Recording Software

SpectorSoft Logo


Spector 360's computer recording software incorporates SpectorSoft's award-winning PC monitoring technology that automatically records everything including:

  • Emails sent and received
  • Chat and instant messaging
  • Web surfing and Internet activity
  • Keystrokes typed
  • Programs executed
  • Files transferred/printed/saved, and more!
All this is performed silently, without the employees being aware they are being monitored.
The Spector 360 Recorder contains a series of powerful recording tools:

All of these tools record simultaneously, undetected by triple level security. The Recorder is highly configurable and can be customized to record only those events of interest.

In addition to monitoring and recording, Spector 360's recording software has an advanced Keyword Detection and Reporting system that will instantly notify you when a PC user being monitored has strayed from acceptable use of the PC or Internet.

Email Recorder

Email Recorder

Spector 360's recording software will stamp out abuse with cutting-edge email recording capabilities designed to ensure that you have a clear record of all email being sent and received from company premises. In addition to recording business standard MS Exchange and Outlook email, Spector 360's recording software includes industry-first web mail capturing. This includes web mail services such as Hotmail, Yahoo Mail and AOL Internet Email.

Whenever an email is sent or received, Spector 360's recording software creates a hidden duplicate (including file attachments) and stores it away for later review. Spector 360's recording software also keeps a copy of deleted email.

Recorded email attachments can be securely transferred to the Data Vault using data encryption.

If you want to limit the amount of email recorded, this tool has a filtering capability so emails can be captured when they are sent or received or if there is a particular pattern detected in the To/From/Subject/Body. Other controls allow you to filter email based on the format used or if attachments are detected. In addition, there are granular settings to filter based on attachment characteristics such as size. If you only want to capture email from a specific source you can filter the emails received from designated account types such as MS Outlook, Hotmail, AOL, MS Exchange, or IMAP.

Email Recorder Features:

  • IMAP
  • Web
  • Exchange/MAPI
  • Exchange scan only inbox folder for pre-existing new emails
  • AOL Email
  • Check for Duplicate Emails
  • Scan Email for Keywords
  • Capture Attachments

Back to top

Return to Computer Monitoring Software

Web Site Recorder

Web Site Recorder

The Web Site Recording tool in Spector 360's recording software will continually monitor every web page that is accessed by the computers on your network and save a record of those URLs and domain names.

Spector 360's recording software will also track every file and program download that occurs over the Internet (such as file/music swapping services, software download sites, pornographic images, etc. …)

Spector 360 is significantly more sophisticated than the History feature of your web browser, providing you with important details including: Time of Last Visit, Duration of Time on the Web Site, Active Time on Web Site, Total Number of Visits to the Web Site, Page Title and more!

Additionally, you can use the Spector 360 Control Center to create a Whitelist of web sites that your employees are permitted to view. Any web site not included in this list will be blocked. Alternately, you can create a Blacklist of web sites that they are not allowed to visit. If the web site is not included in this list, they will be able to access it. These policies can be customized for different employees.

With Spector 360’s advanced and intuitive Web Site recording, you will get a quick yet exact picture of each employee’s web surfing behavior, which is also used by the Dashboard to formulate trend data across your organization.

Web Site Recorder Features:

  • Scan Web Site Addresses for Keywords
  • Scan Web Site Pages for Keywords
  • Capture Mozilla Browsers (i.e. Firefox)
  • Capture AOL Security Edition

Back to top

Return to Computer Monitoring Software

Online Search Recorder

Online Search Recorder

Spector 360's recording software records online searches from any web site where known search techniques are used. Spector 360 looks for standard searching techniques, captures the search phrase entered by the employee, the search results URL, and other information. Using the Dashboard, you can tell whether the employee actually accessed the web site as a result of an online search. Use the information to understand why an employee is at a web site. For example, find out whether an employee is searching a job web site for professional growth information or to find a new job.

Online Search Engines Captured:

  • and more...

Back to top

Return to Computer Monitoring Software

Chat/Instant Message Recorder

Chat/Instant Message Recorder

Spector 360's recording software ensures that all Chat and Instant Messages are automatically recorded to provide you with an information trail of every computer-based conversation that is taking place within your company or with your customers. Spector 360 records the name of all parties involved in a Chat/IM session and saves a complete copy of the conversation. This information is recorded for AOL, MSN, ICQ, and various other Chat/IM programs.

Chat/Instant Messaging Recorder Features:

  • Scan Chat and Instant Messages for Keywords
  • IRC Capture
  • MSN Capture
  • AIM/ICQ Capture
  • AOL Capture
  • Yahoo Capture
  • XMPP Capture
  • Capture Web IMs
  • Capture OSCAR80
  • Capture MSN Exchange

Back to top

Return to Computer Monitoring Software

Keystroke Recorder

Keystrokes Recorder

Spector 360 includes a sophisticated keystroke logger that saves keystrokes by application, date and time.

With Spector 360's recording software you will know what was typed, where and when it was typed, and you will also know WHO typed it because Spector 360 keeps a record of who is logged into the computer.

