Computer & User Activity Monitoring Report Categories
Productivity
Idle Time
Web & App Use
Logins/Logouts
Internet Use
Websites Visited
Browsing Time
Search Queries
Applications
Shadow IT
Software Waste
Game Playing
Bandwidth
Bandwidth Hogs
By User/PC
Usage Summaries
USB Activity
Devices Used
File Transfers
Blocked Devices
Employee Productivity Reports
Use BrowseReporter’s employee productivity tracking reports and dashboards to see how your remote teams spend their time at work
Increase Productivity
Actively disengaged employees cost American businesses more than $500 billion per year in lost productivity.
Monitoring productivity discourages employees from wasting time and provides managers with a data-informed baseline for addressing the misuse of resources.
Keep a Pulse on Team Activity
Easily view the most recent productivity metrics to understand who is actively working and what application/website they last used.
Compare productivity metrics over time to understand working habits across individuals, teams, and your entire workforce.
Enhance Visibility
See how your remote and hybrid employees spend their time during work hours.
Review the internet and application usage of underperforming employees to see if missed deadlines are the result of excessive unproductive time wasting.
Employee Productivity Score
- Compare productivity trends between departments and individuals
- See how much time is spent on productive vs unproductive websites and apps
- Customize what is considered productive based on your organization’s needs
Productivity by Location
-
Compare differences in productivity based on time spent in-office vs remote
-
Determine in-office vs remote activity based on network IP addresses
-
See which employees are working remotely, hybrid, or in-office
Track Social Media Activity
- Generate reports with data focused on social media websites
- Get time stamped reports with domains and web page titles
- See the exact URLs visited on each social media site
Keep a Pulse on Real-Time Activity With Today’s Insights
-
Get high-level views of the real-time activity of individual users and teams
-
Easily see who is online now and who hasn’t logged in today
-
Filter cards by activity, productivity, name, and average activity time
Active Time vs Idle Time
- See how long employees are away from their computers
- Set custom idle time thresholds based on last mouse/keyboard activity
- Get real-time alerts when employees are inactive on their computers
Employee Logon/Logoff & Active/Idle Time Report*
- Find out when your employees start and stop working
- See whether PCs are being actively used or left idle
- Verify users are locking their PCs when they step away
*This report requires licenses for both BrowseReporter and enPowerManager
Real-Time Internet Activity Reports
Monitoring real-time internet usage reduces the temptation for employees to misuse the internet while at work.
It also deters bad actors from engaging in harmful online behaviour and gives your business the information it needs to spot inappropriate or unsafe internet usage.
Increase Productivity
Actively disengaged employees cost American businesses more than $500 billion per year in lost productivity.
Monitoring internet usage discourages employees from wasting time and provides managers with a data-informed baseline for addressing the misuse of resources.
Insider Threats
Careless or malicious employees can introduce malware into the company network by visiting unsafe websites and downloading harmful programs.
Internet monitoring and internet filtering work together to mitigate cybersecurity threats caused by unsafe internet usage.
Safe Working Conditions
Technology in the workplace can be inappropriately used to harass employees, leading to a hostile work environment.
Internet access monitoring provides HR with the digital evidence they need to respond to unwanted behaviors in the workplace.
Track Websites Visited
- View every website visited during a given timeframe
- Sort data by date, active time, and total time
- Filter data to show general domains or specific URLs
Browsing Time
- See which computers are used the most and which ones are under-utilized
- Review which employees spend the most time on the internet
- Aggregate browsing data to review overall internet usage within the company
Search Engine Queries
- Review the exact queries your users are searching for to identify inappropriate or high-risk search engine usage
- Identify users that are distracted or struggling with specific topics to proactively provide assistance
- Monitor for high-risk search terms such as those related to NSFW topics, insider threats, and attempts to find ways to bypass security controls
FREE DOWNLOAD
Internet Use Policy Template
Download this FREE internet use policy to set standards for acceptable internet usage in your organization.
- Disclose the organization’s intent to monitor internet use
- Communicate acceptable standards for technology use
- Describe your users' rights and responsibilities
Real-Time Windows Software Usage Tracking & Reporting
Application monitoring provides insights into the time that your users spend using software, allowing you to understand the most commonly used applications for each user, device, and department in your organization.
Fight Shadow IT
Unauthorized computer programs increase the potential for a costly data breach.
Detect the use of shadow IT so these programs can be officially supported or block using BrowseControl’s app blocker.
App Sprawl
The average cost of unused computer software (‘shelfware’) is $259 per desktop.
Use BrowseReporter to see the programs that are actually used in your company and which ones can be decommissioned.
Software Asset Management
A failed software compliance audit can cost up to $150,000 in fines per violation.
