurisdiction. Workplace privacy laws are evolving to emphasize transparency, security, and fair data collection.

For example, on November 8, 2021, New York Governor Kathy Hochul signed into law an amendment to a New York Civil Rights Law. The amendments explicitly require employers in New York to provide notice to their employees before monitoring their email, telephone, or internet usage. This amendment is set to take effect on May 7, 2022.

General Guidelines for Using Remote Employee Monitoring Software

  • Transparency: Inform your remote employees which of their activities will be monitored, how they will be monitored, how their computer activity data will be used, and who will have access to their data.
  • Proportionality: Use the least invasive method available to accomplish your company’s goals. Avoid monitoring personal devices, logging keystrokes, or capturing audio/video feeds unless absolutely necessary.
  • Privacy/Security: Ensure that the data you collect is secured and used exclusively for its intended purpose. To learn more about the best practices for monitoring remote employees you can download our free white paper

Free White Paper

Best Practices for Monitoring Employees

In today's privacy-conscious world employers need to monitor employees in a way that is transparent, minimally invasive, and respectful of employee privacy.

Read this white paper to learn the best practices for monitoring employees in the workplace.

Write a Work From Home & Workplace Monitoring Policy

CurrentWare Work From Home Policy - Get the free template today
Writing your first work from home policy? Download this FREE work from home policy template.

Before monitoring the activity of your remote employees you should disclose your intention to monitor their computer activity within a formal work from home policy, workplace monitoring policy, and/or an acceptable use policy. These policies are critical tools for explaining your company’s expectations when employees work remotely.

screenshot of a workplace monitoring policy template

Workplace Monitoring
Policy Template

  • Disclose your company’s intent to monitor employees in the workplace
  • Set workplace privacy expectations for employees
  • Meet transparency requirements for compliance with privacy laws

Get started today—Download the FREE template and customize it to fit the needs of your organization.

Workplace Privacy & Employee Monitoring

Employee monitoring is an excellent tool for understanding how your workforce operates.

Unfortunately a history of overly-invasive deployments has caused serious concerns among employees, like:

Is my employer spying on me?

They’re just doing this to find an excuse to fire me

If they’re monitoring what I do at work, they obviously don’t trust me

This is not what you want your employees to feel. 

In this video I’m going to guide you through the best practices for monitoring employees so you can avoid these mistakes and concerns from your employees

Hello and welcome to the CurrentWare YouTube channel. 

My name is Neel Lukka and I am the managing director here at CurrentWare.

After watching this video you can learn more about this topic by reading our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”

You can find the link for that in the description below.

Before we start, I just want to give a quick disclaimer here. 

I’m not a lawyer and this is not legal advice. These tips are for informational purposes only. If you want to use employee monitoring software in your company be sure to consult with a legal professional first.

Alright, let’s jump in

First up is the very best tip I can give you.

If you want to succeed, you have to let your employees know that they are being monitored.

Employees that do not know if they are being monitored, why they are being monitored, and how they are being monitored are more likely to have negative reactions to being monitored, 

such as

Having higher rates of stress and anxiety

Being less likely to accept being monitored

And, ironically, becoming less productive

That’s not to say that transparency is going to negate each and every concern that your employees may have.

But if you start with transparency from the very beginning you have a far better chance of proving to your employees that these tools aren’t being used to spy on them. 

By being transparent you’re also giving the chance to hear about their concerns from the start. This lets you work with them to make an employee monitoring strategy that is fair and minimally invasive.

Here are 4 transparency boosting tips:

Involve a representative sample of employees when you start planning your goals and the metrics you want to capture

Tell your employees what metrics are being captured, how they’ll be used, and what is being used to capture them

Have your staff read and sign policies that disclose your intended use of the employee monitoring software

and finally, give them access to their own data so they can see exactly what’s being captured. They can even use this data to manage their own productivity, which is a major bonus

The second tip I have for you is don’t use employee monitoring to micromanage

One of the reasons that monitoring can be perceived negatively is that it feels like it’s being used to punish employees. They worry that it’s the software equivalent of a micromanaging boss staring over their shoulder while they work, just waiting for them to slip up.

Some employers do monitor internet use to make sure employees aren’t getting carried away, but did you know that so-called “unproductive” internet browsing has actually been found to have a positive impact on productivity?

It’s true! But only if that browsing doesn’t take up more than 12% of their work time.

Employees feel far better about being monitored when they’re given the autonomy to self-manage first. Managers can step in if things are getting carried away or if their employees are visiting clearly inappropriate websites.

The third and final tip I have for you today is to not monitor more than you have to.

Think about it this way – if I told you that I wanted to make sure that employee’s weren’t visiting not safe for work websites, you’d think I was crazy for asking for a direct feed into their webcams. 

The bottom line is this: 

If you can meet your company’s goals with a less invasive method of monitoring, do it that way.

For example, if you want some backup for your acceptable use policies you can use internet monitoring software to see what sites are being visited. 

