Categories
Planning

How to monitor your system notifications locally and remotely with growl for windows

Mark Wyciślik-Wilson is a software fiend and a fan of the new, shiny, and intriguing. His work has appeared everywhere from TechRadar and BetaNews to Lifehacker UK. Read more.

The Growl notification system is something that will be familiar to Mac users, but it is something that is also available for Windows. It is an incredibly versatile tool that can be used to monitor system and program notifications in a variety of ways, including remotely.

Growl can be used in conjunction with various add-ons to field notifications for web sites, applications and events. There is a range of plugins available that can be used to add support for a number of different applications and utilities.

The notifications that are generated by the programs you use are useful – you can disable any that are not – but Growl gives a way to manage them all from the same place and also establishes a more uniform look for messages.

Growl For Windows

Download a free copy of Growl for Windows, and install the program. Launch the application and allow it through the Windows firewall. Double click the icon in the notification area of the system tray and tick the box labelled ‘Automatically start Growl at login’ so that it will start automatically with Windows.

There are some applications that are supported by Growl straight from the box, but there are other for which a plugin is required. Pay a visit to the application compatibility page to see just which of your programs can make use of Growl.

There are plenty of applications for which Growl can be a great help, and one interesting plugin makes it possible to monitor for new messages in your Gmail inbox. If you have more than one account, different notifications can be configured for each.

Download the Gmail Growl plugin, run through the installation and select the option to launch it when this is done. A notification will appear to the lower right of the desktop when Growl detects the installation.

Double click the system tray icon and enter the login credentials for your Gmail account. Use the Drop down menu to choose which type of mail you’d like to monitor for – you may only want to be notified of important emails, for instance — and then enter a label that should be used as identification in popups.

If you want to check more than one account, or you would like to receive separate notifications for other types of email, click the green button and add another (or the same) account and choose the settings you would like to use.

Moving to the Options tab, you can opt to have the plugin star automatically with Windows and specify how often email should be checked.

The appearance of notifications can be configured in the main Growl for Windows program. Head to the Applications section and select Gmail Growl to the left. Select one of your accounts from the central column, and then to the right use the Display drop down menu to choose how notifications should look.

You can preview how the different styles of notifications look by moving to the Displays tab. There are a few built in options, but more styles can be downloaded by clicking the ‘Find & install additional displays’ link at the bottom of the dialog.

Gmail Growl is just one of the many monitors available for Growl and there are plenty of others that you might want to test out – take a look at System Monitor for instance.

Remote Monitoring

Depending on the monitors you have installed, you may want to view notifications remotely rather than locally. When you are using a computer on the same network as one you have configured with Growl monitoring, you can opt to have the notifications pushed to the second machine.

Make sure you have the app installed and running on both computers and head to the Network section of program. You can enable the option to transfer notifications to another machine, and select which one, here.

But there is also scope for using Growl in conjunction with mobile devices – which is useful if you want to be notified when a lengthy task has completed. When you click the + button to choose a device to forward notifications to, you can select to use Prowl for iOS or Toasty for Windows Phone.

Android users need not feel left out as there are also a couple more options for phones and tablets. Perhaps the most versatile is NMA (Notify My Android).

You’ll also need to download the Windows plugin for NMA but you can then use the Android app to configure which notifications you are interested in receiving.

Experiment with Growl and its plugins and see what you can come up with. There’s great potential in this hugely flexible tool, so share your ideas below.

Windows only: System notification tool Growl for Windows is a slick, customizable, universal alert system for your applications—so you don’t have to be jealous of your Mac friends anymore.

Download of the Day: Growl (Mac)

Mac OS X only: Growl is a freeware notification system for your Mac.

After installing the utility, you’ll have to download plugins to support application-specific notifications—the current set of plugins supports iTunes, Firefox, Microsoft Outlook, Pandora’s AIR application, Visual Studio, and there’s even a command-line utility to send notifications to Growl, which you could launch from your own custom AutoHotkey scripts.

You can customize almost anything about the notifications, including selecting from a number of included skins. Clicking on the tiny monitor in the screenshot will allow you to place the notifications where you want them to appear.

Microsoft Office Professional 2021 Lifetime License

Get smart
Enjoy Microsoft’s suite of essentials with a one-time purchase and installation, as opposed to that fee you’re paying every month.

Growl for Windows is still in beta, so the plugin support isn’t as comprehensive as the Mac version—but the developer provides a full set of programming APIs in addition to the easily-hackable command-line utility, so it shouldn’t be long before more applications are supported or our ubergeeky Lifehacker readers throw some scripts together.

Growl for Windows is a free download, Windows only. For a similar notification utility, check out previously mentioned Snarl . Thanks, Drew!

Snarl Displays Growl-Like Universal Notifications

Windows only: Free application Snarl is a universal notification system for Windows inspired by the

Ever leave your Android phone around the house while doing some work only to find missed calls and text messages? With Android Notifier, your phone’s alerts will pop up on your computer. It’s free and it even supports Growl!

Two-Part Installation

Android Notifier has two components: one is the Notifier app for your computer, and the other is the Remote Notifier app for you Android phone. Both are easy to configure and are absolutely free.

First, hit up the link below and download the appropriate app for your computer. There are versions for Windows, Mac, and Linux – we LOVE Linux support! – and in both 32- and 64-bit versions.

On Mac OS and Linux, the app uses Growl and dbus, respectively. Both are great notification systems so if you don’t have them already, try them out. On Windows 7, the app will work with the system tray alert as well as with Growl for Windows.

After installing the notifier on the computer, make sure it’s running. You may see a Windows Firewall notice, so go ahead and click Allow.

On your Android phone, hop on your home wireless network and grab Remote Notifier from the Android Market (Market Link).

Once installed, it should work by itself!

You can open up the Remote Notifier on your phone and make sure things work by tapping on “Send test notification.”

You should see something pop up on your desktop. Here’s what it looks like in Ubuntu:

Customizing Alerts

You can change which alerts will be seen on your desktop and which won’t. Open up the app on your phone and tap “Events to notify.”

You can check off which alerts you want pushed to your desktop and which ones you don’t. These same options are available on the desktop app by right-clicking the icon in your tray and choosing Preferences.

The beauty of this is that you can allow your phone to push all notifications. You can then run the desktop app on multiple computers, and each computer can have customized notifications and actions. For instance, you can copy the phone number of the caller to your clipboard when that type of alert pops up.

