Version 6.2 released

  • Cloud storages tracking feature added
  • Equipment control feature added
  • Incoming web mail tracking feature added


Version 5.9 released

  • Network sniffer unit has been improved
  • Web mail monitoring algorithms has been improved


Version 5.7 released

  • Web camera video/audio recording in scheduler mode feature added
  • Tracking of surfing in Microsoft Edge has been improved


Version 5.5.3 released

  • Added feature to capture video from the client Web camera
  • Sound recording from microphone feature added
  • Full support of Windows 10
  • Getting data from client via Internet channel feature added


Version 4.8.6 released

  • Undesirable web sites blocking feature added
  • Email monitoring has been improved
  • Web mail and files upload monitoring feature added
  • Social networks tracking feature added


Build 4.3.15 released

  • Improved the mechanism of agent auto-recovery
  • Fixes in the program usage report module
  • Fixes in the program launch blocking function


Version 4.3 released

  • Monitoring of Skype feature added
  • Monitoring of printed documents has been optimized
  • Clipboard monitoring has been optimized


LanAgent certified as Windows 8 compatible


Version 4.2 released

  • Monitoring of printed documents has been improved
  • Improved program usage reports


Version 4.1 released

  • Application use reports have been improved. Time spent in applications is now counted more accurately
  • Non-administrator user accounts are now handled better in Windows 7


Version 4.0 released

  • Blocking devices by class feature added
  • Added a possibility to create lists of allowed devices
  • File system monitoring has been improved


Version 3.9 released

  • Loading data from database has been optimized
  • Some errors in report generating has been eliminated


Version 3.8 released

  • Making screenshots on task switching feature added
  • Blocking of applications on windows 7 has been improved
  • Tracking of surfing in FireFox 4.x, 5.x, 6.x and Google Chrome has been improved
  • Tracking of remote users activity via RDP feature added


Version 3.6 released

  • Making screenshots in a grayscale mode feature added
  • Increasing of screen shots rate for specific applications feature added
  • File system monitoring has been improved
  • Net disk monitoring feature added


Version 3.4 released

  • Making screenshots of a several monitors feature added
  • Improved tracking of MSN messages


Version 3.3 released

  • Tracking of surfing in Google Chrome feature added
  • Improved tracking of ICQ messages


Version 3.2 released

  • Tracking of access to files in share folders is added
  • Tracking of connections to share folders is added


Standard 3.1 released

  • Preview of screenshots feature added
  • Displaying screenshots in slideshow mode feature added


Standard 3.0 released

  • Application launch blocking feature added
  • Making screenshots only in marked programs feature added
  • Refreshed program interface
  • Applications and visited websites sorting by categories feature added


Standard 2.8 released

  • Tracking of MSN messages is added
  • Tracking of Jabber messages from any AIM programs is added
  • Improved support of Internet Explorer 8


Standard 2.7 released

  • Tracking of incoming and outgoing e-mails is added


Standard 2.6 released

  • Shadow copy feature is added
  • Monitoring of printed documents has been improved
  • Optimized network exchange
  • File system monitoring has been improved

Interview about LanAgent

The employer has the right to require that employees do not spend the company's resources on their personal needs

LanAgent is a program used to stealthily monitor computers on a local area network and designed to control users' activities. Today the director of the NetworkProfi company answers questions about this program.

Andrew, why did you become interested in observation of employees? Probably, it was caused by your own personal experience, for example?

The term “Observation” is not quite correct here because the main purpose of our program is not observation, but protection against internal threats. Actually, I got interested in this issue quite accidentally. In the course of my activities, I had a lot of business with large companies and the heads of their departments often asked me to choose or write a program that would allow them to determine leaks of important information and also increase the effectiveness of using business hours. So, initially it was a custom product and only after that we came up with an off-the-shelf product.

What categories of users is LanAgent intended for?

The program is primarily intended for corporate customers. It is intended for small and medium businesses, for companies that have local area networks up to several hundreds of computers. In companies, the program will be interesting for information security specialists, directors and system administrators. Besides, it will be also useful for usual users that have a home network, for example, for parents that have several computers in their apartment. As a rule, they use it to control their children.

How much time is it needed to analyze log files when LanAgent is used in a large company? How much space do log files occupy on users' hard disks? Can users detect the program if they find its logs?

The amount of time needed to analyze obtained statistics (logs) depends a lot on its amount and may take several minutes. Space that logs occupy on users' hard disks directly depends on how intensively the computer is used. The following issue is also important here: the program has client-server architecture. The server part of the program (administrator part) is installed on the administrator's computer while agents are installed on users' computers. In the end, the entire information is sent to the database on the administrator's computer and logs are deleted from users' computers. It is up to the administrator of the program how often it happens. He can either manually make the program get logs from agents or configure it to get logs automatically, for example, each hour. In this case, logs will be accumulated on users' computers for one hour and then they will be sent to the database on the administrator's computer. So, it will not be more than several megabytes within an hours and this is true if we take into account screenshots that they take more than half the size of log files. Now as to whether users can detect the program... Actually, I would like to point out right away that there is no program that can be hidden with a 100% guarantee, there is always a chance that it will be detected. But I can say for sure that it is very difficult to do it with standard means. So, if users do not know beforehand that there is an agent installed on their computers, the chance that they find either the program or its logs is very little.