But there’s no need to track individual keystrokes

Or maybe you want to protect data from being stolen. You can monitor the flow of data without recording audio clips of private conversations

Finally, maybe you want to track the work habits of employees that are working remotely or from home. Give them a company-provided device rather than monitoring their personal computers

That’s it for now. 

If you want learn more, check out our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”

You can find the link for that in the description below.

If you’d like to try out employee monitoring in your company, visit CurrentWare.com/Download for a free trial of BrowseReporter, our computer monitoring software.

And as always stay tuned to our YouTube channel for more videos about employee monitoring, cyber security, and CurrentWare’s workforce management software.

Monitoring employee computer activity can be potentially perceived as invasive. Follow these best practices to monitor employees that work from home with remote employee monitoring software while respecting their privacy.

Why Monitor Employees Who Work From Home?

Thanks for checking out the latest CurrentWare Video. In this video, we’re going to cover the reasons why you should monitor employee computer activity.

If you like this or other videos we’ve produced, hit the subscribe button below. Stay tuned to the end to learn how to get a free trial of all of the software I demo today.

Employee monitoring involves understanding how your employees are using company provided technology during work hours. There are five main benefits and considerations to employee monitoring that we will cover today:

  1. Employee Productivity management
  2. Addressing inappropriate technology usage, legal liability, and compliance
  3. Managing cybersecurity and data loss prevention
  4. Understanding how remote workers / out of office users are engaging with technology
  5. Understanding bandwidth usage and limiting exposure and costs 

So let’s start off with how monitoring can help employee productivity. 

44% of employees admit to being distracted by the internet at work, and employees in the US have admitted to wasting 1-2 hours a day browsing the internet. 

Employees that know they’re being monitored will avoid excessive personal usage of the internet and computer applications. In addition, in the event an employee is underperforming, employee monitoring reports on their computer activity can be used to help the employee understand their actions and enhance their productivity.

The second important reason to monitor activity is to address inappropriate internet usage & avoid legal liability. 

As compliance requirements increase for various businesses, industries & jurisdictions, employers have a responsibility to ensure their employees are complying with regulations such as HIPAA, CCPA, CIPAA and GDPR. 

By enabling computer monitoring, you can ensure that your staff are complying with these requirements. In addition, by monitoring & setting alerts, you can instantly be notified if employees are visiting inappropriate websites such as pornography, adult or other websites.

The third reason to monitor computer activity is for cybersecurity purposes & to prevent data loss.

By knowing which websites an employee is visiting, which files are being downloaded or shared, and which external devices and endpoints are being used, company administrators can manage cyber security risks and data loss prevention efforts. 

Data breaches and associated risks can cost businesses millions of dollars in damages along with reputational risk, so being aware of these risks and monitoring them can provide significant benefits for every organization. In addition, by using alerts, and setting up risk profiles for users, you can audit activities and groups for questionable employee behavior.

Due to Covid-19, the year 2020 has seen a significant shift to remote work for various companies and organizations. This brings us to our 4th reason to monitor an employee’s computer usage: remote workforce management. 

52% of CIOs surveyed suspect that one or more of their mobile workers have been hacked or caused a mobile security issue in the last 12 months. Employee monitoring software can be used to monitor for high-risk activity and verify that employee activity on company networks is legitimate. 

The final reason to monitor employees is for bandwidth management purposes. With CurrentWare’s BrowseReporter tool, you can determine who is hogging bandwidth by streaming videos and uploading/downloading excessively large files. 

Employees who are hogging bandwidth can slow down the entire network, negatively affecting the productivity of other employees and reducing the performance of business critical operations.

That’s it for this video. If you have any thoughts on this video or other reasons why computers should be monitored, feel free to comment below. 

If you’d like to give any of CurrentWare’s computer and device monitoring solutions a try, please check out our free trial at currentware.com/download or get in touch with us and we’d be happy to help!

Note: The above video showcases a legacy user interface for BrowseReporter. To see the most up-to-date features and interface please visit the BrowseReporter product page

  • Employee Productivity Tracking: Computer monitoring software gives you the visibility you need to track your team’s performance and identify unproductive employees who are spending exceptionally large amounts of time surfing the internet for personal use or misrepresenting their work hours.
  • Time Tracking Tools: Monitoring software is an excellent complement to a traditional time tracking tool. With certain employee monitoring features, you can track employee time spent working on their computers, including logon and logoff times
  • Cybersecurity: Employees that visit malicious websites or use shadow IT can compromise your network. Monitoring and filtering internet access is a critical security control for protecting sensitive data.
  • Prevent Company Data Leaks: Data can be easily stolen through the internet and portable storage devices. Monitoring how remote employees interact with data is essential for reducing opportunities to steal data.
  • Ensure the Acceptable Use of Workplace Technology: When employees work from home they may be tempted to use desktop apps, websites, and other tools that are high-risk or otherwise inappropriate for work. All the features in our user activity tracking software will ensure that company devices are used properly.

Improve Employee Productivity With BrowseReporter

“The employees find the reports to be an extremely helpful self-analysis tool, and use the reports to analyze and reconfigure priorities!”

