SurveilStar - Network Monitoring Software
SurveilStar network monitoring software records every detail of computer and Internet activities - emails, chats and instant messages, web sites visited, search history, program activities, document operations, printing, disc burning, removable devices, and many more. With SurveilStar network monitoring software, you can monitor everything they do on computers and the Internet, nothing hides from you.
- Take Screen Snapshots
- Email Monitoring
- Instant Message Monitoring
- Website Visit Monitoring
- Application Monitoring
- Document Monitoring
- Printing Monitoring
- Network Monitoring
- Computer Maintenance
- Data & User Management
- Complete Online Guides
- Video Tutorials
- SurveilStar Testimonials
- Deploying SurveilStar
- SurveilStar Home Edition
- Free Activity Monitor
- Free Email Recording
- SurveilStar Press Release
- Version Comparison
- Feature Module Comparison
- SurveilStar Blog
With SurveilStar network monitoring apps, IT administrator can allocate different bandwidth to different users/computers; block FTP/P2P file transfer, and control file sharing over network.
Network control policy can effectively control the communications between agent computers and other computers. Some malicious network ports or download ports can be blocked to prevent the virus attack.
The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages via email, pager or other alarms. It is a subset of the functions involved in network management. Network policy can prohibit user accessing website and FTP downloads.
Block or allow a network connection:
- Select direction: In, out, or both
- Select IP range: All, or specified IP range
- Select port range: All, or specified Port range
SurveilStar provides easy ways for monitoring & controlling network traffic:
- 1. Select IP range: All, or specified IP range
- 2. Select port range: All, or specified Port range
- 3. Select direction: Total Bandwidth = Traffic (Sent) + Traffic (Received)
- 4. Assign speed limit: To limit the bandwidth speed, unit is KB/s.
Network Traffic Policy is used to control and allocate corporate network bandwidth. The bandwidth can also be controlled based on the specified IP range or network port.
SurveilStar network monitoring software can allocate different bandwidth to different users, or completely block certain user’s connection to LAN and the Internet.
For instance, if you find some guy is occupying too much network bandwidth downloading a 4.7G high definition movie, you can temporarily limit his download speed to 0K/s, or 5K/s, if you are generous enough. At the meantime, SurveilStar network monitoring software can also send a warning message to the trouble-maker to stop abuse the network.
Monitoring a safe corporate network
While an intrusion detection system monitors a network for threats from the outside, a network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices.
For example, to determine the status of a webserver, monitoring software may periodically send an HTTP request to fetch a page; for email servers, a test message might be sent through SMTP and retrieved by IMAP or POP3.