The Spector 360 Keystroke Recording tool will document every key typed on the PC keyboard. Spector 360 not only captures standard alphanumeric keystrokes, but also records "hidden" characters and keystroke combinations, such as the Shift and Ctrl key, as well as those keystrokes that aren’t typically displayed on the screen such as when a password is typed echoing back asterisks on the screen.

Keystroke Recorder Features:

  • Scan Keystrokes for Keywords
  • Capture Character Information

Back to top

Return to Computer Monitoring Software

Program Activity Recorder

Programs Recorder

Spector 360's recording software includes a monitoring tool that provides a clear and concise overview of the programs being used on your office PCs. Spector 360 will track the day and time a program is launched and the total duration of activity in that program. Program specific information is also recorded including the window title.

Program Activity Recorder Features:

  • Set Inactivity Timeouts

Back to top

Return to Computer Monitoring Software

Network Activity Recorder

Network Activity Recorder

Spector 360's recording software records information about all Internet connections made on a computer. You will be able to see at a glance which applications are connecting to the Internet, when the connections are made, the Internet address they connected to, what ports are being used, and the amount of network bandwidth consumed by those connections.

This Internet connection activity can provide valuable insight into:

  • Which employees may be violating company policy by consuming network bandwidth with streaming media, file downloads, or other Internet activity
  • Applications connecting to the Internet which you may not have been aware of and which could have security implications
  • Which Internet resources are most often connected to

Armed with this information you may decide to block access to TCP ports or Internet domains, remove offending applications from computers, or tighten your company’s Acceptable Use Policy (AUP).

Network Activity Recorder Features:

  • Include/Exclude specific programs
  • Include/Exclude specific IP addresses and ports

Back to top

Return to Computer Monitoring Software

File Transfer Recorder

File Transfer Recorder

There are multiple serious security concerns for businesses when employees use company computers to download files from the Internet, transfer files across the Internet and access peer-to-peer services which are loaded with pornographic images, Spyware, Adware, and pirated music, video and software.

One major concern is whether employees are sending company confidential information over the Internet.

Another concern is whether employees are placing the company at legal risk by downloading copyrighted materials, like music, movies and commercial software. In addition, there is potential risk when an employee downloads pornographic images that will reside on company computers and may be viewed by another employee who would consider such material highly offensive.

Finally, any time a file is downloaded, there is great risk that Spyware and/or Adware will be installed, especially where P2P services are involved. (Dell Computer Corporation has identified Spyware as its single biggest source of technical support incidents, because Spyware will redirect web browsers and eventually slow computers down to a crawl, not to mention the potential for security breaches. Most Spyware enters into computers via downloads from the Internet.)

Spector 360's recording software records Files Transferred over the Internet by keeping track of HTTP, FTP and P2P file transfers. You will be able to see who is downloading or uploading files, what file protocol is being used, which service is being used, the name of the file being transferred and the type of file being transferred (audio, image, video, software, document).

File Transfers Recorder Features:

  • Capture HTTP Uploads

Back to top

Return to Computer Monitoring Software

Document Tracking Recorder

Document Tracking Recorder

Intellectual Property Theft and the leaking of Company Confidential information has become an increasing security threat for companies in recent years as technology has made it relatively easy for employees to copy files to floppy disks, Zip disks, CDs, DVDs, USB drives, Memory sticks or to simply print out these documents and transport them off company premises.

Spector 360's recording software includes a Document Tracking feature which allows you to determine whether files/documents may be exiting your company via removable media such as floppy, zip, CD, DVD or USB storage devices and memory sticks. The Document Tracking feature also allows you to track documents that are printed and who is copying or printing potentially sensitive files or documents.

Document Tracking Recorder Features:

  • Trigger tracking when creating a new file
  • Trigger tracking when writing to an existing file
  • Trigger tracking when deleting a file
  • Trigger tracking when renaming a file
  • Trigger tracking when destination is the CD ROM
  • Trigger tracking when destination is the local drive
  • Trigger tracking when destination is a Network drive
  • Trigger tracking when destination is removable media
  • Trigger tracking when destination is other
  • File name filter support
  • Track Printed Documents
  • Track WinXP CD/DVD Burning (IMAPI)

Back to top

Return to Computer Monitoring Software

Snapshot Recorder

Screen Snapshots Recorder

Imagine surveillance cameras pointed directly at every PC on your company network, filming all Internet and general PC activity, and storing this in a secure area for later review. That is the idea behind the Snapshot Recorder tool in Spector 360.

Spector 360's recording software takes hundreds of screen capture snapshots every hour on each networked PC, very much like a surveillance camera. Snapshots are taken of whatever is on the computer screen at the frequency you choose – as often as once per second.

That means you get detailed visual recordings of all chat conversations, instant messages, emails typed and read, all web sites visited, all programs run, all keystrokes typed – all activity on all computers.

Snapshot Recording is the most powerful way to visually record and review everything they do online and offline.