Ready to get advanced insights into how your employees spend their time? Reach out to the CurrentWare team for a demo of BrowseReporter, CurrentWare’s employee and computer monitoring software.

TECHNICAL TUTORIAL
How to Monitor Remote Workers

How to Monitor Employees Using Personal Computers to Connect to a Workstation

CurrentWare personal device to VPN installation networking diagram

In this configuration you will monitor your employee’s computer activity exclusively on the company-owned workstation that they remotely connect to

This process can be completed using any remote access tool that allows your employee to remotely connect to and control a company-owned workstation.

By monitoring remote employees in this way your employee can use their own personal computer for work purposes without having their personal computer activity monitored.

If they would like to browse the internet privately they simply need to disconnect from the company-owned workstation and perform their browsing on their own unmonitored device/network.

Since the remote employee monitoring software is only installed on the work computer they connect to, their personal web browsing on their own machine will not be tracked by the monitoring tools.

Configuration instructions

  1. Download the CurrentWare Installation Package
  2. Following these CurrentWare installation instructions, install the CurrentWare Server and Console on a company server or computer. These components are typically installed on the computer of someone who is responsible for managing the other computers/users on the network such as management or IT personnel
  3. Install the CurrentWare Client agent (cwClientSetup.exe) on the company-owned Workstation that the employee will be connecting to 
  4. Have the employee use their personal computer to connect to the company-owned Workstation using any remote access tool that allows them to remotely control the Workstation.

Examples of remote access tools

Note: You should notify your users that their activities will be monitored with remote employee monitoring software while they are connected to the company network. They should be provided with instructions for disconnecting from the company network when they wish to resume unmonitored use of their personal computers.

How to Monitor Employees Working From Home On Company-Provided Devices

Note: If the laws of your jurisdiction allow it and you have the explicit consent of your remote employee these steps can also be performed on an employee-owned computer as a condition of your BYOD program, however, you must be mindful of any privacy concerns your employees may have when monitoring their personal devices.

No matter which method you choose, all of these configurations are ultimately about connecting the CurrentWare Client that is collecting your employee’s computer activity data to the CurrentWare Server that stores that data so that authorized personnel can generate reports with that data from the CurrentWare Console.CurrentWare networking diagram - client, server, and console

  • The CurrentWare Server is a component of the software that accepts and stores data from the CurrentWare Client.
  • The CurrentWare Client is a software agent that collects activity data on the computer it is installed on.
  • The CurrentWare Console is a graphical user interface (GUI) that is used to manage CurrentWare device restriction policies and generate reports on the data collected by the CurrentWare Client.

Option 1: Connecting the Client/Server Through a VPN

Note: To simplify explanations in the next section I will be referring to the local device that your employee uses from their home as the “local machine” and the workstation they connect in the office to as the “remote machine”.

Option 1a) Monitoring the work-from-home employee’s local device & syncing data via a VPN

CurrentWare standalone local device networking diagram

One option is to use the remote employee monitoring software to monitor your remote employee’s computer activity exclusively on the local machine and have them periodically sync their activity data to your company’s network using a VPN. 

If you opt for this option your employee will not need to remain connected to the VPN to be monitored. All computer monitoring data and last synced device restrictions will be cached on their local machine by the CurrentWare Client agent. 

The next time that your remote employee connects to a remote machine on your company’s network, their activity data and any CurrentWare policy updates will sync between the CurrentWare Server on the company network and the CurrentWare Client on the local machine. 

The advantage of monitoring work from home employees with this setup is that your remote employee’s computer activity data will be stored locally on the local machine without the need to remain constantly connected to the VPN. By monitoring in this way you will reduce bandwidth consumption on your VPN and internal network.

The disadvantage of monitoring work from home employees with this setup is that you will not be monitoring employee activity on the remote machine that your employee connects to unless you install a CurrentWare Client on that device also; you will only collect the activity that takes place on their local machine.

You will also not be able to enforce any CurrentWare policy restrictions on the remote machine as you need a CurrentWare Client on each device you would like to control. 

Configuration instructions
  1. Download the CurrentWare Installation Package
  2. Following these CurrentWare installation instructions, install the CurrentWare Server and Console on a company server or computer. These components are typically installed on the computer of someone who is responsible for managing the other computers on the network such as management or IT personnel
  3. Install the CurrentWare Client agent (cwClientSetup.exe) on the local machine that you would like to monitor and manage.
  4. Your employee’s computer activity data is now being cached on their local machine. To sync your employee’s locally cached computer activity data to the CurrentWare Server, have the employee connect to your company’s internal network through the VPN.

Option 1b) Monitor BOTH the remote employee’s local machine & the remote machine they connect to

CurrentWare networking diagram, monitoring an at-home and in-office workstation

Another option is to use our employee monitoring tool to monitor your employee’s computer activity on BOTH the remote machine AND the local machine. 

With this setup you will have complete control and visibility over how your remote employees spend their time on both their local machine and the remote machine.