Configuration

There’s a lot more you can configure as well, so let’s look at the Android app. Under Notification Service, you’ll see a few nifty options.

You can manually start or stop the service, allow it start when you turn your phone on, and choose whether or not you’d like to display an icon on your status bar.

Under notification methods, you choose whether to connect to your phone via WiFi, Bluetooth, or both.

You can configure their respective options, too. For example, you can manually enter a target IP address, automatically enable WiFi when Remote Notifier starts, and even force alerts to be sent over your 3G connection instead.

Last, but definitely never least, is Security.

You can choose to encrypt notifications and supply a passphrase. You’ll also need to configure your desktop app to decrypt messages, so be aware of that. Speaking of the desktop app, let’s look at some of those options again:

  • General Options: Here you can configure whether the app should start at boot or not, and you can enable a private mode, too.
  • Notification Reception Methods: You can configure which methods are allowed while communicating with your Android phone. It’s really useful if you use this with multiple computers.
  • Notification Display Methods: If you have Growl for Windows, you can force the app to use that instead.
  • Devices: If you have multiple devices, you can configure which ones your desktop app should work with. You’ll be prompted to send a test notification from the device you’d like to allow.

Android Notifier is pretty easy to set up and works very well on all platforms. You can set up Tasker tasks to automatically start the app and WiFi/Bluetooth when you’re at home, at a specific time of day, or when your phone is in its dock. If you have a DNS alias for your home network, you can even configure port forwarding so that your desktop will get notifications from your cell phone from anywhere, and without being tied down to WiFi or Bluetooth. Now you can receive your phone’s alerts on your computer and you’ll always know when you receive a phone call. Whether or not you want to answer, though, is still up to you.

With so many programs working in the background performing their own tasks, it can be quite difficult sometimes to know what is being written, deleted or modified on your drives. There always appears to be something making changes somewhere. Some operations you might be fully aware of such as file downloading, video encoding, antivirus scans etc, but there might also be something writing to the drive when you don’t really expect or want it to.

Being able to monitor files across the board would work, but isn’t really practical. As it would be a thankless task trying to keep watch over all this activity yourself, having a piece of software to help you find out what files are being created or modified could be a real time saver. Thankfully, there are tools around to help you out and keep watching these areas for you, here’s a selection of 10 free programs to have a look at. All tools were tested in Windows 10 and Windows 7 64-bit.

1. Watch 4 Folder

While performing the task of watching for a number of different actions such as file or folder create, delete, rename or change, Watch 4 Folder can alert you about the change in several different ways. There’s also a few other interesting functions such as watching for a file association change, whether the drive free space has changed and also if a CD/DVD (not USB media) is inserted or ejected.

Trigger alerts can be an ordinary desktop popup window, a custom alert window that appears above the system tray, or executing another program with the changed object optionally supplied as an argument. The events can also be written to an external log file or viewed via the Live Log tab. Press Apply and then Start on the Watch List tab to begin monitoring.

The free version of Watch 4 Folder allows the monitoring of a single folder at a time. The paid version ($4.99) can have up to four folders monitored simultaneously. Watch 4 Folder is portable and compatible with Windows XP up to Windows 10.

2. Disk Pulse

There are five editions of Disk Pulse; four paid and a restricted freeware version. Annoyingly, there is no official information about what those restrictions are. We know from testing, there is a limit of three profiles while email notifications, database logging, and custom actions are disabled. However, file type monitoring, filters, categories, and rules are no longer disabled like they were in older versions.

Disk Pulse will watch file and folder create, modify, rename, and delete changes. Finer controls like name, size, time, and attribute changes are in the profile options. Although there’s only three available profiles, multiple folders to monitor can be added to each. Double click a profile to enter its options. From there you can add multiple rules, exclude folders, and edit the events/main monitor type options.

The Charts option displays a nice bar or pie chart of the changes which can be printed, saved or copied to the clipboard. Save will create a report with several different output formats available. The Wizard button offers some profile presets that are pre-configured for certain scenarios, such as monitoring for image files, newly created files, or Windows system files.

Note: A possible bug we encountered is Disk Pulse will just quit without warning if it has to deal with several thousand events in quick succession, such as when unarchiving or copying. Try to make sure your selected folders won’t have this type of activity during monitoring.

3. TheFolderSpy

This program is able to handle the real time monitoring of multiple folders at once and is a very small portable executable of just over 120KB. TheFolderSpy can watch for creation, deletion, attribute changes, access date, and file size changes. Do note that the downloaded file is a RAR archive so you will need a third party tool such as WinRAR or 7-Zip to extract it. The .NET Framework 3.5 is required for Windows 10 users.

TheFolderSpy has a wildcard option to include certain types of a file although only one can be applied at once. Something that users may find quite useful is a built in email option that can mail you every time an event is triggered. Obviously, this is only suitable for rare events. Any triggered events will show in the main window, optionally a log file, a system tray balloon popup, and a file can be executed including an audio file.

4. Directory Monitor

Although the free version of Directory Monitor is still very capable, it has a huge amount of disabled functions reserved for the paid version. However, unlike Disk Pulse the restrictions are listed on the website. The restrictions include emailing, database options, sound events, printing, inactivity events, snapshots, user event monitoring, running as a service, executing programs in the background, and Growl notifications.

You can quickly add a folder for monitoring by using the text box or the browse button. The disadvantage is only new file events are monitored. To monitor more, either edit the folder or use the Add button which gives the available options when setting up a folder to watch. Then you can add file/folder deletions, modifications, renames, and file access. Multiple folders can be added to the monitor list including network shares.

The folder monitoring options also offer include and exclude wildcard patterns, logging to a text file, and executing a file on an event. Just about everything else there is disabled. If you don’t want the system notifications box appearing every time an event is logged, go to File > Options and turn it off or increase the interval. Directory Monitor has a portable, installer, and Chocolatey version available for download

5. Folder Monitor

Folder Monitor is another portable tool that can monitor file and folder events for creating, changing, renaming, and deleting. It’s only around 300KB in size but has some useful functions to trigger once a change has been detected. Windows 7 users will need .NET Framework 4.5 or above.

Click on the tray icon to open the monitored folder window, right click and choose “Add folder” to browse or “Add path” to paste or type a path in. Multiple folders can be added to the window. Right click on the entry and go to Options where you can choose which events are monitored, execute a command, or add an include/exclude filter using Regex. Each watched folder has its own options.

