WMI Query: Allows querying information from WMI (Windows Management Instrumentation) classes.
Explore: Enables exploration of files and folders on remote disk drives.
Monitor: Active monitoring of ping, memory, disk space, programs, and services with alarm definitions; screens (screenshots) with the ability to interact and save locally.
Usage Graph: Generates daily records of the effective usage time of each computer. Allows tracking the duration a station remained powered on along with total inactivity time. This information is useful to assess whether a computer is being underutilized.
Monitoring: Active monitoring of CPU usage and network traffic on stations, with email notifications for excessive resource usage, enabling proactivity in detecting potential problems.
Key Logger: Captures keyboard events, generating records of all keys pressed.
Local Accounts/Groups: Facilitates the management of local accounts/groups, allowing the creation/deletion of accounts and groups, password definition/modification, transferring accounts between groups, and listing members of specific groups.
VNC: Total and transparent integration with the VNC service. With a single click, you can access and take control of the remote machine.
Local Screen Transmission: Enables transmitting the content of a single window or the entire desktop to one or more computers simultaneously.
Capture Screens: Captures and instantly displays remote screens (screenshots) with updates at defined intervals. This function allows interaction with the remote station through features like clipboard capture/send, mouse and keyboard event transmission.
Auto-Capture: When activated, the remote station autonomously takes a "photo" (screenshot) at predefined intervals. This function remains active even if the remote machine is turned off and back on, until the feature is deactivated.
Session Manager: Facilitates the management of sessions (remote connections) on servers (including Terminal Services) and stations, enabling control and actions such as logging off one or more users, disconnecting users, sending messages, capturing screens from active sessions, and interacting with them.
Domain Users: Displays a complete list of users registered in Active Directory (AD) with key information associated with each user, such as account creation date, last logon date, number of days without logging in, whether the account expires or expired, whether it is blocked or active, last password change date, etc. This feature is extremely useful, especially during audits, as it provides precise information on the current state of user accounts.
User Properties: Allows unlocking accounts, changing passwords, etc., in a simple and fast way, without needing to access the AD server or user management console.
Installed Software: Enables quick verification of whether specific software is installed, requiring only part of the desired software's name.
DB Activity Monitor (MS-SQL Server): Facilitates checking active processes, executed T-SQL commands, process uptime, deadlocks, and terminating processes — all without needing to access the SQL Management Studio.
Wake On LAN: Allows a computer to be powered on via the LAN network or the Internet (the WOL option must be enabled in the BIOS). The functions Shut Down, Restart, Logoff, Lock Console, and Auto-Logon are also available.
Scheduled Auto Shutdown: Schedules the automatic shutdown of any computer. It's also possible to set an inactivity period and send a notification message before the shutdown occurs.
Execute Command: Enables the execution of any command, script, or executable file on the remote machine.
Installed Software: Allows quick verification of whether a specific software is installed, requiring only part of the desired software name.
DB Activity Monitor (MS-SQL Server): Enables checking active processes, executed T-SQL commands, process uptime, deadlocks, and terminating processes—all without needing to access the SQL Management Studio.
Event Viewer: Allows searches within the log system of the remote machine, returning registered events.
Registry Search: Provides capabilities to search, create, modify, and delete Windows registry values, as well as create and delete registry keys. This powerful tool must be used with great caution due to its ability to manipulate the system registry.
Process List: A highly useful feature that consolidates real-time information on active processes (with the ability to terminate one or more processes simultaneously), CPU usage, memory, and network traffic. Additional details include initiated sessions, opened files, network connections, local shares, services, local groups/accounts, and system events.
Windows Services: Allows creation, starting, stopping, removal, status checking, and modifying the startup mode of specific services.
Devices: Enables adjustments like sound volume changes, ejecting/loading CD drives, turning monitors on/off, locking/unlocking keyboards and mice (limited to Windows XP and 2000), enabling/disabling USB storage devices, and defining access types (read and/or write).
Windows/Office Version and Key: Retrieves the operating system version and installation/Office key.
Port Scanner: Performs checks on all remote machine communication ports (TCP or UDP) to identify potential openings that might render the system vulnerable to malicious software attacks.
Password Manager: Store all passwords securely, conveniently, and accessibly for authorized users while ensuring information security.
Subnet Calculator: A utility to calculate subnets, determining the range of IPs (start and end of a network) and the effective number of possible devices with a specified mask.
Notifier: System notifier that allows programming alerts or notifications that users must read and optionally accept.
Print Monitor: Tracks all prints made by users.
Internet Browsing Log: Records all websites visited by users and their respective times, eliminating the need for a proxy to obtain browsing history by using the browser address bar content.
WebCam Viewing/Auto-Capture: Now supports viewing and saving static images (snapshots) from WebCams installed on remote workstations.
Network Traffic Monitoring: Identifies who is consuming network resources easily and quickly.
Ticket Opening/Handling via Email: A HelpDesk system process that simplifies and streamlines technical ticket handling.