Computer & User Activity Monitoring Report Categories
Productivity
Idle Time
Web & App Use
Logins/Logouts
Internet Use
Websites Visited
Browsing Time
Search Queries
Location
In-Office vs Remote
Geospatial Info
Working Locations
Applications
Shadow IT
Software Waste
Game Playing
Bandwidth
Bandwidth Hogs
By User/PC
Usage Summaries
USB Activity
Devices Used
File Transfers
Blocked Devices
Employee Productivity Reports
Use BrowseReporter’s employee productivity tracking reports and dashboards to see how your remote teams spend their time at work
Increase Productivity
Actively disengaged employees cost American businesses more than $500 billion per year in lost productivity.
Monitoring productivity discourages employees from wasting time and provides managers with a data-informed baseline for addressing the misuse of resources.
Keep a Pulse on Team Activity
Easily view the most recent productivity metrics to understand who is actively working and what application/website they last used.
Compare productivity metrics over time to understand working habits across individuals, teams, and your entire workforce.
Enhance Visibility
See how your remote and hybrid employees spend their time during work hours.
Review the internet and application usage of underperforming employees to see if missed deadlines are the result of excessive unproductive time wasting.
Employee Productivity Score
- Compare productivity trends between departments and individuals
- See how much time is spent on productive vs unproductive websites and apps
- Customize what is considered productive based on your organization’s needs
Productivity by Location
-
Compare differences in productivity based on time spent in-office vs remote
-
Determine in-office vs remote activity based on network IP addresses
-
See which employees are working remotely, hybrid, or in-office
Track Social Media Activity
- Generate reports with data focused on social media websites
- Get time stamped reports with domains and web page titles
- See the exact URLs visited on each social media site
Keep a Pulse on Real-Time Activity With Today’s Insights
-
Get high-level views of the real-time activity of individual users and teams
-
Easily see who is online now and who hasn’t logged in today
-
Filter cards by activity, productivity, name, and average activity time
Active Time vs Idle Time
- See how long employees are away from their computers
- Set custom idle time thresholds based on last mouse/keyboard activity
- Get real-time alerts when employees are inactive on their computers
Track Employee Login/Logoff Times
- Find out when your employees start and stop working
- See whether PCs are being actively used or left idle
- Verify users are locking their PCs when they step away
*This report requires licenses for both BrowseReporter and enPowerManager
CASE STUDY
Shady Maple Transforms Their Productivity With Internet Filtering and Monitoring Software
Being able to identify negative browsing trends and put a stop to them within a couple of hours has meant that our employees are focused on the job almost all of the time. We have become an extremely efficient workforce.
Real-Time Internet Activity Reports
Monitoring real-time internet usage reduces the temptation for employees to misuse the internet while at work.
It also deters bad actors from engaging in harmful online behaviour and gives your business the information it needs to spot inappropriate or unsafe internet usage.
Increase Productivity
Actively disengaged employees cost American businesses more than $500 billion per year in lost productivity.
Monitoring internet usage discourages employees from wasting time and provides managers with a data-informed baseline for addressing the misuse of resources.
Insider Threats
Careless or malicious employees can introduce malware into the company network by visiting unsafe websites and downloading harmful programs.
Internet monitoring and internet filtering work together to mitigate cybersecurity threats caused by unsafe internet usage.
Safe Working Conditions
Technology in the workplace can be inappropriately used to harass employees, leading to a hostile work environment.
Internet access monitoring provides HR with the digital evidence they need to respond to unwanted behaviors in the workplace.
Track Websites Visited
- View every website visited during a given timeframe
- Sort data by date, active time, and total time
- Filter data to show general domains or specific URLs
Browsing Time
- See which computers are used the most and which ones are under-utilized
- Review which employees spend the most time on the internet
- Aggregate browsing data to review overall internet usage within the company
Search Engine Queries
- Review the exact queries your users are searching for to identify inappropriate or high-risk search engine usage
- Identify users that are distracted or struggling with specific topics to proactively provide assistance
- Monitor for high-risk search terms such as those related to NSFW topics, insider threats, and attempts to find ways to bypass security controls
FREE DOWNLOAD
Internet Use Policy Template
Download this FREE internet use policy to set standards for acceptable internet usage in your organization.
- Disclose the organization’s intent to monitor internet use
- Communicate acceptable standards for technology use
- Describe your users' rights and responsibilities
Track Employee Working Locations
Review office vs remote work trends to make informed decisions on workplace policies, technology investments, and real estate planning.
Enforce Hybrid Work & Return to Office Mandates
- Ensure employees are working from approved locations
- Verify office attendance days and working hours
- Review productivity and activity by location
Assist in Attendance Management & Scheduling
- Track login/logoff times and computer activity to ensure employees adhere to their work schedules
- See who is actively engaged in real-time with automated screenshots and idle time detection
- Analyze employee activity patterns to create optimal schedules that align with peak workload periods
Ensure the Success of Working Location Flexibility
- Identify where your teams are working to better distribute resources and support
- Track software utilization to ensure adequate licensing and consolidate solutions
- Location-specific productivity data supports remote, office, and hybrid work decisions
🔧 Geographical location tracking is in beta, under active development
Track Employee Working Locations
- Track what country/region/city each of your users login from
- Ensure compliance with working locations policies
- Get more granular insights into employee location distribution
Remote vs In-Office Tracking
- Monitor adherence to return-to-office mandates
- See who spends more time working remotely vs in-office
- Assess office utilization to make informed real estate decisions
Productivity by Location
- Determine whether employees are more productive when working in the office, remotely or hybrid
- Use individual productivity insights to understand who works best in which environment
- Offer flexibility without sacrificing accountability
Real-Time Windows Software Usage Tracking & Reporting
Application monitoring provides insights into the time that your users spend using software, allowing you to understand the most commonly used applications for each user, device, and department in your organization.