Other functions are found in the Options in the tray icon context menu. These are global and will affect all monitored folders. From this window, you can change the visual notification to visual (popup window) or balloon, and add a sound notification using a system or custom sound. Folder Monitor also supports a few command line arguments that are found in the About window.

The other remaining 5 file and folder monitoring tools can be found on the next page.

Geoffrey_Carr

Sustav za obavještavanje Growl je nešto što će biti poznato korisnicima Maca, ali to je nešto što je također dostupno za Windows. To je nevjerojatno svestran alat koji se može koristiti za praćenje sustava i programa obavijesti na različite načine, uključujući i na daljinu.

Growl se može koristiti zajedno s raznim dodacima na terenske obavijesti za web stranice, aplikacije i događaje. Postoji niz dodataka koji se mogu koristiti za dodavanje podrške za niz različitih aplikacija i uslužnih programa.

Korisne su obavijesti koje generiraju programi koje upotrebljavate – možete onemogućiti sve one koji nisu – ali Growl daje način da ih sve upravljate s istog mjesta i uspostavlja ujednačeniji izgled poruka.

Growl za Windows

Preuzmite besplatnu kopiju programa Growl za Windows i instalirajte program. Pokrenite aplikaciju i dopustite ga kroz vatrozid sustava Windows. Dvaput kliknite na ikonu u području obavijesti na traci sustava i označite okvir s oznakom “Automatski pokrenuti Growl at login” kako bi se automatski pokrenuo sa sustavom Windows.

Postoje neke aplikacije koje Growl podržava izravno iz okvira, no postoje i drugi za koje je potreban dodatak. Posjetite stranicu kompatibilnosti aplikacije da biste vidjeli koji se od vaših programa može koristiti Growl.

Mnogo je aplikacija za koje Growl može biti odlična pomoć, a jedan zanimljiv dodatak omogućuje praćenje novih poruka u Gmailu. Ako imate više računa, za svaki se mogu konfigurirati različite obavijesti.

Preuzmite dodatak za Growl Gmail, pokrenite instalaciju i odaberite opciju za pokretanje kada to učinite. Obavijest će se pojaviti u donjem desnom kutu radne površine kada Growl otkrije instalaciju.

Dvokliknite ikonu u traci sustava i unesite vjerodajnice za prijavu za Gmail račun. Upotrijebite padajući izbornik da biste odabrali vrstu e-pošte za koju želite pratiti – na primjer, samo biste trebali biti obaviješteni o važnim e-porukama, a zatim unesite oznaku koja bi se trebala koristiti kao identifikacija u skočnim prozorima.

Ako želite provjeriti više računa ili želite primati zasebne obavijesti za druge vrste e-pošte, kliknite zeleni gumb i dodajte drugi (ili isti) račun i odaberite postavke koje želite koristiti.

Ako se prebacite na karticu Opcije, možete odabrati zvjezdicu dodataka automatski u sustavu Windows i odrediti koliko često treba provjeriti e-poštu.

Pojavljivanje obavijesti može se konfigurirati u glavnom programu Growl for Windows. Idite na odjeljak Aplikacije i odaberite Gmail Growl slijeva. Odaberite jedan od svojih računa u središnjem stupcu, a zatim s desne strane na padajućem izborniku Prikaz kako biste odabrali način na koji bi obavijesti trebale izgledati.

Možete pregledati kako izgledaju različiti stilovi obavijesti tako da se prebacujete na karticu Prikaz. Postoji nekoliko ugrađenih opcija, no više stilova možete preuzeti klikom na vezu “Pronađi i instaliraj dodatne zaslone” pri dnu dijaloškog okvira.

Gmail Growl samo je jedan od mnogih monitora dostupnih za Growl i postoji mnogo drugih koje biste možda htjeli isprobati – pogledajte primjerice System Monitor.

Daljinsko nadgledanje

Ovisno o monitorima koje ste instalirali, možda biste htjeli pogledati obavijesti na daljinu, a ne lokalno. Kada koristite računalo na istoj mreži kao ona koju ste konfigurirali pomoću monitoringa Growl, možete odabrati da se obavijesti gurnu drugom računalu.

Provjerite jeste li instalirali i pokrenuli aplikaciju na oba računala i prijeđite na odjeljak programa Mreža. Možete omogućiti opciju za prijenos obavijesti na drugi stroj i odaberite koji, ovdje.

No postoji i mogućnost upotrebe Growl u sprezi s mobilnim uređajima – što je korisno ako želite biti obaviješteni nakon dugotrajnog zadatka. Kada kliknete gumb + da biste odabrali uređaj za prosljeđivanje obavijesti, možete odabrati korištenje Prowl za iOS ili Toasty za Windows Phone.

Korisnici Androida ne moraju se osjećati kao da ih nema jer postoje i još dvije opcije za telefone i tablete. Možda je najsvestraniji NMA (Obavijesti moj Android).

Također ćete morati preuzeti dodatak za sustav Windows za NMA, ali pomoću aplikacije Android moći ćete konfigurirati obavijesti o kojima želite primati.

Eksperimentirajte s Growl i dodatke i pogledajte što možete napraviti. Postoji veliki potencijal u ovom iznimno fleksibilnom alatu, stoga podijelite svoje ideje u nastavku.

ระบบการแจ้งเตือนของ Growl เป็นสิ่งที่ผู้ใช้ Mac จะคุ้นเคย แต่มันก็เป็นสิ่งที่ Windows มีให้เช่นกัน เป็นเครื่องมือเอนกประสงค์ที่สามารถใช้ตรวจสอบการแจ้งเตือนของระบบและโปรแกรมได้หลากหลายวิธีรวมถึงจากระยะไกล.

คำแนะนำสามารถใช้ร่วมกับส่วนเสริมต่าง ๆ เพื่อแจ้งเตือนฟิลด์สำหรับเว็บไซต์แอพพลิเคชั่นและกิจกรรมต่างๆ มีช่วงของปลั๊กอินที่สามารถใช้เพื่อเพิ่มการสนับสนุนสำหรับแอปพลิเคชันและยูทิลิตี้ต่าง ๆ.

การแจ้งเตือนที่สร้างขึ้นโดยโปรแกรมที่คุณใช้มีประโยชน์ – คุณสามารถปิดการใช้งานใด ๆ ที่ไม่ใช่ – แต่คำแนะนำให้วิธีการจัดการพวกเขาทั้งหมดจากที่เดียวกันและสร้างลักษณะที่สม่ำเสมอมากขึ้นสำหรับข้อความ.

