Frequently asked Questions about the program InspectSystem

General:

Service is used by the executives to control the work of employees at computers and analyzing. Helps to control the work remote employees and to identify idle workers. Using the program, you protect the business processes, define quality of work the staff, improve work performance.

1.Create an account Company – Sign Up.
2.Download the software from your personal account.
3.To install it on your own the employees’ computers.
Enjoy the show via any browser: Chrome Firefox, Internet Explorer and others.

No cost, free use of the service is 14 days. Don’t waste money on purchasing and maintaining a server. Save time and resources of your company, Start Right Now.

Limitations on the number of monitored employees are absent. Computers must be connected to the Internet. the
Quotas on disk space is disabled. Data is stored 1 year.

Service provides the software to rent for a certain term of a subscription – 1, 3, 6 and 12 months.

Yes, use your own Server to install InspectSystem inside company. the
The differences of cloud and on-premises solutions are described in more detail in “Cloud vs. Local server”.

“Program” – the application (setup.exe), installed on a computer the employee considers his work activities.

“Service” – web-server data, which receives information about the work of the staff. Service functions as storage, processing, data management and remote application settings. Service is controlled via any internet browser.

It happens that employees, effectively hiding idleness and pretend working activity, they do not have time and fuss. Often they are wrong prioritize and distract on extraneous things. Such employees need to fix and check.

Technical:

To download the program it is necessary to be the registered user. Go to “Private office”, “Installation” tab. Press “Download”.

If you use Google Chrome, the browser by mistake considers “setup.exe” application dangerous and even harmful as the program has no signed certificate, the browser does not trust to this application and tries to block its downloading. Chrome can give such message:
or in the left bottom corner such note:

Press “Save” to download file.
Other browsers (Firefox, Opera, Internet Explorer, YaBrowser) allow to execute file downloading.

The program is installed on the computers working under control of the Windows operating system. Windows 2000/XP/Vista/Win7/8/10 operating systems are supported. There are no technical restrictions for the using an equipment.

Yes, at the program installation the information on a full name of the employee and department is taken from Active Directory and is automatically added to service.

Download and save setup.exe on the replaceable USB device (for example, “flash drive”). Disconnect and connect it to the computer of employee. Proceed with installation. Examine stages of installation and follow instructions of the program.

1. Start installing the program. Press the right button of the mouse on the file of the program (setup.exe) and select “Open”.

2. At master of installation press “Next” to start installation.

3. Before installation it is suggested to examine service term of use. Accept conditions of license agreement and press “Next”.
4. Select the folder to install the program.
By default the program installs to the C:\Program Files\Windows Cap\ folder. By pressing “Browse” button, you can select another folder and space for installation. To continuation press “Next”.

5. Additional program settings.
If at your company to work with a network, the proxy server is used, show it by pressing “Proxy” button. To exclude from monitoring user, for example, you do not need to observe “Administrator” account, press “Users” button.
After all settings press “Next” to continue.

6. All is ready to start installation process, press “Install”.

7. The result of installation is displayed, to complete press the button “Finish”.

The program was successfully installed on the computer of employee.
Now you can disconnect “flash drive” and check your on the computer or laptop how data of the employee is displayed in the system. To do so, log in into the system https://adm.inspectsystem.com using your login and the password.

Download and save setup.exe on the replaceable USB device (for example, “flash drive”). Disconnect and connect it to the computer of employee. Proceed with installation. Examine stages of installation and follow instructions of the program.

1. Run the installation with administrator rights.
Right-click on the program file (setup.exe) and select “Run as administrator”

If the computer is turned on UAC, you will see the notification, clicking “Yes” to continue installation.

2. At master of installation press “Next” to start installation.

3. Before installation it is suggested to examine service term of use. Accept conditions of license agreement and press “Next”.

4. Select the folder to install the program.
By default the program installs to the C:\Program Files\Windows Cap\ folder. By pressing “Browse” button, you can select another folder and space for installation. To continuation press “Next”.

5. Additional program settings.
If at your company to work with a network, the proxy server is used, show it by pressing “Proxy” button. To exclude from monitoring user, for example, you do not need to observe “Administrator” account, press “Users” button.
After all settings press “Next” to continue.

6. All is ready to start installation process, press “Install”.

7. The result of installation is displayed, to complete press the button “Finish”.

The program was successfully installed on the computer of employee.
Now you can disconnect “flash drive” and check your on the computer or laptop how data of the employee is displayed in the system. To do so, log in into the system https://adm.inspectsystem.com using your login and the password.

To customize work of the program via proxy server, in the course of installation (at the stage of ?Configuration?) indicate parameters of proxy server. If the program was already installed, repeat installation again.

