Monitoring - Starting and Stopping


To Start Monitoring with NetVizor, click the "Start Monitoring" button - then enter your NetVizor password.

To access the client when it is in stealth mode, press your hotkey combination - by default the hotkey combination is CONTROL+ALT+SHIFT+M - you will then be prompted for your password. After entering your password you will back at NetVizor's main interface - press "Start Monitoring" to enter back into monitoring mode.

To stop monitoring press "Stop Monitoring" if you are not in stealth mode.

If you close/exit NetVizor by clicking the "X" on the top right of the interface NetVizor will NOT resume monitoring and you will have to manually restart NetVizor and click "Start Monitoring" again.

 

Monitoring Mode - Standard Vs. Blackbox


Configured by clicking on 'Activity Logging and Configuration' - 'Configure Monitoring Mode', 'NetVizor can operate in two different monitoring modes - standard/proactive, and blackbox/reactive.

Standard / Proactive

This is the default monitoring mode. In standard mode NetVizor records all user activities and allows you to view them in real-time at any time via the NetVizor web interface, or the NetVizor viewer software. Logs are not encrypted (unless configured in the additional Security settings) and can be set to be stored locally, or on a network share. This monitoring mode allows you to view logs as they are created and respond immediately to logged events. Activity alerts operate in real-time.

Blackbox / Reactive

The blackbox monitoring mode records all user activities and stores them locally in an unreadable encrypted format for later viewing, if desired. Logs can only be viewed after being unlocked, and are retained only for a set number of days as configured. This monitoring mode allows you to honor the complete privacy of your network users while still being able to unlock logs for evidence in the event that an unwanted behavior occurs. Alerts are still transmitted in real-time, however, allowing you to react to threats as they occur.

Copyright Spytech Software and Design, Inc. 2000-2014