Spytech Spy Software - Computer Monitoring Software - Best Monitoring software

Spytech SentryPC
Secure Filtering, Monitoring, and Access Control

SentryPC enables you to control, restrict and monitor access and usage of your PC. You can control how long and when users are allowed to use the computer, prevent the use of specific programs, block access to certain websites, restrict access to Windows functions like Control Panel and more. SentryPC can also block chat activities, and intercept the user if specific keywords (of your choice) are typed in an email, URL, document or other input area. In addition to access control, the program can also record all activities, including keystrokes, chats and more.

SentryPC offers a complete solution for any type of PC access control, ranging from basic time management, to complete surveillance and child proofing of your PC.

SentryPC has a very large list of features. Below is a list of SentryPC's extensive features, organized by category for easy browsing. Click on a category to view its feature-set.

Time Management
Activity Monitoring
Content Filtering

Security and Stealth Features Ease of Use Features

    Time Management

Probably the most important feature of SentryPC is its time management. Every program, game, website, etc is at your disposal for time management settings. This means you can specify by what hours on what days of the week the user can access and use the computer, programs, and specific websites. You also have the ability to enter a 'weekly allowance' which, when the total time you enter for the selection has been used for that week, the user no longer has access until the following week.

  • Time Management Control Panel
    SentryPC gives you the ability to block computer usage completely during the hours you specify for each day of the week. Included is the ability to specify a total weekly allowance of computer usage which, when reached, will block access until restored by you, or when the next week begins. Maximum time limits can be set for each day as well. [screenshot]
  • Temporary Full Access
    If you need to grant a user full access to their user account without any filtering and time restrictions limiting their usage you can quickly grant them temporary full access.

back to top

    Content Filtering Features

SentryPC has a very powerful, extensive filtering engine. You can essentially choose a daily schedule of 'allowable' times for virtually any program on your computer. SentryPC can also filter website visits, intercept important keystroke phrases typed by users (like addresses, phone numbers, names), and restrict chat client usage.
  • Application Filtering
    Filter any application on your computer by having SentryPC block it during specific time frames, or whenever the program is executed. [screenshot]

  • Website Filtering
    Filter specific websites from being visited, or have SentryPC block all website visits - except for those you allow. Filters can be put into effect during specific time schedules, or whenever the website is visited. [screenshot]

  • Chat Filtering
    Block AOL, AIM, AIM Express, AOL Chat, Yahoo, ICQ, MSN, Excite, Trillian, GoogleTalk, Skype, Xfire, Mirc, and Odigo for each user. [screenshot]

  • Keystroke Filtering
    Enter specific words or phrases that cannot be entered by users. For instance, enter your children's name, address, phone number, or credit card number and whenever they are typed the window will be closed instantly. This ensures confidential information cannot be shared with others through email, websites, etc. [screenshot]

  • User Notification
    You have the option to alert the user that they were restricted from doing a filtered activity, when the event arises.

back to top

    Activity Monitoring Features

SentryPC also monitors and records important information for all users of the computer. You will have easy to read reports of all keystrokes, windows opened, applications used, websites visited, and all chat conversations. Each includes the time, date, and duration as well. This is imperative for preventing harmful and/or unauthorized use of the computer and Internet.
  • Keystroke Logging
    Record every single keystroke typed by users - logged by the application they were typed in, and when. [screenshot]

  • Events Timeline Logging
    Log all events users performed and view them in an organized chronically ordered listing. The Events Timeline lets you view what the events the user performed, in the order they did them. Events logged include Program Starts/Stops, Website Visits, Filtering Events, Window Viewings, and more. [screenshot]

  • Application Usage Logging
    Log every application a user runs, as well as how long they actually interact with each application so you can determine if a user is actually using a program they have open, or if it is just running in the background. [screenshot]

  • Chat Conversation Logging
    Log all AOL, AIM, ICQ, Yahoo, and MSN Messenger chat conversations made by users of your computer. [screenshot]

  • Website Visit Logging
    Log all website visits and online searches performed by the popular browsers used today. All website visits are logged by website address, username, and duration of the site visit. SentryPC also logs how long users visit each website so you can easily see what websites are visited the longest. SentryPC supports the latest versions of the following browsers: Internet Explorer, Netscape, Opera, Mozilla, Firefox, and America Online. [screenshot]

  • Windows Logging
    Log the title of each window users interact with while using your computer. Application paths are logged with the window as well. [screenshot]

  • Screenshot Capturing
    SentryPC can take snapshots of your desktop at set intervals of time, allowing you to visually see what is happening. The screenshot capture manager also has a built in Slideshow viewer for easy viewing. [screenshot]

  • E-Mail Log Delivery
    Have recorded activity logs emailed to your email address, along with a current desktop screenshot. [screenshot]
    Guaranteed log delivery when combined with our Stealth Email Service!

back to top

    Security Features

Security options are also included with SentryPC. Choose to disable SentryPC's system tray icon, or notify users they are being restricted. YOU are the only one with access to the main program, settings, and logs. It cannot be shutdown or tampered with in any way shape or form by others. SentryPC also includes a large number of Windows security restrictions.
  • Optional Stealth Mode
    If desired, you can set SentryPC to run in a totally invisible fashion - it will not appear to the user in any way.

  • Log File Encryption
    All SentryPC activity logs can be encrypted for additional protection.

  • Hide from Taskbar
    Choose whether or not t-o show SentryPC in the Windows taskbar.

  • Optional Startup Message
    Choose whether to notify users that they are being controlled by SentryPC at startup.

  • Password Protected
    SentryPC is password protected so only the owner can access settings, logs, and more.

  • Windows Security Restrictions
    SentryPC can be configured for each user to disable the Windows desktop, mouse movement, start menu, taskbar, control panels, and much more. [screenshot]

back to top

    Easy to Use!

SentryPC was made with ease of use in mind. Our simple layout and interface will make using the program a snap for even novice users. Included is full support both online and offline.

  • Intuitive Interface
    Easy to use, graphical user interface, with an easy access icon and menu system that allows you to quickly, and efficiently create and configure filtering and time management rules. [screenshot]

  • Easy-to-Read Settings and Activity Reports
    SentryPC has a large set of reports at your disposal. SentryPC's report generator can create Top 10 reports, log-specific reports, settings summaries, and overall usage summaries for viewing and printing. [screenshot]

  • Log Cross-Referencing
    SentryPC's built-in cross-referencing features can link together relevant log data for easy and efficient log browsing. [screenshot]

  • Log Searching
    Quickly search all activity logs for specific keywords that may be contained in SentryPC's logs. [screenshot]

  • Configuration Wizard
    Quickly setup SentryPC with a guided installation wizard.

back to top

    System Requirements
  • Windows 200x, XP, or Vista
  • 2MB Hard disk space


System Requirements

SentryPC FAQ

SentryPC's Awards

SentryNet Service

Choosing Software...

Parental Control

Computer Security

Prevent Unwanted Use

"Love your product. Wanted you to know that I tried 6 different software packages for my home PC and yours is absolutely the best. I have already recommended it to 3 other people who were looking for such a product. The interface is amazingly easy and intuitive, the data which is captured far exceeded my expectations and is extremely easy to retrieve."

User Testimonials

Why Spytech?

AffiliatesSoftwareBuy NowAbout UsNewsContactHelp
©Spytech Software and Design, Inc. 1998-2008 Computer Spy Software