To do this you will install the CurrentWare Client agent on the remote machine that the VPN connects to and the local machine that they work from.

Configuration instructions
  1. Download the CurrentWare Installation Package
  2. Following these CurrentWare installation instructions, install the CurrentWare Server and Console on a company server or computer. These components are typically installed on the computer of someone who is responsible for managing the other computers on the network such as management or IT personnel
  3. Install the CurrentWare Client agent (cwClientSetup.exe) on both the local machine and the remote machine, as well as any other device(s) that you would like to monitor and manage.
  4. Your employee’s computer activity data is now being cached on their local machine by our employee monitoring tool. When the employee connects to your company’s internal network through the VPN their monitoring data will be synced to the CurrentWare Server and any activities that take place on the remote machine will also be monitored.

Option 2: Connecting Through a Static Public IP Address (Port Forwarding)

CurrentWare standalone local device networking diagram

In this configuration you will be monitoring your work-from-home employee’s computer activity directly on the local machine that they work from and sync their activity data directly to the CurrentWare Server that is installed in your company’s internal network. 

The CurrentWare Client that is installed on your employee’s local machine will be configured to send data to the CurrentWare Server that is installed in your company’s internal network. To accomplish this you will need to configure your router’s port forwarding rules to accept the incoming traffic from the CurrentWare Client.

The advantage of this setup is that you will not require a VPN or remote desktop solution. This helps reduce the bandwidth consumption going through your VPN, making it particularly desirable for newly remote teams that are experiencing bandwidth overload when all of their employees connect to the VPN simultaneously. The employee’s computer monitoring data and device restrictions are kept up-to-date no matter what internet connection they use. Your employee will also not need to be on a specific internet connection to be monitored.

The disadvantage of this setup is that it is more difficult than other installation methods. This method requires setting up a Public Static IP address and making network-level changes, which may be difficult if the installer is not comfortable with configuring a network. Fortunately, all CurrentWare subscription plans include access to assistance with our technical support team.

Configuration instructions
  1. Download the CurrentWare Installation Package
  2. Following these CurrentWare installation instructions, install the CurrentWare Server and Console on a company server or computer. These components are typically installed on the computer of someone who is responsible for managing the other computers on the network such as management or IT personnel
  3. Configure the in-office router’s port forwarding rules to allow CurrentWare Client traffic from the employee’s local machine through to the CurrentWare Server that is installed on the company network.
  4. Install the CurrentWare CurrentWare Client agent (cwClientSetup.exe) on the device(s) that the employee will be using. With one exception – during the CurrentWare client setup, in the “Enter the IP address/Computer Name where the CurrentWare Server is installed” text box you must enter the Public IP Address, hostname or DDNS of the network that has the CurrentWare server installed. 
  5. Your remote employee’s computer activity data is now being synced with the CurrentWare server on your company’s network. Any CurrentWare policy updates that you make will sync to their local device so long as they are connected to the internet. If they work while offline their activity data will be cached locally by the CurrentWare Client agent and synced to the CurrentWare Server once they connect to the internet. 

Option 3: Offsite Mode (No VPN or Internet Access)

CurrentWare standalone local device networking diagram

CurrentWare’s employee monitoring tools support an offsite mode where your employee’s computer activity data will be automatically stored on the local device until a connection back to the CurrentWare server can be established.

In this configuration you will monitor your employee’s computer activity directly on the local machine and store all of their user activity data locally on that device. Your employee’s local machine will remain restricted by the last known CurrentWare policies.

The advantage of this setup is that CurrentWare continues to monitor and manage your remote workers, no matter where they work from. By monitoring remote employees in this way they will not need to be connected to the internet. 

The disadvantage of this setup is that you will not be able to sync any updates to your CurrentWare policies or retrieve updated user activity data until the CurrentWare Client reestablishes a connection to the CurrentWare Server. 

Note: “Offsite Mode” is less of a specific configuration and more of a feature of CurrentWare. Each installation of CurrentWare will have the CurrentWare Client save your employee’s user activity data and CurrentWare policies to their local machine.

Configuration instructions
  1. Download the CurrentWare Installation Package
  2. Following these CurrentWare installation instructions, install the CurrentWare Server and Console on a company server or computer. These components are typically installed on the computer of someone who is responsible for managing the other computers on the network such as management or IT personnel.
  3. Install the CurrentWare Client agent (cwClientSetup.exe) on the local machine that the employee will be using. With this setup, the CurrentWare Client must be installed onsite first before it is taken off the network.
  4. Your remote employee’s computer activity data will be cached on the local machine until they reconnect to your network. CurrentWare policy updates and your employee’s activity data will be synced the next time your employee regains connection to the CurrentWare Server that is installed on your company’s internal network.

Option 4: Standalone Installation

CurrentWare standalone installation networking diagram. The CurrentWare console, server, and client are installed on the same machine

In a standalone installation of CurrentWarethe CurrentWare Server, Console, and Client are installed on the same computer. You will monitor your employee’s local computer activityand store all of their user activity data on that device.

