Find the feature and settings documentation below and click to navigate to that page.
To Start Monitoring with NetVizor, click the "Start Monitoring" button - then enter your NetVizor password.
To access the client when it is in stealth mode, press your hotkeycombination - by default the hotkey combination is CONTROL + ALT + SHIFT + M - you will then be prompted for your password. After entering yourpassword you will back at NetVizor's main interface - press "Start Monitoring" to enter back into monitoring mode.
To stop monitoring press "Stop Monitoring" if you arenot in stealth mode.
If you close/exit NetVizor by clicking the "X" on thetop right of the interface NetVizor will NOT resume monitoringand you will have to manually restart NetVizor and click "Start Monitoring" again.
Monitoring Mode - Standard Vs. Blackbox
Configured by clicking on "Activity Logging and Configuration" - "Configure Monitoring Mode," NetVizor can operate in two different monitoring modes - standard / proactive, and blackbox / reactive.
Standard / Proactive
This is the default monitoring mode. In standard mode NetVizor records all user activities and allows you to view them in real time at any time via the NetVizor web interface, or the NetVizor viewer software. Logs are not encrypted (unless configured in the additional Security settings) and can be set to be stored locally, or on a network share. This monitoring mode allows you to view logs as they are created and respond immediately to logged events. Activity alerts operate in real-time.
Blackbox / Reactive
The blackbox monitoring mode records all user activities and stores them locally in an unreadable encrypted format for later viewing, if desired. Logs can only be viewed after being unlocked, and are retained only for a set number of days as configured. This monitoring mode allows you to honor the complete privacy of your network users while still being able to unlock logs for evidence in the event that an unwanted behavior occurs. Alerts are still transmitted in real-time, however, allowing you to react to threats as they occur.