The main functions are as follows:
● Powerful software user management functions:
You can create as many different types of users as you like. Software users are divided into three categories: management, ordinary and restricted. Management users have the highest software management authority and can formulate different time control management strategies for different restricted users without affecting each other.
● Flexible time segmentation control function:
The time segment control function provides a 7 X 24-hour time control table, which can be accurate to half-hour time segments. Administrative users can freely set the daily computer usage time and Internet access time period for designated restricted users. Here, four computer states are provided for users to choose: normal computer use state, Internet prohibited state, computer locked state, and computer shutdown state.
●Comprehensive cumulative time control function:
The cumulative time control function provides three cumulative time control schemes: daily, weekly, and monthly. You can set the total time for using the computer or the total time for surfing the Internet according to your needs. When the set accumulated time is used up, the computer will be in the selected state. There are three computer states for users to choose from: Internet access prohibited state, computer locked state, and computer shutdown state.
● Intimate timing time control function:
You can use this function to forcibly lock the computer for a period of time after using it continuously for a period of time to achieve the purpose of forcing a period of rest to protect the user's eyes and physical health.
● Convenient usage period control function:
You can use this function to control that users can only log in within a specified time. Users will be prohibited from logging in beyond the specified time. There are two control methods, please choose the setting according to your specific requirements.
● Personalized Internet access ban policy settings:
The Internet access ban policy setting combined with the Internet access time management function can allow only specified programs to use the network or only prohibit specified programs from using the network during the specified time. The control is very flexible.
● Detailed log record query function:
Two types of logs, system log and disk log, are provided for users to view and analyze. The system log will record system events such as computer startup, logout, restart, standby, shutdown, total boot time each time, software login/logout, etc. Disk logs allow you to easily understand the file operations of your computer system in detail. The disk log records all related operations such as creation/copy/move/deletion of files (folders), and also records the insertion or removal operations of the disk.
it works
it works
it works