Welcome
to SpyAgent!
1.
Getting Started
![](sideslit.gif)
2.
Installation
3.
Uninstall
![](sideslit.gif)
4.
Monitoring
![](sideslit.gif)
5.
Viewing Logs
6.
Configuring Logging
![](sideslit.gif)
7.
General Settings
![](sideslit.gif)
8.
Advanced Settings
![](sideslit.gif)
9.
Remote Log Delivery
![](sideslit.gif)
10.
Scheduling
![](sideslit.gif)
11.
Content Filtering
![](sideslit.gif)
12.
Stealth Mode
![](sideslit.gif)
13.
Alert Notifications
![](sideslit.gif)
14.
SmartLogging
![](sideslit.gif)
15.
Transferring Settings
![](sideslit.gif)
16.
Archiving Logs
![](sideslit.gif)
17.
Log Filtering
![](sideslit.gif)
18.
Report Generation
![](sideslit.gif)
19.
Log Cross-Referencing
![](sideslit.gif)
20.
Log Searching
![](sideslit.gif)
21.
Quick Installer Creation
![](sideslit.gif)
22.
How Do I...
![](sideslit.gif)
23.
Licensing and Pricing
![](sideslit.gif)
24.
Troubleshooting
|
|
Log Cross-Referencing
SpyAgent's
built-in log viewers (accessible from SpyAgent's interface) have
powerful cross-referencing tools located in the Actions menu found
on each log viewer. The cross-referencing actions allow you to quickly
relate relevant log information with all other activity logs that
SpyAgent contains. This allows you to easily harness all of SpyAgent's
data into quick captures of information that are most important
to you.
Example #1
If you were browsing file usage logs and came across a file you
were interested in you could use the action 'Cross-reference logs
with selected event file' and pull-up a screen that would show you
when the file was modified, created, deleted, typed in (via keystrokes
logs), maybe even captured in a screenshot.
Example #2
If you were browsing the applications executed log you could click
on an application that was ran and select the action 'Cross-reference
logs with selected event Application Name'. From there you would
be able to see how long that program was actively used (via the
application usage log), whether it was captured in any screenshots
or not, what windows were associated with it (windows log), and
even all keystrokes that were typed in that application at various
times.
|