Snapshot Recorder Features:

  • Capture Secondary Monitors
  • Set Snapshot Capture Format
  • Set Snapshot Frequency
  • Set Inactivity Timeout

Back to top

Return to Computer Monitoring Software

User Activity/Inactivity Recorder

User Activity Recorder

This Spector 360 Recorder collects information on the activity and inactivity of the employee. Events such as when they log in, when they use the mouse and keyboard, and when they are not active on the computer are all recorded. Events that could potentially skew this information are also recorded such as an explicit clock change.

User Activity/Inactivity Recorder Features:

  • Time Sheet format
  • User and Daily Time Sheets
  • Indicator for Logged In and Active
  • Indicator for Logged In and Inactive
  • Indicator for Clock Change
  • Indicator for Interrupted Recording

Back to top

Return to Computer Monitoring Software

Keyword Detection & Reporting

Keyword Detection & Reporting allows you to specify words or phrases that might signal an immediate threat to the safety and integrity of your network systems, intellectual property, employees or customers. Keywords can also be used to indicate when an employee might be involved in an activity that is not condoned by your company or is in direct violation of an Acceptable Use Policy (AUP).

Create a list of "on alert" words or phrases and Spector 360 will continually monitor keyboard typing, URLs, incoming and outgoing emails, chat conversations and instant messages for these terms.

When a keyword or phrase is detected, Spector 360's recording software immediately jumps into overdrive. Snapshot frequency is automatically increased to ensure that every detail of the offender’s actions is captured as evidence. Additionally, Spector 360 collects information regarding the offense and sends an instant keyword alert via email to the specified IT administrator or appropriate compliance manager.

Each keyword alert contains the following information:

  • The keyword that was detected
  • The time the keyword was detected
  • The current user logged in to Windows
  • Additional detailed information

Spector 360's recording software also reports on the top keyword alerts issued and the top employees violating the keyword alert policy.

Keyword Detection & Reporting Features:

  • Import Keywords
  • Export Keywords
  • Set Keyword Alert Action (i.e.: Email)
  • Set regularity of Alert Action
  • Set Email Server Type (Direct SMTP, Relay SMTP, Exchange Folder)
  • Capture Snapshots on Alert with interval and duration settings

Additional Features:

Stealth Mode

The Spector 360 Recorder can be placed into Stealth Mode, ensuring that the program cannot be detected by unauthorized users. Once in Stealth Mode, Spector 360 will not appear in an employee's System Tray, Task Manager or in the Add/Remove Program Menu.
Spector 360's recording software Client Configuration Options and Parameters
The Recorder is responsible for logging all activities and screen capture snapshots from the monitored computer and relaying that information to the Data Vault. The Recorder is highly configurable and can be fine tuned for each deployment. Typically the Recorder is configured and then deployed by the Spector 360 Control Center. Please visit the Architecture Section for additional information on all of the Spector 360 software components.

Additional Options and Parameters:

Set Recording Parameters:
  • Set specific recording times
  • Set users to record on this computer
  • Set programs to record on this computer
  • Set Inactivity Timeout
  • Set Record Hotkey sequence
  • Set Snapshot Hotkey sequence


  • Set password
  • Set Hotkey sequence
  • Enable stealth mode
  • Include viewer with client installation
  • Remove references from Internet Explorer
  • Allow Limited Users UI Access
  • Enable Automatic Error Transmissions
  • Enable Spector when Windows starts
  • Enable Browser Extensions
  • Enable Logon Warning
  • Set Warning Text
  • Enable logging with detail level
  • Use Enhanced Security
  • Set File Security (None, Block, Stealth)
  • Set Network Initialization Delay
  • Set Service Monitoring Credentials
  • Set Data Files Folder (Random or Explicit)
  • Set file extension
  • Set password
  • Delete snapshot data files after days
  • Set maximum snapshot data file size
  • Delete other data files after days
  • Set maximum other file data size

Block Internet Access:

  • Block All Internet Access
  • Block Web Sites via HTTP/HTTPS
  • Block SMTP/POP Email
  • Block File Transfer via FTP
  • Block AOL and HTTP/HTTPS
  • Block AOL Instant Messenger (AIM)
  • Block ICQ
  • Block ICQ Lite
  • Block MSN Messenger
  • Block Trillian
  • Block Windows Messenger
  • Block XMPP (Jabber)
  • Block Yahoo Messenger
  • Block Other Chat/IM and HTTP/HTTPS
  • Block Kazaa
  • Block Kazaa Lite
  • Block specific Outgoing ports
  • Block specific Incoming ports
  • Block specific Web sites (Blacklisting)
  • Allow access to specific web sites (Whitelisting)
  • Import Web Site Access List
  • Export Web Site Access List
  • Block during schedule times
  • Block specific users

Server Communication:

  • Set Primary Server IP address and port
  • Set Data Vault IP address and port
  • Set send interval
  • Set max send period
  • Set client port

Back to top

Return to Computer Monitoring Software

Request for Spector 360 Product:   Information  or  Demonstration

- - - - - - - - - - - - - - - -

Return from Recording Software to:

Home Page
   or   Employee Monitoring