คำรามสำหรับ Windows

ดาวน์โหลดสำเนา Growl สำหรับ Windows ฟรีและติดตั้งโปรแกรม เปิดแอปพลิเคชั่นและอนุญาตผ่านไฟร์วอลล์ Windows ดับเบิลคลิกที่ไอคอนในพื้นที่แจ้งเตือนของซิสเต็มเทรย์และทำเครื่องหมายในช่อง ‘เริ่มคำรามอัตโนมัติเมื่อเข้าสู่ระบบ’ เพื่อให้มันเริ่มต้นโดยอัตโนมัติด้วย Windows.

มีแอปพลิเคชั่นบางตัวที่รองรับโดย Growl โดยตรงจากกล่อง แต่มีแอปพลิเคชั่นอื่นที่จำเป็นต้องใช้ปลั๊กอิน เยี่ยมชมหน้าความเข้ากันได้ของแอปพลิเคชันเพื่อดูว่าโปรแกรมใดของคุณสามารถใช้ประโยชน์จาก Growl ได้.

มีแอปพลิเคชั่นมากมายที่ Growl สามารถช่วยได้มากและปลั๊กอินที่น่าสนใจหนึ่งตัวทำให้สามารถตรวจสอบข้อความใหม่ในกล่องจดหมาย Gmail ของคุณได้ หากคุณมีมากกว่าหนึ่งบัญชีการแจ้งเตือนที่แตกต่างกันสามารถกำหนดค่าสำหรับแต่ละ.

ดาวน์โหลดปลั๊กอิน Gmail Growl เรียกใช้ผ่านการติดตั้งและเลือกตัวเลือกเพื่อเปิดใช้งานเมื่อเสร็จสิ้น การแจ้งเตือนจะปรากฏที่ด้านล่างขวาของเดสก์ท็อปเมื่อคำรามตรวจพบการติดตั้ง.

ดับเบิลคลิกที่ไอคอนถาดระบบและป้อนข้อมูลรับรองการเข้าสู่ระบบสำหรับบัญชี Gmail ของคุณ ใช้เมนูแบบเลื่อนลงเพื่อเลือกประเภทของอีเมลที่คุณต้องการตรวจสอบ – คุณอาจต้องการรับการแจ้งเตือนเมื่อมีอีเมลสำคัญเช่น – จากนั้นป้อนป้ายกำกับที่ควรใช้เป็นตัวระบุในป๊อปอัป.

หากคุณต้องการตรวจสอบบัญชีมากกว่าหนึ่งบัญชีหรือคุณต้องการรับการแจ้งเตือนแยกต่างหากสำหรับอีเมลประเภทอื่นให้คลิกที่ปุ่มสีเขียวและเพิ่มบัญชีอื่น (หรือบัญชีเดียวกัน) แล้วเลือกการตั้งค่าที่คุณต้องการใช้.

เมื่อย้ายไปที่แท็บตัวเลือกคุณสามารถเลือกให้ปลั๊กอินดาวติดตั้งอัตโนมัติกับ Windows และระบุความถี่ในการตรวจสอบอีเมล.

สามารถกำหนดค่าลักษณะที่ปรากฏของการแจ้งเตือนได้ในโปรแกรม Growl สำหรับ Windows ไปที่ส่วนแอปพลิเคชันแล้วเลือก Gmail Growl ทางด้านซ้าย เลือกหนึ่งในบัญชีของคุณจากคอลัมน์กลางจากนั้นไปทางขวาใช้เมนูดร็อบดาวน์ดิสเพลย์เพื่อเลือกลักษณะการแจ้งเตือน.

คุณสามารถดูตัวอย่างลักษณะการแจ้งเตือนที่แตกต่างกันได้โดยเลื่อนไปที่แท็บหน้าจอ มีตัวเลือกในตัวไม่กี่ตัว แต่สามารถดาวน์โหลดสไตล์เพิ่มเติมได้โดยคลิกที่ลิงค์ ‘ค้นหาและติดตั้งจอแสดงผลเพิ่มเติม’ ที่ด้านล่างของกล่องโต้ตอบ.

Gmail Growl เป็นเพียงหนึ่งในจอภาพจำนวนมากที่มีให้สำหรับ Growl และมีอีกมากมายที่คุณอาจต้องการทดสอบดูตัวอย่างการตรวจสอบระบบ.

ตรวจสอบระยะไกล

คุณอาจต้องการดูการแจ้งเตือนจากระยะไกลมากกว่าในเครื่องทั้งนี้ขึ้นอยู่กับจอภาพที่คุณติดตั้ง เมื่อคุณใช้คอมพิวเตอร์ในเครือข่ายเดียวกับที่คุณกำหนดค่าด้วยการตรวจสอบ Growl คุณสามารถเลือกที่จะส่งการแจ้งเตือนไปยังเครื่องที่สอง.

แต่ยังมีขอบเขตสำหรับการใช้ Growl ร่วมกับอุปกรณ์พกพาซึ่งมีประโยชน์หากคุณต้องการได้รับการแจ้งเตือนเมื่องานที่มีความยาวเสร็จสมบูรณ์ เมื่อคุณคลิกปุ่ม + เพื่อเลือกอุปกรณ์ที่จะส่งต่อการแจ้งเตือนไปยังคุณสามารถเลือกใช้ Prowl สำหรับ iOS หรือ Toasty สำหรับ Windows Phone.

ผู้ใช้ Android ไม่จำเป็นต้องออกไปเพราะมีตัวเลือกเพิ่มเติมสำหรับโทรศัพท์และแท็บเล็ต บางทีความสามารถที่หลากหลายที่สุดคือ NMA (แจ้งเตือน Android ของฉัน).

คุณจะต้องดาวน์โหลดปลั๊กอิน Windows สำหรับ NMA แต่คุณสามารถใช้แอพ Android เพื่อกำหนดค่าการแจ้งเตือนที่คุณต้องการรับได้.

ทดลองกับ Growl และปลั๊กอินและดูว่าคุณจะทำอะไรได้บ้าง มีศักยภาพที่ยอดเยี่ยมในเครื่องมือที่ยืดหยุ่นอย่างมากดังนั้นแบ่งปันความคิดของคุณด้านล่าง.

Get notified within milliseconds of file modifications, deletions, renames, new files, file access and inactivity on your file system or network shares.

Monitor local directories or network shares including hidden/private shares.

Options to detect all files in subdirectories and changes to file attributes.

