找回密码
 立即注册
酒店行业 2022-06-30 104 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
同易网络监控软件(远程监控软件局域网监控软件)企业版最新下载附件有4个包括:同易软件安装说明,serversetup.rar为局域网服务端安装(直接在局域网电脑上安装),tyweb.rar为远程监控服务端(直接上传到网站就行)clientsetup.rar为软件的被控端。请朋友们先看软件说明。如果还有什么问题直接加QQ343222159咨询。官网:tonnysoft详细内容:最好的适用性:完美支持多网段等复杂网络情况。支持管理者无论在国内在国外,被控电脑无论在哪个城市,都可实现监控最好的操作性:首创结合web(网页)服务技术,管理者随时监控管理就象上网冲浪一样轻松愉快。基本信息记录:浏览电脑的基本信息,包括软件信息如电脑名称,IP地址,操作系统等,以及电脑硬件信息如CPU,内存,硬盘等,通过这些信息,可以即时掌握被控端电脑硬件的相关信息。可以及时地防止员工私自拆卸硬件。软件记录:电脑在什么时候都运行了什么软件,此处记录方式为一流水帐的方式进行记录。上网记录:浏览电脑都访问了些什么网站。包括网站地址,标题,时间等。屏幕图象记录:浏览电脑的屏幕截图。形象地了解到电脑在什么时候正在做什么事情。QQ聊天记录监控:qq聊天记录查看,即浏览电脑都在用QQ聊了些什么。包括聊天对象QQ号呢称,聊天内容时间等。TM聊天记录:TM聊天记录查看,即浏览电脑都在用TM聊了些什么。包括聊天对呢称,聊天内容时间等。贸易通聊天记录:贸易通聊天记录查看,即浏览电脑都在用阿里巴巴贸易通聊了些什么。包括详细对话内容,时间等。Skype聊天记录:skype聊天记录查看,即浏览电脑使用Skype都聊了些什么,工作场合使用比较多Yahoo通记录yahoo通聊天记录查看,即浏览电脑使用Yahoo通都聊了些什么,工作场合使用比较多Msn聊天记录:msn聊天记录查看,即浏览到电脑都在用Msn聊了些什么。包括Msn帐号,聊天内容时间等。Email记录:邮件监控浏览到电脑都发了些什么Email,邮件都说了些什么,是否泄露公司机密。包括outlook,foxmail以及网页邮件全部支持监控!在线离线显示:通过名称左边的图标的“亮”与“灰”,可及时了解该电脑是否处于网络在线。安装软件记录:浏览到电脑都安装了些什么软件,是否有安装公司不允许安装的软件电脑分组管理:将被控电脑按组进行分类,可以针对不同组设置不同的管理策略软件屏蔽设置:可以针对不同分组设置不同的软件屏蔽策略。设置被控电脑哪些软件不能运行网站屏蔽设置:可以针对不同分组设置不同的网站屏蔽策略。设置被控电脑哪些网站不能访问USB屏蔽设置:可以针对不同分组设置不同的网站屏蔽策略。设置被控电脑不能接入USB移动存储设备,以防重要信息泄露屏幕图象设置:可以针对不同分组设置不同的屏幕图象设置。设置被控电脑按什么策略进行屏幕截图您还可以在“基本信息”中做如下操作:在服务端端统一给所有被控端进行注册:您可以在服务端中每台被控电脑的基本信息中设置注册码。那么只要这台电脑还未注册,它将会自动读取服务端设置的注册码进行自动注册。(当然,您也可以选择在被控端进行注册码输入)。设置电脑名称:被监控到的电脑,默认按该电脑操作系统安装时设置的名称显示。管理者也可以在基本信息中给该电脑设置一个更加容易识别的名称。远程关机,重启动:在基本信息中,您可以远程关闭或者重新启动某一台电脑。
本资料共包含以下附件:
同易网络版监控管理软件详细说明.doc....


(Tongyi network monitoring software (remote monitoring software LAN monitoring software) the latest download attachments of enterprise version include: Tongyi software installation instructions, serversetup Rar is installed on the LAN server (directly on the LAN computer), tyweb Rar is a remote monitoring server (just upload it to the website) clientsetup Rar is the controlled end of the software. Please read the software description first. If you have any questions, please directly add qq343222159 for consultation. Official website: tonnysoft details: best applicability: perfect support for complex network situations such as multiple network segments. It supports the best operability of monitoring whether the manager is at home or abroad, and whether the charged computer is in any city: the first combination of web (web page) service technology enables the manager to monitor and manage at any time, just like surfing the Internet. Basic information record: browse the basic information of the computer, including software information such as computer name, IP address, operating system, etc., and computer hardware information such as CPU, memory, hard disk, etc. through these information, you can instantly master the relevant information of the computer hardware at the controlled end. It can timely prevent employees from disassembling hardware without permission. Software record: the computer runs any software at any time. The record method here is a daily account. Online records: browse what websites the computer has visited. Including website address, title, time, etc. Screen image recording: browse the screen shot of the computer. Visually understand what the computer is doing at what time. QQ chat record monitoring: View QQ chat records, that is, browse what the computer is chatting with QQ. Including the QQ number of the chat object, the time of the chat content, etc. TM chat records: View TM chat records, that is, browse what the computer is chatting with TM. Including the chat pairs, chat content and time, etc. Chats of Tradelink: to view the chats of Tradelink, that is, to browse what the computer is chatting about with Alibaba Tradelink. Including detailed dialogue content, time, etc. Skype chat records: View Skype chat records, that is, browse what the computer has chatted with Skype, view Yahoo chat records in the workplace, that is, browse what the computer has chatted with Yahoo, and use MSN chat records in the workplace: View MSN chat records, that is, browse what the computer has chatted with MSN. Including MSN account, chat content, time, etc. Email record: email monitoring: what emails are sent to the computer, what the emails say, and whether the company secrets are disclosed. Including outlook, Foxmail and web mail all support monitoring! Online and offline display: you can know whether the computer is online through the "light" and "gray" of the icon on the left of the name. Installation software record: browse to what software is installed on the computer and whether there is any software that the installation company does not allow to install. Computer group management: classify the controlled computers into groups, and set different management policies for different groups. Software shielding settings: set different software shielding policies for different groups. Set which software of the controlled computer cannot run website screening settings: different website screening strategies can be set for different groups. Set which websites of the controlled computer cannot access USB shielding settings: different website shielding strategies can be set for different groups. Set that the controlled computer cannot be connected to the USB mobile storage device to prevent the leakage of important information. Screen image settings: different screen image settings can be set for different groups. Set the screen capture strategy of the controlled computer. You can also do the following in "basic information": uniformly register all the controlled terminals at the server: you can set the registration code in the basic information of each controlled computer in the server. As long as this computer is not registered, it will automatically read the registration code set by the server for automatic registration. (of course, you can also choose to enter the registration code at the controlled end). Set computer name: the name of the monitored computer is displayed by default according to the name set during the installation of the computer operating system. The administrator can also set a more recognizable name for the computer in the basic information. Remote shutdown and restart: in the basic information, you can remotely shut down or restart a computer.
This document contains the following attachments:
Detailed description of Tongyi network monitoring management software doc....)

[下载]10071852813.rar




上一篇:SinforNat
下一篇:超级网络邻居IPbook