Fight Shadow IT
Unauthorized computer programs increase the potential for a costly data breach.
Detect the use of shadow IT so these programs can be officially supported or block using BrowseControl’s app blocker.
App Sprawl
The average cost of unused computer software (‘shelfware’) is $259 per desktop.
Use BrowseReporter to see the programs that are actually used in your company and which ones can be decommissioned.
Software Asset Management
A failed software compliance audit can cost up to $150,000 in fines per violation.
Use BrowseReporter to determine if your users are using pirated or unlicensed software in the workplace.
Top Computer Application Usage
- Check which applications your employees use the most during the work day
- Find employees that are using unsafe or unproductive applications
- Save money by finding out which applications are actually used and which ones can be decommissioned
Hourly Computer Application Usage
- Gain insights into the software usage habits of your employees
- Review app titles for greater context into how apps are being used
- Prioritize floating license availability by identifying peak app usage periods
Specific Application Usage
- Run reports based on a single application or a list of applications
- See how much time is spent using applications for specific users and departments
- Save money on underutilized software with genuine usage insights
See When Apps & Websites Were Last Used
- Verify if software and SaaS tools have been recently used by particular users/departments or your entire workforce
- See who last used a given app or website
- View each users’ last accessed time for specific apps/websites for greater insights into recent activity and resource usage
CASE STUDY
Monitoring User Activity in Citrix Workspace Drives Software Adoption & Productivity for The Coding Network
There was a gap in the data we had and we wanted to get something in place before there was an incident.
CurrentWare has really made our Citrix rollout a lot easier from a tracking and management perspective.
Internet Bandwidth Usage Reports
Streaming videos from Netflix can consume up to 7GB of data per hour. Users that misuse the internet in their workplace aren’t only harming their own productivity, they also strain the available bandwidth and increase network latency.
Reduce Latency
Slow internet speeds caused by bandwidth abuse reduce the effectiveness of your workforce through dropped VoIP/video conferencing connections, longer wait times to access critical resources, and internet connection loss from excessive overload on network hardware.
Save Money
Bandwidth consumption history reports allow you to strategically plan investments in upgrades to networking hardware. With bandwidth consumption insights you have the data you need to determine if upgrades are truly necessary.
Detect Malware
Monitor for bandwidth spikes that are caused by dangerous torrenting websites and malware that turns endpoint devices into botnets or rigs for unauthorized cryptocurrency mining (‘cryptojacking’).
Bandwidth Usage Summaries
- Review data sent and received each day for groups & individuals
- Identify abnormal spikes or dips in expected bandwidth usage
- Discover who is responsible for the greatest bandwidth usage
Monitor Bandwidth Usage by Website
- Track websites that may need to be blocked to reduce latency
- Identify the websites that demand the most bandwidth
- Track websites that may need to be blocked to reduce latency
Top Users & Groups by Bandwidth Usage
- Discover which users and departments require the most bandwidth
- Get early warning signs of anomalous bandwidth usage
- Easily discover who is responsible for bandwidth abuse in your network
File Transfer Activity Tracking
Reports, Alerts & Dashboards
Combine BrowseReporter’s computer activity reports with AccessPatrol’s file transfer monitoring tools and USB control features.
Both modules operate from the same central console, giving you easy access to the visibility and control needed to protect sensitive data against insider threats.
File Transfer Monitoring
- Track files that are copied to portable storage devices, network share drives, cloud storage services, and more
- Selectively choose which file operations to include in the report, such as tracking files copied to cloud storage services
- Track file transfer history based on individual users and computers as evidence of who copied data
Top File Types Copied/Created
- See what file types are commonly transferred to internal hard drives and external devices
- Find out which groups and users/PCs use removable media device the most
- Review the Activity Log for specific details on what files are being transferred and by who
USB History Reports and Dashboards
- Track USB drive usage, previously connected storage devices, wireless devices, imaging devices, and other peripherals
- Drill down into the USB drive usage history of specific users or computers
- Retain USB drive usage history data with date and time, user/computer name, policy group name, device type, description, and allowed vs blocked status
Track Usage of Allowed vs Denied USB Drives
- Collect evidence of users attempting to use unauthorized portable storage devices
- Alert IT security teams to high-risk USB activities such as transferring sensitive data to a USB stick
- Find out which groups require further USB security training
Track & Block File Transfers to Cloud Storage Services
- Detect when an employee uploads company IP to the cloud
- Track what files are uploaded and downloaded on any website
- Block file uploads to cloud storage service websites and apps
Real-Time Employee and Computer Monitoring Features
Monitor Computer Activity
Get real-time insights into your users' technology use
Screenshot Monitoring
Take automatic screenshots or remotely view desktops
Track App Use
Get insights into software usage trends in your organization
Idle Time Tracking
Track mouse and keyboard movement to monitor inactivity
Email Reports & Alerts
Automatically send reports to designated inboxes based on events or schedules
Tracking Scheduler
Limit activity tracking to specific days and schedules such as employee work hours
Employee Privacy
Optional privacy-enhancing features improve transparency and minimize data collection
Stealth Mode Option
The software can run silently in the background or be configured to alert users
Central Web Console
Save time with a central admin console; optionally integrate Active
Directory OUs or security groups
Platform Security
Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more
Offsite Management
Monitor remote employees and students no matter what network they connect to
SQL Server Supported
Use the included Microsoft SQL Express database or connect your own SQL server