Balloon notifications whenever an event is detected.

Include and exclude filter patterns per directory.

Able to capture and process over 400 change events per second.

Accurately detect the user making changes (PRO)

Find out which users are making changes to directories or files in near real-time.

Report on the application process as well for local changes.

Users can be detected locally or network shares in your network.

Automatic configuration of the machine and directories to enable auditing.

Enforce the system audit policy to remain even if malicious users try to disable it.

Ultimate reliability with snapshots (PRO)

Enable snapshots to ensure changes can be detected while the network is down and even during power outages.

Fast snapshots of directory and file statistics.

Ensure you never miss any changes as well as user and process detection.

Windows background service monitoring (PRO)

Directory Monitor can be installed as a Windows service with multiple user configurations.

No need to be logged into the machine to continue monitoring changes.

Simple configuration and installation through the user interface.

Extremely low memory and CPU footprint when running in the background.

Keep your monitoring logs automatically

Use text logs to store your file system change events for later inspection.

Output contextual information based based on the event using macros.

Customize the output format (CSV for example) with only data you require.

Manage log file with built-in renaming to split the log into daily of monthly copies.

All monitoring configurations can log to the same file.

Execute scripts/applications when events occur

Optionally execute any script or application when one or more file system change events occur.

Pass in contextual parameters to your scripts based on the event information using macros.

Execute scripts or applications silently in the background (PRO).

Sequential execution option if scripts or applications cannot have more than one instance running.

Trigger based on number of events, delays or inactivity for batch processing.

Send emails about the file system changes

Easily send emails to multiple recipients for every event or after a certain number of changes in bulk.

Flexible configuration options to cater for all email servers.

Provide contextual information based on the event using macros.

Sending rules based on number of events, no events after a period of time, delays or inactivity for batch processing.

Throttling to prevent spamming when significant changes occur in a short period of time.

Save events to a relational database

Store file system events in an easy to query relational database of your choice.

Support for SQL Server, MySQL, PostgreSQL and Oracle.

Automatically create the required database schema.

Play a sound to get your attention

Be notified with audio when changes occur.

A sound will play once per file system event.

Sounds can play continuously in a loop until you take action and view the user interface.

Only WAV files are supported.

Send file system event messages to a Syslog server

Send directory event messages to a Syslog server locally or on your network.

Support for both RFC3164 and RFC5424 Syslog header formats.

Define your own message format for each directory using macros.

Select any facility and priority level for your messages.

Advanced notifications with Growl

Get notifications anywhere, even your mobile device by using Growl.

Growl is a powerful cross-platform messaging system.

Custom notification alert windows, less invasive and more customizable than system tray balloons.

See notifications even when application is running in the background as a service.

Keeps a history of notifications that have passed.

Basic configuration for local notifications or sending to a remote target such as a mobile device.

Want to improve this question? Update the question so it’s on-topic for Stack Overflow.

Closed 9 years ago .

I’m looking for a way to monitor certain Windows services (on Windows Server 2003) and restart if necessary. The services are on different servers and include mainly SQL Server services (e.g. SQL Server Agent), but also some proprietary services.

Email alerts sent out if a service has stopped would be very useful as well.

6 Answers 6

You can now choose to sort by Trending, which boosts votes that have happened recently, helping to surface more up-to-date answers.

Trending is based off of the highest score sort and falls back to it if no posts are trending.

A “might be enough” version of this is built into Windows. Look into the “Recovery” tab of the service properties, as available via services.msc .

You can act on a service fail with:

  • “Restart the Service”
  • “Run a Progam”
  • “Restart the Computer”

“Run a program” could be a small script that sends a mail, for example.

If you want a bigger solution with an overview dashboard and all, there are plenty of system monitoring solutions available. For example SolarWinds IPMonitor comes to mind, or Nagios, or Cacti.

If you are interested in some .NET programming, The System.ServiceProcess namespace provides classes that allow you to implement, install, and control Windows service applications.

Simple example, checking and starting a service in C#:

They may be some dedicated tools out there, but I just want to point out the wmic tool.

is able to list the services of any computer

would restart the telnet service.

If you encapsulate wmic in a script language (able to send email), you can have the monitoring tool you are looking for.

This depends on exactly what you want to monitor:

  • A service has actually stopped as far as the Service Control Manager (SCM) is concerned.
  • A service has crashed without the SCM being aware – this is very common due to threading.
  • A service has hung without the SCM being aware – also very common.

For the first item, you can configure the service to kick-off a script that sends an email alert. Note this can be really annoying if the service keeps rebooting due to circumstances outside its control (dependence on a flaky network connection, or whatever).

For the other two items, you will need some type of heartbeat service, which you can either build or buy. Be careful to have the heartbeat monitor running local to the services it’s monitoring because as I wrote a while ago, the network is not reliable.

It’s possible to use Windows 10 event logs to detect intrusions and malicious activity, but some knowledge of critical IDs is mandatory to avoid over-collection and other issues. This article will highlight the most important event IDs that you should monitor. As a side note, you can use these event logs to generate indicators of compromise that you can regularly assess to improve computer forensics and incident response.

Here are the event IDs to track.

Windows security event log ID 4688

Event 4688 documents each program (or process) that a system executes, along with the process that started the program. What’s intriguing about this event ID is that it logs any process that is created by a user or even spawned from a hidden process. For example, if there’s malware present on your Windows system, searching event 4688 will reveal any processes executed by that ill-intentioned program. Malicious activity red flags include child processes having a different parent process ID than the original process and processes that are executing elsewhere instead of C:Program Files or C:windowssystem32.

Additionally, you can get information about a user’s administrative privileges through the Token Elevation Type field. A Type 1 token refers to a “full token” with all privileges granted to that user account, such as when UAC (User Access Control) is disabled or when the user is in a service or built-in administrator account. Type 2 hints that an elevated token was issued through the “Run as administrator” option while the UAC was enabled. Type 3 is a limited token with no administrative groups or privileges. It’s issued when the user doesn’t launch a program using Run as administrative or when an application doesn’t require administrative privilege.

While event 4688 can tell you a lot, it should be used in conjunction with other event logs to get a full picture of an intrusion.

Windows security event log ID 4670

One of the best ways to identify unauthorized access (and ultimately data leakage) is by tracking File Server permission changes. That’s where event 4670 comes in handy — it triggers itself when a user modifies an object’s access control list. Hackers are known to change permissions when attempting to move laterally or inject ransomware into a system; monitoring who takes ownership of an intrusion is a critical step in tracing the source of an attack. Advanced users can also dive into SDDL to further understand what permissions were actually changed.