The advantage of this setup is that the device can be entirely monitored, managed, and configured from a single endpoint. This is convenient for standalone kiosks and allowing your employees to self-monitor as they can be given full control and visibility over their data.

The disadvantage of this setup is that you will have to set up these computers’ CurrentWare policies exactly as you want them to be before the device leaves the network. You will not be able to update their CurrentWare policies after they leave your network without the use of a third-party remote access tool.

Note: If you would like to prevent your remote employees from deleting their user activity data or modifying their CurrentWare device policies you can password protect the CurrentWare Console.

Configuration instructions
  1. Download the CurrentWare Installation Package
  2. Following these CurrentWare installation instructions, install the CurrentWare Server, Console, and Client on the computer the employee will be using. 
  3. Your remote employee’s computer activity data is now being cached locally on the device they are using.
  4. To receive computer activity reports from your remote employees you will need to set up email reports and email alerts*. Email reports will be sent to a designated inbox on a predetermined schedule and the email alerts feature will trigger email notifications when policy violations occur.

* Note: Email reports and alerts will only work when the remote worker has access to an outgoing email server or has internet access to send emails.

Option 5: Self-Hosted Cloud Installation (AWS, GCP, Azure, etc)

CurrentWare cloud installation networking diagram

In this configuration you will expand your CurrentWare setup beyond your office and start running CurrentWare on your own private self-managed cloud servers. Once deployed, the CurrentWare Client will connect using the static IP address or public DNS of your virtual machine on the cloud.

This configuration is a Bring your Own License (BYOL) Instance. You will need to purchase your instance directly from Microsoft Azure, Google Cloud Platform (GCP) or Amazon Web Services (AWS) to install CurrentWare on these cloud platforms. 

Configuration instructions

Option 6: CurrentWare Web Console

Hello! Today I will be showing you all of the solutions available in the CurrentWare Suite. Each solution can be purchased individually for the greatest flexibility or as a bundle for the best value. 

The CurrentWare suite can monitor and manage remote, on-premises, and hybrid users, making them ideal tools for managing the productivity and security of a remote workforce.

Alright, let’s get started.

With the CurrentWare web console you can manage policies, review dashboards, and run user activity reports from the convenience of a web browser. 

Your CurrentWare solutions are installed and managed by your company either on-premises or on a virtual machine hosted by a cloud service provider of your choice, giving you full control over your data.

CurrentWare is also a Citrix-ready partner, making Windows VDI deployments simple for your organization.

The CurrentWare Suite includes:

  • AccessPatrol: Device control software 
  • BrowseControl: Internet filtering software
  • BrowseReporter: Employee computer monitoring software 
  • And enPowerManager: Remote PC power manager

Each solution allows you to apply unique policies for each group of users or computers. These policies will be enforced even when the computers are disconnected from the network.

Let’s start with AccessPatrol

With AccessPatrol you can:

  • Use the USB activity dashboards to monitor how portable storage devices and other peripherals are being used in your organization
  • Restrict a variety of peripherals including USB storage devices, phones, and Bluetooth
  • Add approved peripherals to an Allowed List
  • Get device activity reports on-demand, at a set schedule, or when specific events occur
  • And Block file transfers to USB devices based on file name or extension

With BrowseControl you can:

  • Control internet access based on URLs and content categories
  • Schedule unique allow or block lists
  • Prevent users from launching specific applications
  • And block network ports

Let’s move on to BrowseReporter

With BrowseReporter you can:

  • Use the computer activity dashboards to track metrics such as productivity, web browsing, application usage, bandwidth consumption, and active vs idle time of your entire workforce, specific groups, or specific users
  • You can generate user activity reports on-demand, at a set schedule, or when specific events occur
  • Capture screenshots of your users’ desktops
  • And schedule activity tracking to stop monitoring your users at designated off-hours times such as breaks. 

Finally, with enPowerManager you can:

  • Generate reports on computer power states and logon-logoff times
  • Start up, shut down, restart, standby, and hibernate computers on a set schedule or on-demand
  • Configure advanced power policies for mobile computers
  • And provide your end-users with a warning message before their computers shut down

If you would like to try out CurrentWare for yourself you can instantly get a free trial at CurrentWare.com/Download or book a demo with our sales team at CurrentWare.com/Sales

This video is current as of version 7.0, which was released in February 2022. For the most up-to-date information on the latest features please visit our release notes at CurrentWare.com/support/release-notes/

CurrentWare’s web-based administrative console can be accessed by any device with internet access and a connection to the CurrentWare Server. 

By default, the Web Console is limited to internal access only. To allow remote access you can configure port forwarding in your network.

Option 7: CurrentWare Managed Cloud (Projected Release Date: 2023-2024)

CurrentWare cloud installation networking diagram

We’ve had many requests from new and existing customers for a cloud-based version of CurrentWare. This is in our development pipeline and we’re looking to fulfill these requests soon. CurrentWare Cloud is projected to be released in 2023-2024.