Does the program allow you to set the priority for the events it monitors (for example, operations with secret documents have a higher priority)?

Currently, the program does not have such a feature. All operations with any objects (applications, files, visited sites) have the same priority. In future, we plan to add the system of filtering events. For example, the administrator will be able to specify which applications, sites, etc. should be considered as potentially dangerous. The program will filter the contents of e-mail messages and websites and determine the priority level. What if an employee sends company's secret data by e-mail - the company's security department should be informed about it in proper time.

Does the program allow you to divide users into groups and log different activities for different groups of users?

Yes, it is possible to divide user into groups in the program. And it is possible to specify different settings for different groups. For example, you have an accounting department where the Internet is not used. In this case, you can disable all types of monitoring related to the Internet for this group. Actually, it is possible to specify individual settings for each user.

For what purposes can the feature of sending message to users' computers by the administrator be used?
This feature can be used if the administrator wants to warn a user. If the user knows that the program is installed on the computer and he violates some security policies, while the administrator sees his activity and considers it dangerous, he can send a warning to the user or some other text message that he will find appropriate. Most probably, the administrator has other means to contact the user as well, but we decided to add this feature to the program just in case.

Is there any data concerning the effectiveness of using this program in companies? What can a person who decides to control their employees with LanAgent expect - do you have this kind of statistics?

Yes, we do. More than half of our customers have made sure that their employees are only half-occupied with work because they have enough time to play computer games, chat, view entertainment sites while doing their jobs. Our experience shows that persons in charge just give additional tasks to such employees. Also, there were some cases when the company's security policy has been violated. It happened when employees sent sensitive information by e-mail without having a clue what consequences it may have for the company. As to the effect expected from the deployment of LanAgent, in the first place, it is increasing the effectiveness of using business hours, preventing leaks of important information, preventing attempts of unauthorized negotiations with competitors. It should be kept in mind that LanAgent is a tool and the rest is up to you.

Do you think that employers have the right to require that employees use computers and the Internet only for business purposes?

I think that the answer to this question is obvious: yes, they do. If an employer employs a person, gives this person resources, he has the right to require that the employee spends these resources not on his personal needs, but on achieving the company's goals. But another question is not less important: can an employer monitor an employee? Employees and their bosses will always differ on this question. Such issues as employees' carelessness and information leaks are quite pressing in some companies and their directors have to fight against them. As a rule, the Internet, ICQ, etc. are needed for work so it is impossible to just forbid using these things so the only thing left is monitoring and explanatory conversations with the staff. We do not suggest that our customers hide the fact of monitoring their staff's activities. As to the legal side of the problem, we suggest that employers include information similar to this ( in their contracts with employees or give this information as a separate document.



Download Free Trial

Try LanAgent Standard Free for 15 Days


Purchase LanAgent

Purchase now the full version of LanAgent



A.N. Fedoseev.
Director General "West Siberia Marketing Center":

The program is very comfortable and easy to use. LanAgent allows you to monitor all user activity on a computer, which provides the full picture of the user's workday. The intuitive interface is successfully combined with a wide range of features...

Maria Evgenyevna Sidorova.
Information Security Specialist GOU VPO TyumGMA of Roszdrav:

Nowadays no one has any doubts about the necessity of ensuring the security for information resource in a organization or company. The commonly used approach to this process implies examining the system, auditing the state of information security, developing a new security policy or correcting the existing one. It is convenient if you can do most of these things with one software suite. LanAgent has been working well with 300 workstations, which proves the good scalability of this software. We should particularly mention special features offered by LanAgent, such as ...

Vladimir Grigorievich Lim.
PhD in Technical Sciences, Assistant Professor of the Department of Informational Systems and Information Protection of Astrakhan State University:

LanAgent became one of the key tools for me and for our department. Remote control tools allows you to install monitoring tools on the computer invisibly for the network user and then invisibly monitor the user's activity. We should say that LanAgent is not the only monitoring tool that we tested. The use of these tools ...

Andrew Germanov.
Head of Computer Company "Exclusive":

We were faced with the challenge of making our staff more efficient and productive. Bonuses had an effect that was short-term at most. There was a burst of activity, but it did not last long: only about two months. From the outside it seemed like employees were busy. But the actual results showed otherwise. To improve the situation, we decided to install special computer monitoring software...

2004-2019 NetworkProfi. All rights reserved.
Computer tracking software
Home | News | Features | Screenshots | Download | Purchase | Testimonials | Articles | Contacts