Besides intrusion detection, you can also use event 460 to get insights into user activity. It can help you get information on peak logon times, user attendance and more. Pro tip: Make sure to enable the audit policy of objects when viewing event 4670 in your Windows Event Viewer or SIEM.

Windows security event log ID 4672

This event informs you whenever an administrator equivalent account logs onto the system. You can track it to look for a potential Pass-the-Hash (PtH) attack. If the “SubjectSecurity ID” in the Event Viewer doesn’t contain “LocalSystem, NetworkService, LocalService”, it’s not an admin-equivalent account and requires careful analysis.

But event 4672 isn’t the only Windows security event log ID to indicate a pass-the-hash attack. Many other events, including 4648 (a logon was attempted with explicit credentials), 4624 (an account was successfully logged on) and 4776 (the computer attempted to validate the credentials for an account), can indicate that a system is being breached collectivity.

It’s not easy to detect lateral movement from Pass-the-Hash attacks, but an SIEM that lets you create correlation rules around the movement can help you identify the other events linked to PtH.

Windows security event log ID 1125 (Error)

Windows typically manages its configuration settings on servers and workstation using “Active Directory Group Policy.” Monitoring event 1125 helps you identify potential failures pertaining to policy application or unsanctioned changes to policy objects in Active Directory, rather than user error. If the policy cannot be applied, there’s a chance that the system has a security issue.

Besides AD policy, it’s also beneficial to keep tabs on firewall rules. Because Windows Firewall offers a critical line of defense, a malicious actor may attempt to modify its rules to gain access to your system. Use the firewall logging feature to check for dynamic and disabled port openings as well as analyze dropped packets on the send route.

In case you identify a malicious activity, open the log file in Notepad and use DROP to filter all entries in the action field, analyzing which destination IPs end with a number that’s not 255. If you detect many such IPs, take note of packets’ destination IP addresses for troubleshooting.

Windows defender event 1006 and event 1007

Consider investing the notifications for identifying, preventing and removing malware in Windows Defender. Yes, even the built-in antivirus can be used to conduct malicious activity. Start by reviewing event ID 1006, which is triggered when the Defender detects unwanted software. Then review Event 1007 to see if the antivirus acted to protect your system from potential infiltration. All these events are present in a sublog.

You can use the Event Viewer to monitor these events. Open the Viewer, then expand Application and Service Logs in the console tree. Now click Microsoft → Windows → Windows Defender Antivirus”. The last step is to double-click Operational, after which you’re able to see events in the “Details” pane.

Conclusion

Windows event logs are an indispensable tool for detecting group errors and malicious activity. Keeping a watchful eye on them can alert you to intrusions before they grow in presence and scale. Given that the first step in responding to malware is often to track the infiltration source, event IDs are a valuable piece of information available to Windows 10 users. Listen to what they’re telling you and you’ll detect illicit software early in the attack life cycle.

If you are managing multiple user accounts or multiple computers, then getting simple email notifications when a user logs in is a neat way to keep track of login activities. Moreover, it is also a good way to monitor a system that you don’t want others to log into.

Here is how you can make Windows send email notifications when a user logs into a computer.

Make Windows Send Email Notifications on User Login

To make Windows send email notifications when a user logs in, we are going to use a third party program called SendEmail. SendEmail is a simple, portable, and lightweight command line email program that can send emails. Download the application from the official website, and only download the version that supports TLS.

Alternatively, you can also use Blat, but it doesn’t support TLS which is a requirement for almost any major email service like Gmail.

Once you’ve downloaded the file, extract it to someplace like Program Files in the C drive so that other users (if you have any) cannot access it without admin privileges. In my case, I just placed it in my E drive.

Now, search for Task Scheduler in the Start menu and open it.

After opening the Task Scheduler, click on the option “Create Task” in the right pane.

The above action will open the Create Task window. Here, enter the name of the task, description, and select the “Run whether the user is logged on or not” radio button. Don’t save the task yet.

Now, navigate to the Triggers tab and click on the “New” button appearing at the bottom of the window to create a new trigger.

In the “New Trigger” window select the option “At log on” from the drop-down menu next to “Begin the task,” and then make sure that the “Any user” radio button has been selected. Once you are done, click on the “Ok” button to save the changes.

Now, navigate to the “Actions” tab, and click on the “New” button to add a new action.

In the “New Action” window, enter the SendEmail application path under the “Program or Script” field, and then add the below command as the arguments in the “Add arguments” field.

While adding, don’t forget to replace “[email protected]” with your actual email address and PASSWORD with your actual email account password. If you want to you can also edit the email subject [-u] and the message part [-m].

Note: if you are using other email services, then you also have to change the SMTP server address and the port number.

Here is what the command line options actually mean.

  • -f – From email address
  • -t – To email address
  • -xu – Username
  • -xp – Email account password
  • -s – SMTP server address with port number
  • -u – Email subject
  • -m – Email body

Once you are done with the changes, click on the “Ok” button to save the changes.

This is how it looks after adding the said action to the task.

If you are adding this task to a laptop or something of that sort then you might want to uncheck the “Start the task only if the computer is on AC power” checkbox so that the task can run even when the system is running on battery.

Once you are done with everything, just click on the “Ok” button to complete the procedure.

If you want to test the task, simply select the task in the middle pane of the Task Scheduler, and then click on the “Run” button, and this should send the email.

That’s all there is to do. Every time a user logs into the system, you will receive an email notification (provided that your system is connected to the Internet).

Do comment below sharing your thoughts and experiences about using the above method to receive email notifications when someone logs into your system.

Our latest tutorials delivered straight to your inbox

  • Tips
  • Blog
  • Hvordan
  • Vinduer
  • Telefon
  • Vigtigste 
  • Blog 
  • Sådan overvåger du systemmeddelelserne lokalt og eksternt med Growl til Windows

Growl-meddelelsessystemet er noget, der er kendt for Mac-brugere, men det er noget, der også er tilgængeligt for Windows. Det er et utroligt alsidigt værktøj, som kan bruges til at overvåge system- og programmeddelelser på en række måder, herunder fjernstyring.

Growl kan bruges sammen med forskellige tilføjelser til feltanmelde for websteder, applikationer og arrangementer. Der er en række plugins til rådighed, der kan bruges til at tilføje support til en række forskellige applikationer og værktøjer.