* Note: For the latest updates on the CurrentWare Managed Cloud, please visit this article in the CurrentWare knowledge base

Monitor WFH Employees With BrowseReporter

Hey everyone, this is Dale here. I am the Digital Marketing Manager for CurrentWare.

In today’s video, I’d like to show off the new user activity data dashboards that were introduced to BrowseReporter in version 6.0.2. 

With these dashboards, you can review the productivity levels, web browsing, application usage, and bandwidth consumption of your entire workforce from the convenience of a web browser. 

These dashboards work in tandem with BrowseReporter’s computer activity reports to provide valuable insights into how technology is used in your organization.

Today’s video is just a sneak peek of what BrowseReporter is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards.

How the Dashboards Work

To begin using the new dashboards simply select the groups or users you would like to review, then select the desired time period.

Here at the top of the Overview dashboard, you will see a comparison between the data from this period and the previous time period. This gives you a high-level glance into whether the given metrics have increased or decreased during this timeframe.

Below that, we have graphs showing the Top 5 most used websites and applications. This shows you what computer activities your users spend the most time on.

Next, you’ll see the top 5 most active and idle users or groups. 

BrowseReporter automatically switches from Active Time Tracking to Idle Time Tracking when the user stops using their keyboard or mouse for a set period of time; this threshold can be changed to fit your organization’s needs.

Dashboards for Specific Groups/Users

Let’s drill down even further by clicking on one of our groups.

In this group sub-dashboard, you can see the most productive and unproductive users in the group, along with a dedicated Activity Log. 

Likewise, if we started out looking at a specific user rather than a group we would be taken to a sub-dashboard with that specific user’s online status and computer activity data.

Activity Log For Raw User Activity Data

The activity log lets you review the raw data that is used to populate the dashboards. 

You can use the search function to find specific information, use the column men u to adjust what columns appear, and sort the data that is displayed.

What data points are available in the Activity Log will vary depending on the dashboard you’re viewing.

For example, here in the Overview dashboard, we have access to Group or usernames along with several active and idle time metrics.

In the productivity dashboard, we’d have access to the group or user name, the number of users, and various productivity metrics.

Likewise, the Activity Log of the Websites dashboard shows domain names, active time, web content categories, and the productivity categorization for the domain.

The Activity Log of the Applications dashboard shows the application name, process name, active time, and idle time.

If you’d like to use the Activity Log data in a business intelligence tool you can easily export your user activity data to an Excel spreadsheet. 

If you’d like to provide a visual copy of the Activity Log to someone else, you can use the Export to PDF function. The PDF will display the Activity Log, including hyperlinks to the sub-dashboards of the groups or users shown. 

So long as the viewer has access to an operator account with sufficient permissions they’ll be able to follow these hyperlinks to learn more about the selected user or group.

To finish things off, let’s take a look at the dashboards offered in version 6.0.2

Productivity Dashboard

Switching over to the Productivity dashboard you will see how much time was spent on productive, unproductive, and neutral web browsing. You’ll also see who the most productive and unproductive users or groups are, as well as the top 5 websites and categories. 

What is considered productive can be customized by going to BrowseReporter’s Productivity Grading window; a shortcut to this can be found in the dashboard settings. 

From here you’ll be able to specify whether a given website category or a specific domain should be labeled as productive, unproductive, or neutral.

Internet Browsing Dashboard

Moving on to the Websites dashboard you will find the total active and idle time for the selected groups or users, the top 5 websites and most active users, as well as the web browsing Activity Log.

Application Usage Dashboard

In the applications dashboard, you will find similar graphs showing how much time was spent using applications, the top 5 most used applications, the 5 users that spent the most time using applications, and the application usage Activity Log.

Bandwidth Consumption Dashboard

Finally, we have the bandwidth usage dashboard. Here you’ll be able to see who is using the most bandwidth and how much bandwidth was used each day.  

If you’d like to see what websites are responsible for anomalies in bandwidth usage you can run BrowseReporter’s Bandwidth Usage by URL report. 

This report will show you the exact websites that are consuming bandwidth; from there you can decide whether the bandwidth hogs need to be blocked with BrowseControl or if other corrective measures need to be taken.

Conclusion

Ready to boost operational efficiency, employee productivity, and endpoint security with advanced awareness and control over how your employees use technology in the workplace? 

Get started today with a FREE trial of any of our software solutions. 

Simply visit CurrentWare.com/Download to try our software for yourself or get in touch with us at CurrentWare.com/Contact.

Thank you!

BrowseReporter is CurrentWare’s remote productivity monitoring software.

With BrowseReporter you can:

  • Ensure that business technology is used according to your company policy
  • Take screenshots of employee’s screens
  • Track employee activity including internet and app usage
  • Monitor employees’ productivity to ensure that employees are working and focused on their projects and tasks
  • Use detailed reports and dashboards to verify that employees are working vs spending time on personal tasks and social media sites
  • Use mouse and keyboard activity tracking to distinguish employee time spent between active time vs idle time

For more information about BrowseReporter’s advanced features and detailed reports, visit the BrowseReporter product page


Improve Employee Productivity With BrowseReporter

“The employees find the reports to be an extremely helpful self-analysis tool, and use the reports to analyze and reconfigure priorities!”

