The first in the country to provide monitoring of Skype, to solve the current Skype network calls can not monitor the problem, online agents can not only be divided into a time period of arbitrary blocking, but it can be carried out traffic analysis statistics: more accurate analysis of the BT flow; mail monitoring queries provide HTML display to make the contents clearer To increase the use of MAC spoofing in the network Trojan or similar unsafe software to alarm, make the network more secure; not only the most complete protocol analysis control and detailed query statistics report, but also has Super network alarm function,<< Online agent >> With similar international products whether it is in the software design idea, or the function of the software, interface operability have a very obvious leading edge. Control bt Download, block QQ Chat, limit machine traffic, record MSN outgoing file content, timely flow alarm, block the alarm, record the contents of mail, file upload download content, record chat content.
Software Description:
First, network Graphics monitoring
1, only in a machine installed online agents, the entire network of the running state will be visually presented in front of you;
2, show the flow rate of each machine, the day outgoing and received network packets, bytes and system log number of records, as well as the Internet time, will be graphically visual display;
3, graphical display of the entire network flow rate, and the day the entire network outgoing and received network packets, the number of bytes;
4, graphical display of different protocols network packets, through the diagram can be timely know the network's busy degree.
Ii. Comprehensive Information Analysis
1, record http,smtp,telnet,ftp,pop3,netbios,icmp,qicq,msn,icq,yahoo,uc,pp and so on all correspondence;
2, can press the day, by the hour, according to the minute to see any machine, different protocols of the communication network packets, byte flow and Internet time;
3, you can according to the network communication Service content, divided into different types, and then query statistics by type;
Third, complete content record
1, record MSN outgoing file content;
2, the record Msn,yahoo,icq chat content, QQ chat process;
3, record the content of Web outgoing files, Web download file content;
4, record FTP outgoing file content, ftp download file content;
5, record the Web outgoing mail, SMTP outgoing mail, POP3 received mail, including senders, recipients, CC, Secret Send, Theme, mail content, mail attachments can be fully recorded;
6, record web, FTP, TELNET, SMTP, POP3, NETBIOS, ICMP and so on the Internet log;
Iv. Strong policy control
1, online agents creatively provide a very simple operation of the powerful ' online agents Control Strategy Library ', so that the network control to do whatever it wants;
2, users can increase the type of protocol at will, and then add different network applications under this type, through the server or corresponding TCP and UDP ports to identify or block control;
3, users can be very convenient to automatically generate a large number of control strategies, the operation is very simple and intuitive;
4, the system pre-installed a large number of control strategies, such as the time period to chat (such as QQ,MSN,YAHOO,PP,UC,ICQ, etc.) of the block, on the network games (such as the public, winger, QQ games, etc.), the blocking of BT (such as bitcomet,bittorrent, etc.), To send and receive mail and file upload and download the blocking and content records, and so on;
5, the time division of the Automatic Control and standardization of Internet behavior;
Five, a large number of graphic newspaper
1, the system provides a large number of traffic statistics and statements, such as Chat Day report, you can know how long each machine chat every day, from the graphical report is very intuitive to know when the day in the chat, or even from the hour report to know a few minutes in the chat, very intuitive and accurate;
Six, powerful alarm function
1, each machine can be a minute to different protocols set alarm parameters, the system can be timely online alarm, network management in time to understand the abnormal information;
2, blocked by the pornographic library, traffic restrictions, port blocking, and other other prohibited acts will have the alarm;
Vii. Ultra-strong backup mechanism
1, log compression save, can be very convenient to keep a year or longer data, the entire backup and recovery are in the system management interface to complete;
2, at the same time the log provides a convenient data export function: such as can be exported to text, exported to access library, exported to Excel and exported to sql_server large database;
Eight, multi-language support
1, to provide multi-language support, the system can be simplified, traditional and English between the free switch, the use of more convenient;
2, support remote management control, do not need to control the monitoring machine, only in their own office computer installation management side can do all the operation.
3, across the network segment, across the router, across the three-tier switch, regardless of the middle of what security settings or installed on a single machine What kind of firewall, can be based on the network card mode for all machines completely transparent control, without installing any client;
Original program Download: http://www.newhua.com/soft/42121.htm
Program Patch Download: Http://www.crkcn.com/file_922652/200703/DCTeam_wltg563ent740704crack.rar