Meddelelserne, der genereres af de programmer, du bruger, er nyttige – du kan deaktivere alle, der ikke er – men Growl giver mulighed for at styre dem alle fra samme sted og skaber også et mere ensartet udseende for meddelelser.

Growl For Windows

Download en gratis kopi af Growl til Windows, og installer programmet. Start applikationen og lad det være via Windows Firewall. Dobbeltklik på ikonet i meddelelsesområdet i systembakken, og kryds i feltet “Start automatisk Growl ved login”, så den starter automatisk med Windows.

Der er nogle programmer, der understøttes af Growl lige fra boksen, men der er andre, som et plugin er påkrævet. Besøg siden Kompatibilitet for at se, hvilke af dine programmer der kan gøre brug af Growl.

Der er masser af applikationer, som Growl kan være en stor hjælp til, og et interessant plugin gør det muligt at overvåge nye meddelelser i din Gmail-indbakke. Hvis du har mere end en konto, kan forskellige meddelelser konfigureres for hver.

Download pluginet for Gmail Growl, kør gennem installationen, og vælg muligheden for at starte det, når dette er gjort. En meddelelse vises nederst til højre på skrivebordet, når Growl registrerer installationen.

Dobbeltklik på ikonet på systemfelt og indtast loginoplysninger for din Gmail-konto. Brug rullemenuen til at vælge hvilken type post du gerne vil overvåge til – du kan kun få besked om vigtige e-mails, for eksempel – og derefter indtaste en etiket, som skal bruges som identifikation i pop op-vinduer.

Hvis du vil tjekke mere end en konto, eller du vil modtage separate meddelelser til andre typer e-mail, skal du klikke på den grønne knap og tilføje en anden (eller den samme) konto og vælge de indstillinger, du gerne vil bruge.

Hvis du flytter til fanen Indstillinger, kan du vælge at have plugin-stjernen automatisk med Windows og angive, hvor ofte e-mail skal kontrolleres.

Udseendet af meddelelser kan konfigureres i hovedprogrammet Growl for Windows. Gå til afsnittet Programmer og vælg Gmail Growl til venstre. Vælg et af dine konti fra centralkolonnen, og derefter til højre bruger rullemenuen Display til at vælge, hvordan meddelelser skal se ud.

Du kan se, hvordan de forskellige stilarter af underretninger ser ud, ved at flytte til fanen Displayer. Der er et par indbyggede muligheder, men flere stilarter kan downloades ved at klikke på linket Find og installer yderligere skærme nederst i dialogboksen.

Gmail Growl er kun en af ​​de mange skærme, der er tilgængelige for Growl, og der er masser af andre, som du måske vil teste – se f.eks. På System Monitor.

Fjernovervågning

Afhængigt af de skærme, du har installeret, kan du muligvis se meddelelser eksternt snarere end lokalt. Når du bruger en computer på samme netværk som en, du har konfigureret med Growl-overvågning, kan du vælge at få meddelelserne skubbet til den anden maskine.

Sørg for, at appen er installeret og kørende på begge computere og gå til netværksafsnittet af programmet. Du kan aktivere muligheden for at overføre meddelelser til en anden maskine, og vælg hvilken, her.

Men der er også mulighed for at bruge Growl i forbindelse med mobile enheder – hvilket er nyttigt, hvis du vil blive underrettet, når en lang opgave er færdig. Når du klikker på knappen + for at vælge en enhed til at videresende meddelelser til, kan du vælge at bruge Prowl for iOS eller Toasty for Windows Phone.

Android-brugere behøver ikke at føle sig udeladt, da der også er et par flere muligheder for telefoner og tablets. Måske er den mest alsidige NMA (Notify My Android).

Du skal også downloade Windows-plugin til NMA, men du kan derefter bruge Android-appen til at konfigurere hvilke meddelelser, du er interesseret i at modtage.

Eksperiment med Growl og dens plugins og se, hvad du kan komme med. Der er stort potentiale i dette meget fleksible værktøj, så del dine ideer nedenfor.

I am looking for a visual tail tool that can monitor several local or remote log files.

Optional features that interest me: color highlight based on log error level, coloring for special words, filtering of messages and/or notifications on new activity.

9 Answers 9

You may try to use a combination of multitail and ssh .

I found a tool that can do this GeekTool, it even has a version that works on Lion (see the forum).

It can be used to do just simple tails, without filtering or other stuff, so maybe someone has a better alternative.

PostRemoteLog (free)

PostRemoteLog has Growl notifications support and it is free.

While I haven’t used it myself yet, I recently discovered Log.io. It appears to meet all your criteria.

Only for the sake of completeness it shall be said, that there is a tool for Mac OS X with highlighting on keywords and some other features. It’s called Logtastic

I know, this is an old post, but maybe someone finds this useful?! 🙂

Might I suggest the LogTail macOS app – it checks all the requirements you mentioned (except the notifications part). It has SSH based remote log viewing functionality and can tail the remote log file (configurable polling interval). You can setup multiple SSH servers and browse them to select the log file to view.

It supports filtering and/or highlighting search patterns, searching the remote log file incrementally, and lets you adjust the foreground, background colors and font.

Also, it doesn’t load the entire remote log file at once but intelligently fetches content based on your scrolling actions, so it is quite efficient.

The app site has more information. Hope it helps!

IPHost ведёт мониторинг ваших сетевых ресурсов 24 часа в сутки,
и уведомляет о проблемах.

500 мониторов на 30 дней, после этого
50 бесплатных мониторов, навсегда
СКАЧАЙТЕ СЕЙЧАС

Наш продукт работает под Microsoft Windows Vista, 7, 8, Windows 10 и Windows Server 2008, 2012, 2016

Основные возможности

Шаблоны приложений

Мониторы в составе шаблона приложений проводят комплексную проверку серверов и приложений на них. С помощью шаблона приложений удобно создавать и настраивать весь комплект необходимых мониторов. Автоматический поиск приложений.

Уведомления

Разнообразные виды уведомления пользователей о проблемах с сетевыми ресурсами. Программа может отправлять электронную почту, SMS или мгновенные сообщения, может воспроизвести звуковой файл. В качестве уведомления можно также исполнить скрипт или программу (локально, или на удалённом компьютере).

Распределённый мониторинг

IPHost Network Monitor в состоянии вести мониторинг по распределённым сетям. Установите удалённый агент в каждой подсетке, и вы сможете вести мониторинг с одной центральной установки программы.