Ready to get advanced insights into how your employees spend their time? Reach out to the CurrentWare team for a demo of BrowseReporter, CurrentWare’s employee and computer monitoring software.

DATA PRIVACY & SECURITY TIPS
Best Practices to Monitor Remote Workers

Concerns That Staff May Have When Monitoring Remote Workers

Employers that want to use remote employee monitoring software as part of their remote workforce management strategy need to be aware of the potential privacy concerns that their employees may have. These are common objections and concerns of employees that are being monitored while working from home.

Learn More: Employee Concerns About Monitoring in the Workplace

Misuse of Monitoring Data

A hand holding a pen points to a series of charts and graphs on a sheet of paper.

Data collected by remote employee monitoring software can help you manage your remote workforce. Try to avoid micromanaging time and instead use the insights to make informed employee productivity management decisions.

Employees that are being monitored while working from home are often concerned with how the monitoring data is used. They are likely to be concerned that having their productivity measured by employee computer monitoring software may not provide the full context into how well they are performing. 

  • Still Working: Computer usage monitoring produces plenty of raw data about how remote employees are using the internet and computer applications on their devices, but depending on the nature of their roles and their work style they could be spending time away from their computers while still being productive. Employees may also need to take short breaks to manage their energy throughout the day and they may worry that their managers will see these pauses as a definitive sign of disengagement.
  • Non-Computer Work: Employee monitoring software cannot determine when remote workers are engaged in tasks that don’t require using the computer, such as phone calls and problem solving. Small periods of computer inactivity are normal throughout the course of the workday and remote workers may be concerned that their managers will misuse monitoring data to micromanage short periods of inactivity.
  • Data Protection: Internet usage activity that is captured by monitoring programs captures potentially sensitive browsing history that could be leaked in a data breach. Employees may not be confident that their employers are taking the appropriate data loss prevention measures to protect sensitive employee data.

Employers that use monitoring software for remote employee productivity tracking need to understand that raw internet usage data is not the only indicator of productivity and that automated decision making should not happen solely based on internet monitoring reports. Instead, internet usage monitoring data should be used to identify actively disengaged employees that are misrepresenting their contributions and to provide managers with data that they can use to make informed productivity management decisions. 

Overly Invasive Monitoring of Remote Employees

A sign in front of someone's yard that says "Private Property: No soliciting or tresspassing"

Even on company-provided hardware, employees may become disengaged when monitoring is too invasive. Be certain to discuss privacy concerns with your employees before monitoring takes place.

The use of monitoring software can be considered too invasive for remote workforce management when employers attempt to use computer spy software that tracks employees without their knowledge or when they collect more data than the employees consider necessary. 

  • Stealth Monitoring: Remote workers may be concerned that employers will attempt to monitor their computers without them knowing by using computer spy software that stealthily monitors their day-to-day computer activity without their consent or knowledge. 
  • Personal Devices: With the use of personal devices being incredibly common among employees that regularly work from home, remote workers may worry that their personal computer usage will be collected alongside their work activity.

Employers that use remote spying software to secretly track browsing history are not only likely to be violating data privacy laws such as GDPR and CCPA, they will lose the trust of their employees by hiding the intent behind tracking the computer usage of their employees.

To reduce the invasiveness of employee monitoring, consider the transparency and proportionality of the measures taken.

  • Proportionality: When remote employee monitoring software will be used, employers need to clearly define the goals of the monitoring and ensure that they are only monitoring what is required to meet that goal without causing undue harm to privacy. 
  • Transparency: Employees that are working from home should be made aware that monitoring activity is taking place. Having them sign an internet use policy or workplace monitoring policy that clearly states the activities that will be monitored will help increase the transparency of employee monitoring. 

Employees That Work From Home Not Feeling Trusted

An illuminated sign says "You Got This"

When computer monitoring is used to manage the productivity of remote teams, some employees may feel not trusted to perform well at home. Be certain to outline the goals and benefits of remote employee monitoring and highlight high-achievers.

Employees that are being monitored while working from home may feel that the use of computer monitoring software is a sign that their managers do not trust them to be productive without direct supervision. This feeling of a lack of trust can ruin employee morale and cause even the best employees to begin to feel resentful, resulting in – ironically – a decrease in their productivity!

When addressing these concerns, it’s important that the employees are recognized for their contributions and that they understand that the use of the monitoring software is not due to a lack of trust between the employer and the employee. It helps to emphasize the other uses and benefits for employee monitoring such as data loss prevention, providing managers with clear indications that their employees have everything they need to work effectively, and highlighting employees that are doing amazing work.

Steps You Can Take To Respect The Privacy of Remote Workers

Monitoring employee computer activity can be potentially perceived as invasive. Follow these best practices to monitor employees that work from home while respecting their privacy.