Press the button ?Proxy?.

Indicate IP address of the server and port in the “Settings URL” window. If authorization is used, indicate login and the password. To check whether the password is correct, press ?Check connection?..

If parameters of proxy service are indicated correctly, the window “Connection established” is displayed.

After successful test, continue installation of the program until pressing “Finish”.

If there are some accounts (logins) on the computer, for example, the Administrator and the User, and it is not necessary to observe the Administrator account, take an opportunity to exclude it from monitoring.

In the installation process, at ?Configuration? sage, press the button ?Users?.

Add to the list those accounts that do NOT have to be observed.

Press “Add” and insert login using semicolon (option A) or indicate user from the list (option B), press “In addition”. OPTION “A” – Input users manually.

OPTION “B” – Select user from the list. Press “In addition”.

Press “Find” in “Choose:Users” window to output the list of all local users on the computer, indicate the “Administrator” account (or those that do not have to be observed) and press “ОК”.

To choose several users simultaneously, select them from the list while pressing the button “Shift”.

To continue press “OK”.

After adding all exceptions, continue program installation.

Press “Next” and proceed installation until the end, following instructions on installation, after installation is completed, press “Finish”.

Yes, you can use service on Terminal Windows Server, no matter what version, Basic or Full, you have chosen.
For example, Your employees work with Linux operating system but connect to Terminal Server and conduct the main work there. By installing the program on Server, you can control the work of all connected to it users. You will get information on user?s time connection, duration of work on server (using Basic version) and screenshots (using Full version). In terminal mode 1 license corresponds to 1 server account.

In order to protect the program from deletion, it is not in the list of installed programs and it can not be deleted through the Control Panel Remove program option.

To remove the program from the computer, use the setup file (setup.exe).

  1. Run setup.exe as an Administaror.
  2. Select Uninstall option and press Next.
  3. Confirm removing by pressing Uninstall.
  4. Press Finish to exit the setup program

Licensing:

1 license corresponds to 1 personal computer (PC).

Example 1: Your PC is used for several people with the free schedule, each one in its own time. You control work of these employees using 1 license.

Example 2: You have employed new employee and provide hime with the computer one which the program of report is already installed, in this case you do not need to buy new license. You set up new account for this employee on the computer, and once employee uses the, it is automatically adds him to the system. You do not need anything in addition to be installed.

Yes. After the subscription term is terminated, account is not removed from the server but is transferred into to the waiting mode. Data on employee activity is not transferred into this mode. When you will require to check work of the employee, you do not need to register in service again, it is enough to place an order to continue.

Example 1. You have not used service for several months and you have new employees whose work should be controlled. To continue you need to place an order on the website or directly from the private office, make a payment and continue working with not additional registrations.

Example 2.If you want to continue using service on the computers that already have the program, you do not need to install the program again.

Security:

The program saves information about the used working time for the PC: when you began and ended work, downtime, time spent active on the computer. The program takes screenshots at regular intervals.

The program does not store information about the following:
– what is typed on the keyboard;
– what e-mail messages sends and receives;
– what is the correspondence in Skype, ICQ and other chat programs;
– what passwords type on the computer, does not collect or keep them;
– what information the employee is looking for in the search engines;
– what are the documents works.

Practical:

Yes, we can assist in the installation of a specialist, also remotely. It’s Free

Sign up. Download software to a USB “flash drive”. Install it on the computers of employees. Next, analyze the work. It takes less than 10 minutes.

Yes, we can. Create for them a separate access, using built-in Roles: The Head and HR.

Yes. Register with the service and select “Basic version”.

Yes, it can be done in System Settings.

Yes, you can. You have to install the program on these computers, whether remotely or entrust someone from the working personnel.

No, it does not. Moreover, if network architecture will change, for example, IP addresses on computers of employees, it will not have any effect on functionality of system. The most important for new office to have an Internet.

Temporary absence of the Internet does not influence service operation as the program supports work in the mode offline. When the Internet is disconnected, the program stores data and when network is reconnected it synchronizes it. Thus all data of work will be available in the system. If you experience frequent internet interruptions, of course, it is better to find a stable provider.

Do check again what time zone is indicated on the employee’s computer.

The system uses formula to estimate salary: The Rate multiplied on Working activity. The rate is established individually in settings of each employee, after installing the client application on the computer. Working activity is time of active work at the computer without idle times. There is an opportunity to choose currency of the system: RUB, UAH, USD, EURO.

In this case indicators of working time and salary report will be gathered in offline mode. This data is automatically synchronized once employee is connected to the Internet.