Быстрый старт

Вы можете установить и запустить IPHost Network Monitor менее, чем за 2 минуты. Программа проста в использовании, поэтому вы можете настроить вашу систему мониторинга быстро, используя мастер поиска хостов и мониторов в сети.

SMS-уведомления

Один из самых надёжных видов уведомлений (способов оповещения) – просто подключите телефон или GSM-модем к компьютеру, на котором установлен IPHost Network Monitor, и начните получать SMS о проблемах в вашей сети быстро и своевременно.

Понятные отчёты

Простая для понимания визуализация событий мониторинга. Вы можете следить за всеми существенными событиями мониторинга, тенденциями в состоянии мониторов — в рамках временного интервала по вашему выбору.

Безотказный

IPHost Network Monitor весьма надёжен, в состоянии работать годами без сбоев. Компактное независимое приложение, для работы которого в большинстве случаев не требуется выделенный сервер — достаточно обычного настольного компьютера (PC).

Мониторы и протоколы

Более 20 поддерживаемых способов мониторинга: начиная с PING вплоть до SNMP и WMI, включая мониторинг сетевого трафика. Замечательные средства мониторинга Web-ресурсов: можете проверить единственную страницу при помощи HTTP-запроса, или последовательность документов при помощи Web Transaction монитора.

Web Transaction

Web Transaction монитор позволяет обнаружить недочёты вашего Web-приложения, записывая подлинные действия пользователя на документах. Монитор позволяет имитировать пользовательскую активность на всей череде страниц, необходимых для произведения бизнес-операции — например, оплаты товара в Интернет-магазине.

Профилактика проблем

Вы можете настроить систему мониторинга так, что будете получать уведомления о производительности и доступности серверных приложений по необходимым для вас критериям. Вы сможете узнать о сбое, прежде чем он станет настоящей проблемой.

Обнаружение сетевых ресурсов

При помощи мастера обнаружения сетевых ресурсов вы можете отыскать хосты в сети, и начать мониторинг их ресурсов. Поиск может производится периодически по указанному вами расписанию. Это касается и подключенных удалённых агентов.

Web интерфейс

Все основные функции наблюдения и управления состоянием мониторов доступны на удобной в использовании панели управления. Быстрый и эффективный способ просмотра отчётов, останова и запуска мониторов, и наблюдения за уведомлениями.

Новости

Типы мониторов

Ping, TCP и UDP порт

Простые, но эффективные способы вести мониторинг доступности удалённого сервера. При помощи TCP и UDP мониторов вы можете проверить наличие сетевого сервиса на любом порте.

Мониторы почтового сервера

Вы можете проверить почтовые сервисы, используя IMAP, POP3 или SMTP мониторы. Все почтовые мониторы могут использоваться с аутентификацией, SMTP монитор может отправить сообщение.

Мониторы параметров системы

Используя монитор Windows-сервиса, вы можете убедиться, работает ли тот или иной сервис. Также можно проверить количество свободного дискового пространства и размер файла.

Мониторы Web-серверов

Одну Web-страницу можно проверять при помощи HTTP-монитора. Можно проверять наличие той или иной строки, аутентификацию и использование SSL также поддерживаются. Также можно вести мониторинг FTP/SFTP серверов

Мониторы СУБД

Встроенные мониторы для Oracle, MySQL, MS SQL. Мониторинг других СУБД можно вести при помощи ODBC-драйверов.

Мониторы SNMP и WMI

Промышленный стандарт методов мониторинга для любого сервера/устройства (SNMP), и для компонент Windows (WMI). Также поддерживается мониторинг сетевого трафика.

Web Transaction монитор

Мониторинг страниц сайта с точки зрения реального опыта пользователя. Вы можете записать действия на последовательности Web-страниц, и монитор будет периодически проверять их периодически..

Пользовательские скрипты

Скрипты и программы могут исполняться на локальном компьютере, либо на удалённом (при помощи SSH). Это помогает быстро создать монитор для проверки любого сетевого устройства. В качестве скриптов также можно использовать модули Nagios.

One of the biggest problem of sharing of folders in Windows XP is it uses the Simple File Sharing option by default whereby when you share a folder, anyone on the local network or even from the Internet would be able to access the shared folder without logging in or entering any password. Thankfully this has all changed starting from Vista where the Simple File Sharing option has been removed and you need to login with a user account or else you can’t access the shared folder. It is still possible to allow access to shared folders without a password by enabling the Guest account and giving permission to EVERYONE group on the shared folder.

Another problem with shared folders is sometimes you don’t know who is toying around with the files when a few people have access to it. If you go to Control Panel > Administrative Tools and run Computer Management, you can only view the connected session and the files being opened by the user in real time but without notification nor logging. This means an important file can be easily deleted from the shared folder and untraceable. Fortunately we have 7 ways for you to monitor shared folders to track down the culprit.

1. NetShareMonitor

NetShareMonitor is a free and portable tool to watch your shared folders. The program is has 3 tabs to show the active session, files being accessed, and also all the shared resources on your computer. When someone connects to your shared folder, the NetShareMonitor icon at notification area will start to blink and also plays an alert music. There is no popup/email notification nor automated actions to take when an access is detected. Tabs doesn’t show detailed information and will have to view the logs. The log files does not show the files are deleted, other than showing the files that are accessed. Last updated 5 years ago but works on Windows 7.

2. ShareWatch

ShareWatch is a a very simple and small portable tool at only 77KB in size that does only one thing which is to show the connected user and also the files being accessed. There is no logging and notification, pretty much like the feature found in Computer Management. One advantage in using ShareWatch is that it can watch other computer’s shared folders given that you have proper access to the computer.

3. ShareMonitor

ShareMonitor is yet another portable tool that instantly starts monitoring your shared files upon running the program. The activities are displayed in a spreadsheet like format with cells that resembles Excel and can be saved to a CSV or XML file for future references. By default ShareMonitor checks every 500 milliseconds which will constantly take up 3-6% CPU usage.

4. ShareWatcher

Although the latest version 3 of ShareWatcher is shareware and its free version is heavily crippled, version 2 which is a year older can be used without limitations or nag screens. The program is able monitor and log the file adding or accessed activity of your folder shares in real time, with the added ability to also monitor remote or FTP shared folders for new files. In addition to the log in the main window, you can also be notified via a tray icon popup. To avoid being upgraded to free version 3 which has most of the features disabled, it’s best to turn off automatic updates in Settings.