Make a Remote Employee Monitoring Policy

A businessman hands a piece of paper and a pen to their employee to sign

An employee monitoring policy is an important tool for communicating the how & why of using internet monitoring software as part of your productivity tracking strategy.

A clearly defined policy that outlines the organization’s employee monitoring goals and the methods used to collect data will greatly help to increase transparency. By being open and honest about monitoring activities prior to their implementation, remote workers are given the opportunity to voice their concerns and learn the extent of how remote employee monitoring will be used by the company.

While an employee monitoring policy allows employees to be informed of monitoring in the workplace, it does not necessarily constitute as informed consent in the legal sense – the inherent power imbalance of an employer/employee relationship may mean that consent cannot be relied on as the legal precedent for employee monitoring in relation to data privacy laws such as GDPR and CCPA.

What to Include in Your Employee Monitoring Policy:

  • The exact data that will be captured and how will it be used
  • The technology that will be used to track employees
  • How the company will protect the data that is captured
  • Who will have access to monitoring data
  • Who employees can voice their privacy concerns to
  • What level of personal use is permitted on company devices

As part of your employee monitoring policy, consider giving employees access to their own productivity reports so they can see exactly what data is being captured. Any available opportunity to increase transparency will help build trust in the intentions behind the monitoring that will be taking place.

screenshot of a workplace monitoring policy template

Workplace Monitoring
Policy Template

  • Disclose your company’s intent to monitor employees in the workplace
  • Set workplace privacy expectations for employees
  • Meet transparency requirements for compliance with privacy laws

Get started today—Download the FREE template and customize it to fit the needs of your organization.

Avoid Monitoring Personal Devices

A remote worker uses their cell phone and laptop on a small public table.

Personal devices are commonly used by remote workers. If you allow personal devices in your organization, you’ll be limited in the types of monitoring that can take place.

If the company does not provide dedicated devices for remote workers to use or they have a formal Bring Your Own Device (BYOD) policy that allows them to use personal devices in the workplace, there are limitations to the monitoring activities that can take place. 

Should your remote employee give permission for their personal devices to be monitored, careful planning must be implemented to avoid inadvertently capturing personal information and sensitive internet history. If employees that are working from home have a designated schedule, schedule monitoring activities to only occur during working hours to avoid collecting personal usage data.

Don’t Monitor Remote Workers More Than Necessary

A barely visible man peeks through white blinds. Only his eyes and fingers are visible behind the blinds.

Monitoring more than necessary can cause employees to feel spied on. By limiting monitoring to only what is needed you can reduce the potential negative impacts on the privacy of employees.

With the principle of proportionality in mind, clearly defining the types of data that are truly necessary to manage your workforce is key.

The monitoring that will be taking place needs to be proportionate between its legitimate business use and its impact on privacy – if the impact on employee privacy is too great to justify, other metrics should be considered.

Examples of Invasive Monitoring:

  • Keystroke Monitoring: Employees that have their keystrokes tracked may have concerns that their personal information, private conversations, or login credentials may be captured and potentially leaked, causing undue anxiety and stress when using their workstations. 
  • Video Captures: While security cameras are a common form of workplace surveillance, using software to capture video feeds from an employee’s personal webcam is overly invasive and not necessary for tracking productivity. 
  • Sound Recording: Unless a business-use phone is being monitored as part of quality assurance in the context of a call center, recording sound is likely far too invasive and may even be in violation of wiretapping laws.
  • Location Tracking: GPS tracking is commonplace for certain roles such as truck drivers and in-field sales representatives, however for roles that are location independent the monitoring of location is likely to track more than necessary.

Conclusion

Software to track remote employees can play an integral role in remote workforce management, but only if employee privacy is respected in the process.

By limiting the amount of monitoring that will take place, respecting the boundaries associated with personal devices, establishing a clear employee monitoring policy, and using employee monitoring data effectively, employers can effectively use employee computer monitoring software to manage their remote employees.

Thanks to remote employee monitoring software tracking employee activity has never been easier. If you’d like to start monitoring employees that work from home, reach out to our sales team for a demo or download a free trial to get started right away.


Improve Employee Productivity With BrowseReporter

“The employees find the reports to be an extremely helpful self-analysis tool, and use the reports to analyze and reconfigure priorities!”

Ready to get advanced insights into how your employees spend their time? Reach out to the CurrentWare team for a demo of BrowseReporter, CurrentWare’s employee and computer monitoring software.

Sai Kit Chu
Sai Kit Chu
Sai Kit Chu is a Product Manager with CurrentWare. He enjoys helping businesses improve their employee productivity & data loss prevention efforts through the deployment of the CurrentWare solutions.
Free download: Employee Monitoring Starter Kit from CurrentWare

Get Your Free Employee Monitoring Starter Kit

Essentials for implementing a successful employee monitoring strategy

👉 Templates for policies and disclosures

👉 Presentations for key stakeholders

👉 Best practices for monitoring employees

Thank You! We'll Reach Out Soon

Pin It on Pinterest