(Tongyi network monitoring software (remote monitoring software LAN monitoring software) the latest download attachments of enterprise version include: Tongyi software installation instructions, serversetup Rar is installed on the LAN server (directly on the LAN computer), tyweb Rar is a remote monitoring server (just upload it to the website) clientsetup Rar is the controlled end of the software. Please read the software description first. If you have any questions, please directly add qq343222159 for consultation. Official website: tonnysoft details: best applicability: perfect support for complex network situations such as multiple network segments. It supports the best operability of monitoring whether the manager is at home or abroad, and whether the charged computer is in any city: the first combination of web (web page) service technology enables the manager to monitor and manage at any time, just like surfing the Internet. Basic information record: browse the basic information of the computer, including software information such as computer name, IP address, operating system, etc., and computer hardware information such as CPU, memory, hard disk, etc. through these information, you can instantly master the relevant information of the computer hardware at the controlled end. It can timely prevent employees from disassembling hardware without permission. Software record: the computer runs any software at any time. The record method here is a daily account. Online records: browse what websites the computer has visited. Including website address, title, time, etc. Screen image recording: browse the screen shot of the computer. Visually understand what the computer is doing at what time. QQ chat record monitoring: View QQ chat records, that is, browse what the computer is chatting with QQ. Including the QQ number of the chat object, the time of the chat content, etc. TM chat records: View TM chat records, that is, browse what the computer is chatting with TM. Including the chat pairs, chat content and time, etc. Chats of Tradelink: to view the chats of Tradelink, that is, to browse what the computer is chatting about with Alibaba Tradelink. Including detailed dialogue content, time, etc. Skype chat records: View Skype chat records, that is, browse what the computer has chatted with Skype, view Yahoo chat records in the workplace, that is, browse what the computer has chatted with Yahoo, and use MSN chat records in the workplace: View MSN chat records, that is, browse what the computer has chatted with MSN. Including MSN account, chat content, time, etc. Email record: email monitoring: what emails are sent to the computer, what the emails say, and whether the company secrets are disclosed. Including outlook, Foxmail and web mail all support monitoring! Online and offline display: you can know whether the computer is online through the "light" and "gray" of the icon on the left of the name. Installation software record: browse to what software is installed on the computer and whether there is any software that the installation company does not allow to install. Computer group management: classify the controlled computers into groups, and set different management policies for different groups. Software shielding settings: set different software shielding policies for different groups. Set which software of the controlled computer cannot run website screening settings: different website screening strategies can be set for different groups. Set which websites of the controlled computer cannot access USB shielding settings: different website shielding strategies can be set for different groups. Set that the controlled computer cannot be connected to the USB mobile storage device to prevent the leakage of important information. Screen image settings: different screen image settings can be set for different groups. Set the screen capture strategy of the controlled computer. You can also do the following in "basic information": uniformly register all the controlled terminals at the server: you can set the registration code in the basic information of each controlled computer in the server. As long as this computer is not registered, it will automatically read the registration code set by the server for automatic registration. (of course, you can also choose to enter the registration code at the controlled end). Set computer name: the name of the monitored computer is displayed by default according to the name set during the installation of the computer operating system. The administrator can also set a more recognizable name for the computer in the basic information. Remote shutdown and restart: in the basic information, you can remotely shut down or restart a computer.
This document contains the following attachments:
Detailed description of Tongyi network monitoring management software doc....)