We are glad to present you with a new version of Watchman, an advanced monitoring tool for all kinds of users. Watchman monitors user activity, restricts access to programs, keeps an eye on your files and more. Version 8 of this award-winning program introduces two major new features: advanced user monitoring and reporting tools. Featuring a simple interface, Watchman allows you to restrict and monitor computers easily. In addition, advanced users can also view, print and export detailed reports of user activity. Install and forget about it! Watchman runs silently in the background, keeping your system safe from unauthorized eyes at all times. Watchman also includes a powerful reporting system that sends you an email with crucial data to keep you informed.
Software Usage Control
Stop unwanted applications, windows.
Control program usage using keywords
Warn, notify users
User Activity Monitoring
Keep track of windows opened
Monitor application usage
Monitor entered keys, mouse buttons
View, print, export detailed reports
Lock documents, files
Protect documents from tampering
Drag and drop to lock files
Advanced Task Options
Select commands, like Log Off, Shut Down, Run, Screen Saver, Snapshots...
Select a high priority for persistent resources
Guided tour for non-advanced users
Default profile: Chat Clients
Default profile: Desktop Add-ons, Extras
Default profile: File Sharing, P2P Clients
Default profile: Installing New Programs
Default profile: Internet Browsing
Default profile: My User Profile
Default profile: Program Options
Default profile: System Dialogs
Default profile: System Folders
Default profile: System Games
Default profile: System Internet Tools
Default profile: System Multimedia
Default profile: System Network Access
Default profile: System Settings
Default profile: System Tools
Default profile: Uninstalling Software
Default profile: Watchman Security
Default profile: Windows Updates
Add your own profiles
Receive reports by email
Silent installation available
Export/import data file for deployment, backup.
No network connection required
100% unobtrusive. No system files modified, or registry.
Minimum operating system requirements.