

This is completely normal and not an immediate cause for concern if your machine is otherwise running smoothly – the application records every event on your computer, including minor start-up and processing errors that have likely resolved themselves.

Note: When you view the logs in Windows Event Viewer you are likely to see a few event logs of errors that have occurred on your machine. Use Windows Event Viewer to Check Computer Events If you discover events that occurred when you were not using your computer, it could be an indication that your computer was used without your knowledge.

If you are concerned that someone else has been using your computer, Windows includes free tools that you can use to check recent activity on your computer. How Can I Tell if Someone Has Used My Computer? If you would like to try the web console yourself you can get a free trial at /Download The web console is available for anyone with a CurrentWare subscription plan. Start up, shut down, restart, standby, and hibernate computers on-demand or on a set scheduleĬonfigure advanced power policies for mobile computersĪnd provide your end-users with a warning message before their computers shut down You can also schedule activity tracking to stop monitoring employees at designated off-hours times such as breaks.įinally, with enPowerManager you can generate reports on power states and logon/logoff times These reports can be generated on-demand, at a set schedule, or when specific events occur With BrowseReporter you can see reports on employee computer activities including internet activity, bandwidth consumption, and application usage Prevent users from launching specific applications With BrowseControl you can Control internet access based on URLs and content categories You can also block file transfers to USB devices based on file name or extension Get device activity reports on-demand, at a set schedule, or when specific events occur With AccessPatrol you can Restrict a variety of peripherals including USB storage devices, phones, and BluetoothĪdd company-approved peripherals to an Allowed List The policies will be enforced on each managed device that they use, even when they’re disconnected from the network.
