Ascendant NFM
|
Worried about how your PC is being used? Want to keep tabs on your children, spouse, employees? Need to prevent your children or employee from some application or web sites? The computer and network activity monitor is the full solution for you. There is a popular and excellent computer and network activity monitor utility. That is Ascendant NFM which was published by Ascendant Security. With computer and network activity monitor we can get relational information about what had happened on our computer and lan. Below is the detailed introduction of this computer and network activity monitoring tool.
Ascendant NFM (Network File Monitor) is a powerful and easy to use network activity monitor. Ascendant NFM enables network administrators to centrally monitor and record file actions that occurs on our network, including file modifications, deletions, and additions of new files. Every action is recorded along with the exact time and the user that performed the action. Furthermore, Ascendant NFM can automatically archive copies of specified files whenever they are modified, and alert us via email of the changes. In addition to file changes, Ascendant NFM can also keep a log of all websites and programs that were accessed on the monitored machines.
The key functions and features of Ascendant NFM include:
1. Network file monitoring and logging - Ascendant NFM can log every file action on our network. Every file that is opened, created, modified, or deleted by users will be logged. The full file path along with the user that performed the action and at the time the action occurred is logged. NFM can show us if sensitive files are being modified, and it can show us everything a user downloads when they think no one is watching.
2. Application usage monitoring - Ascendant NFM can log and show us a list of applications each user on our network uses. Each application log includes the name of the user that executed the program, and when they executed it. If our network users are playing games, running chat software, browsing the web, or running legitimate productivity applications we will know. With a single click we can view all applications a selected computer has used (sorted by user), or all applications used on our entire network.
3. Website activity usage monitoring - Ascendant NFM can log every single website event that occurs on our network. Ascendant NFM can log and show us every website users visit with Internet Explorer or Firefox, allowing us to rest easy knowing exactly where our users are going. Website logs can be viewed by computer, or for the entire network in a single click. The website logs will show us what websites were visited by each user on our network computers.
4. File archiving and backup - Ascendant NFM can watch over all file events and selectively archive files that we specify to a secure location. Ascendant NFM can archive files by specific names (such as payroll-records.db), by file extensions (such as .htm or .doc), and even directory paths (such as Temporary Internet Data). Ascendant NFM can be set to retain the most recent modified copy of each file filter we specify, or it can retain every copy that is made, ensuring data is not lost, and tracks are not covered.
5. File alert notifications ¨CActing as a data watchdog, Ascendant NFM can passively watch every file event users perform on our network. When a specified file is modified or deleted we can receive an email alert instantly detailing the event that occurred so we can take action. We can specify file alerts by specific file names, file extensions, or directory names.
6. Comprehensive reporting tools - Ascendant NFM comprehensive reporting tools can generate a handful of unique reports that allow us to easily assess our network data situation without having to pour through thousands of log entries. Reports that Ascendant NFM can generate are: Complete file usage for selected computers, or all network computers; Top files used on selected computers, or all network computers; most active users that are modifying files on our network; most active computers that are modifying files on our network.
7. Centralized log viewing and management - Ascendant NFM has a built-in log viewer that allows us to view and manage all file usage logs from our network in one location. Ascendant NFM logging capabilities can produce a large amount of data. Once we are done viewing logs, we can use the log archive feature to save logs to a safe place while clearing out our current log-set to make log browsing a more manageable task. All logs - including generated log search results for keywords, dates, users, etc. - can be saved with a click of our mouse for future reference.
8. Activity log email delivery - Ascendant NFM has the ability to gather up all file usage logs for all network computers and send them to us via email at at time interval we set. All logs are formatted for easy viewing in HTML format. If we are away from the Ascendant NFM console for an extended period of time we can have Ascendant NFM clear all activity logs every time it sends us a batch of logs.
9. No client installation needed, undetectable - Ascendant NFM is unique in that it requires no software installation on any of the computers we wish to monitor - only a username and password for the computer. The only software that is necessary is the main Ascendant NFM program that gets installed on the computer we want to monitor our network from. This means that we can have Ascendant NFM set up and monitoring our network in minutes - as opposed to having to do a complete roll-out to every workstation, along with applying configurations for each one. Ascendant NFM monitoring is totally undetectable by users.
10. Easy to use and manage - Ascendant NFM is built with ease-of-use in mind. It is intuitive user interface effectively ties all of its powerful features together, creating a tool that does not require a ¡°learning curve¡± to get used to. Ascendant NFM sleek user interface is very easy to navigate and use. All relevant features can be accessed from a list of options. Computers can be added to the monitoring list using the built-in wizards, and can be then edited later on using the same wizards.
11. Ascendant NFM has a handful of features not listed above, but are just as useful and important for users, they are:
12. Settings importing/exporting - If we need to transfer the Ascendant NFM software to another computer we can quickly export all settings for all computers on our network for easy importing to the Ascendant NFM software installed on another computer.
13. Password protected monitoring - Ascendant NFM monitoring process can be password protected so users that have access to our computer cannot stop its monitoring.
14. Performance adjustments, debug mode, customized log storage - Ascendant NFM has a handful of advanced options that let us increase Ascendant NFM performance on slower computers, enable a debug mode for addressing connectivity issues, and even specify a log storage location for all of the Ascendant NFM logs.
In a word, for people who need to prevent their children or employee from some application or web sites, Ascendant NFM is a great choice because it makes monitors networked machines quite simple. Either way, it is a great choice.
Ascendant NFM (Network File Monitor) enables network administrators to centrally monitor and record file actions that occurs on your network, including file modifications, deletions, and additions of new files. Every action is recorded along with the exact time and the user that performed the action. Furthermore, the program can automatically archive copies of specified files whenever they are modified, and alert you via email of the changes. In addition to file changes, Ascendant NFM can also keep a log of all websites and programs that were accessed on the monitored machines. Other features include HTML reports, network enumeration and more. No client installations required to monitor a workstation.
The license of this software is Free Trial Software, the price is $69.95, you can free download and get a free trial.