Full Control is a complete yet economical Windows
security access management system that has many features heretofore
found only in high-end tools, including system stabilization,
access control, remote configuration, and web-browser oversight.
It includes a LAN-wide management system that cuts the time
and effort spent maintaining PCs in the corporate environment.
It also features tech support and helpdesk tools that speed
problem diagnosis and resolution. Its centralized administration
tools are very useful in managing across the LAN, yet Full
Control is equally valuable on non-networked computers such
System administrators will appreciate Full Control's built-in remote
management and audit-trail oversight tools. They make it fast
and easy to see who's doing what, and to configure a Full Control
station to do whatever you require, even clone that station
onto another computer without re-entering anything. You can
monitor and update your remote stations "on the fly" over
the network or by disk for non-networked computers.
Full Control's built-in activity logging can track exactly when each
program was run, by whom, and for how long. It can even monitor
World Wide Web page access, and the amount of time spend at
each site. Its built-in reports and graphs can analyze this
information, or it can be exported to any database or spreadsheet.
The free Extended Administration Kit tools extend Full Control in a
number of directions to meet specific needs.
Best choice product: Need a simplified replacement
user interface? Full Control and Full Control Internet allow
the secure use of the regular Windows interface. For management
and security which also includes an easy-to-use replacement
user interface, take a look at our WinU
software. For more on the differences between WinU,
Full Control, and Full Control Internet, click here.
Want more information on Full Control?
for the entire manual in Acrobat PDF format.
Summary of features:
One Click System Stabilization prevents download, installation, or use of unauthorized software
Read-only or invisible files and folders, CD-ROM door locking
Window Monitor can manipulate or close any window when it appears
Set Open/Save dialogs to that user's proper directory
Secure logon validation and protection, even on stand-alone Windows 95/98/ME systems
Password-protected Safe Mode prevents unauthorized reconfiguration
Watches for malware-like behavior in real-time on the computer
Prevents inadvertant installation of spyware, malware, adware, Trojans and similar nasties
Now available: WinU 6Lock down data flow to/from USB ports and similar external sources, such as CD and DVD drives
Prevents unauthorized data leaving the computer (data theft) and entering the computer (malware)
Secure management of the standard Windows desktop interface
Prevents desktop icons from being deleted, moved or renamed
Prevents access to undesired Start button options, Taskbar menus, and tray icons
Individual time limits and security settings for each application, and for each user
Allow time per session, time per day, time per week
Define blockout periods, during which nothing is available
Ctrl+Alt+Del blocking, Windows/Apps keys blocking, inactivity timeout
Per-user configuration options are set automatically at logon
Web Browser Monitor
World Wide Web browser monitor can log all Web activity
Can prevent Web browser from accessing files on local hard disk
Can limit Web browsers to a list of allowed sites
LAN-based central administration (optional: no network required)
Configure one Full Control computer, then distribute those settings enterprise-wide
Full audit trail activity log of all program usage and user activity
Diagnostic tools to aid in helpdesk support
Built-in reports and graphs, or export data to any database or spreadsheet
Access control: Full Control provides reliable security
coverage, even in Safe Mode. It lets you specify exactly what
programs can be run, by whom, and for how long. It allows full
access to authorized software, yet prevents accidental or
malicious system modifications. The user is validated at logon,
can't run other programs, can't change the computer's setup,
can't get to restricted files or folders. Full Control can
also control keyboard and mouse activity, boot-time behavior,
shutdown options, file-save directories, and more.
Intrusion Control: Watches for malware-like behavior in real-time on the computer,
and prevents these nasties from setting themselves up on your system in the first place.
It can protect silently and automatically, or ask what it should do when it discovers
a questionable situation. The administrator can even customize it to handle different kinds
of attacks in different ways.
USB Control: Manages data flow to/from USB ports
and similar external sources, such as CD and DVD drives. This can prevent
unauthorized data leaving the computer (data theft)
as well as preventing unauthorized data entering the computer
(spyware, malware, adware, Trojans, and similar nasties).
System stabilization: After you finally get your systems
the way you want them, what will keep them that way?
What prevents the installation and use of unauthorized software,
as soon as you turn your back? Full Control can stabilize
your systems with just one click, preventing unauthorized
installation or use of of any new software. And it can completely
oversee the use of authorized software. It can log all usage,
monitor and reconfigure settings remotely. System stabilization
also stops malware from running, to keep your system safe even
from unknown nasties.
Reduce Total Cost of Ownership: The Gartner Group
has estimated an annual Total Cost of Ownership of $13,187
per year per Windows PC, in part due to the cost of repairing
configuration damage caused by unsophisticated or malicious
users. Full Control can eliminate this cost by controlling
user access to configuration options, allowing companies to
reduce the total cost of owning PCs while maintaining their
existing investments in industry-standard hardware and software.
Web browser oversight: Full Control monitors all World
Wide Web browser activity by name, location, and time. You
can limit the websites that users are allowed to visit, and
prevent the browser from viewing or changing files on the
Application oversight: Full Control logs all software
usage, any attempts to access locked files or folders, attempted
password hacking, and more. Its built-in reports and graphs
can analyze this information, or the data can be exported
to any database or spreadsheet.
Helpdesk support: When a computer acts oddly or crashes
for no reason, wouldn't it be handy if support staff could
call up a minute-by-minute list of all running programs? That's
what Diagnostic Snapshot Logging is all about. It even
lists hidden programs that won't show up on the Close Programs
What it looks like: By default, Full Control puts
a small tray icon next to the clock on the taskbar. (It can
be hidden if desired.) Click this tray icon to list the current
program and user time limits, and a menu with password-protected
setup and session options.
System requirements: Full Control runs under
Windows 95, 98, ME, NT, 2000, XP, Vista or Windows 7. It takes up only about 1.5 MB
of disk space, and is considerate of your system setup. Full
Control includes a well-designed uninstaller that will remove
all its files from your system should that be necessary.