Ascendant NFM 1.61

Ascendant NFM represents the latest in cutting-edge network file monitoring security software and asset protection. While requiring absolutely no software installation on any computer on your network you can centrally monitor and record every single file action, application execution, and website visit that occurs on your network. Every file creation, modification, and deletion is recorded along with the user that performed the action, and when. ...

Author Ascendant Security
License Commercial
Price $69.95
Released 2011-01-04
Downloads 518
Filesize 606 kB
Requirements 2MB Disk Space, Admin Privileges, File Sharing Enabled
Installation Install and Uninstall
Keywords Network Monitoring, File Monitoring, Network Security, Asset Protection, Employee Monitoring, Data Security
Users' rating
(10 rating)
Ascendant NFMNetwork MonitoringWindows 2000, Windows XP, Windows Vista, Windows Vista x64, Windows Vista
Ascendant NFM log files - Download Notice

Using Ascendant NFM Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Ascendant NFM on rapidshare.com, depositfiles.com, megaupload.com etc. All Ascendant NFM download links are direct Ascendant NFM full download from publisher site or their selected mirrors.
Avoid: log files oem software, old version, warez, serial, torrent, Ascendant NFM keygen, crack.
Consider: Ascendant NFM full version, log files full download, premium download, licensed copy.

Ascendant NFM log files - The Latest User Reviews

Most popular Network Monitoring downloads

10-Strike LANState

10.4 download

... on events by playing a sound, writing to log, running program, sending e-mail, SMS, etc. 8. Performing actions on devices via the configurable map context menu. 9. ICMP, TCP/IP, DNS, ...

New Version

ICQ Sniffer

1.2 download

... is a handy network utility to capture and log ICQ chat from computers within the same LAN. ... system to export captured ICQ conversations as HTML files for later analyzing and reference. It is very ...

USB Drive Blocking Software

2.0.1.5 download

... operations such as cut, copy and paste in log file. Features: *USB drive data theft prevention tool supports all brands of removable media drives such as Sony, Samsung, Kingston, Transcend, ...

LAN Employee Monitor

4.32 download

... are key features of LAN Employee Monitor. 1. Log keystrokes, keylogger. 2. Capture the screen of employee's ... a best solution to manage and transfer the files in LAN. With it, you can manage and ...

NBT Host Monitor

1.0 download

... sending messages to windows messenger , music (mp3 files ,and related recording work), executing programs , sending ... messages to syslog servers, it could also record log files . Each item has 3 different states ...

Advanced Host Monitor

14.90 download

... a file or folder, check integrity of your files and web site; it tests your SQL servers, ... (30 alert methods). HostMonitor can generate test result log files and reports. HostMonitor provides different log file ...

5 award

EventMeister

5.4.4.0 download

... events throughout your network, facilitate central archiving of log data and assist with analysis and meeting audit ... actions and alerts including sending email, writing to log, running scripts, batch files or applications and displaying ...

PA Server Monitor

4.0 download

... usage Free local and server disk space Changed files and directories (great intrusion detection) Running Windows services Custom script results Local and remote directory quota monitoring Network Interface Card (NIC) ...

NetStat Agent

3.6 download

... an IP address or domain. - The powerful log manager allows you to view, delete and clear netstat or arp log files. - Graphs the round trip time and shows

PC On/Off Time

3.2 download

... connect to PCs on a network to create log in and log off reports for them. Intended to be a ... the software is entirely dependent on the event log embedded in the computer. This means that any ...