Use BrowseReporter to determine if your users are using pirated or unlicensed software in the workplace.
Top Computer Application Usage
- Check which applications your employees use the most during the work day
- Find employees that are using unsafe or unproductive applications
- Save money by finding out which applications are actually used and which ones can be decommissioned
Hourly Computer Application Usage
- Gain insights into the software usage habits of your employees
- Review app titles for greater context into how apps are being used
- Prioritize floating license availability by identifying peak app usage periods
Specific Application Usage
- Run reports based on a single application or a list of applications
- See how much time is spent using applications for specific users and departments
- Save money on underutilized software with genuine usage insights
Internet Bandwidth Usage Reports
Streaming videos from Netflix can consume up to 7GB of data per hour. Users that misuse the internet in their workplace aren’t only harming their own productivity, they also strain the available bandwidth and increase network latency.
Reduce Latency
Slow internet speeds caused by bandwidth abuse reduce the effectiveness of your workforce through dropped VoIP/video conferencing connections, longer wait times to access critical resources, and internet connection loss from excessive overload on network hardware.
Save Money
Bandwidth consumption history reports allow you to strategically plan investments in upgrades to networking hardware. With bandwidth consumption insights you have the data you need to determine if upgrades are truly necessary.
Detect Malware
Monitor for bandwidth spikes that are caused by dangerous torrenting websites and malware that turns endpoint devices into botnets or rigs for unauthorized cryptocurrency mining (‘cryptojacking’).
Bandwidth Usage Summaries
- Review data sent and received each day for groups & individuals
- Identify abnormal spikes or dips in expected bandwidth usage
- Discover who is responsible for the greatest bandwidth usage
Monitor Bandwidth Usage by Website
- Track websites that may need to be blocked to reduce latency
- Identify the websites that demand the most bandwidth
- Track websites that may need to be blocked to reduce latency
Top Users & Groups by Bandwidth Usage
- Discover which users and departments require the most bandwidth
- Get early warning signs of anomalous bandwidth usage
- Easily discover who is responsible for bandwidth abuse in your network
File Transfer Activity Tracking
Reports, Alerts & Dashboards
Combine BrowseReporter’s computer activity reports with AccessPatrol’s file transfer monitoring tools and USB control features.
Both modules operate from the same central console, giving you easy access to the visibility and control needed to protect sensitive data against insider threats.
File Transfer Monitoring
- Track files that are copied to portable storage devices, network share drives, cloud storage services, and more
- Selectively choose which file operations to include in the report, such as tracking files copied to USB
- Track USB file transfer history based on individual users and computers as evidence of who copied data
Top File Types Copied/Created
- See what file types are commonly transferred to internal hard drives and external devices
- Find out which groups and users/PCs use removable media device the most
- Review the Activity Log for specific details on what files are being transferred and by who
USB History Reports and Dashboards
- Track USB drive usage, previously connected storage devices, wireless devices, imaging devices, and other peripherals
- Drill down into the USB drive usage history of specific users or computers
- Retain USB drive usage history data with date and time, user/computer name, policy group name, device type, description, and allowed vs blocked status
Track Usage of Allowed vs Denied USB Drives
- Collect evidence of users attempting to use unauthorized portable storage devices
- Alert IT security teams to high-risk USB activities such as transferring sensitive data to a USB stick
- Find out which groups require further USB security training
Track & Block File Transfers to Cloud Storage Services
- Detect when an employee uploads company IP to the cloud
- Track what files are uploaded and downloaded on any website
- Block file uploads to cloud storage service websites and apps
FREE DOWNLOAD
Removable Media Policy
Download this data security policy template to prevent data leakage to USB flash drives and other removable storage devices.
- Set data security standards for portable storage
- Define the acceptable use of removable media
- Inform your users about their security responsibilities
Real-Time Employee and Computer Monitoring Features
Monitor Computer Activity
Get real-time insights into your users' technology use
Screenshot Monitoring
Take automatic screenshots or remotely view desktops
Track App Usage
Get insights into software usage trends in your organization
Idle Time Tracking
Track mouse and keyboard movement to monitor inactivity
Email Reports & Alerts
Automatically send reports to designated inboxes based on events or schedules
Tracking Scheduler
Limit activity tracking to specific days and schedules such as employee work hours
Provide Data Access
Provide your users with on-demand access to their own activity data
Stealth Mode Option
The software can run silently in the background or be configured to alert users
Central Web Console
Manage from the convenience of a web browser with optional Active Directory integration
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Monitor remote employees and students no matter what network they connect to
SQL Server Supported
Use the included Microsoft SQL Express database or connect your own SQL server