Skip to main content

What are the differences between the Revealed Agent and the Stealth Agent?

Updated over a week ago

Refer to this article to learn how to switch between Agent types.

Review this article for the complete Agent specifications and supported platforms.

The table below outlines the major differences between the two Agent types to help you choose the right one for your monitoring needs.

Feature

Revealed Agent (Visible/Freelance)

Stealth Agent (Hidden/Silent)

User Interface

Has a user interface:

mceclip0__3_.png

Has no user interface.

Starting Monitoring (Clock-in)

Monitoring begins only when the user signs into the Agent and clicks the Start button.

Users are monitored automatically as soon as they log into their local or domain account (no manual login required).

Stopping Monitoring (Clock-out)

User can stop monitoring by clicking the Stop button in the interface.

Monitoring cannot be stopped by the user.

Projects & Tasks

Users can create, select, and manage active tasks, sub-tasks, and view task history directly from the Agent's interface.

Users cannot manually create or choose a task. Tasks must be set up by an admin to be assigned automatically based on usage.

Default Task

No default task is set by the system.

Admins can set a default task for all users.

Data Capture

Tracks the user, not the computer. Multiple users on the same machine are tracked separately.

Tracks the computer. A new employee account is automatically created for each logged-on user. (Cloud users require a separate license for each new account).

User Profile Management

An admin must manually add the user and create a profile on the dashboard before installation.

The user/employee profile is created automatically on the dashboard upon the Agent's first connection.

Computer Names

Computer names do not have to be unique.

Computer names must be unique. Only the first computer with a non-unique name will be monitored.

Offline Recording

Not supported.

Supported. The Agent records activity when the network connection is lost.

Offline Policy Enforcement

Supported, but only if the user was on an active session when the network connection was disrupted.

Supported regardless of session status.

Locked Session Time

Does not count productivity or session time for locked sessions.

Productivity and session time are counted for locked sessions.

Remote Lockout Action

Does not support the Employees > Lock or Rule > Lock Out actions. You can, of course, freeze keyboard and mouse input from the Session Player.

Supports the Employees > Lock and Rule > Lock Out actions as well as the freeze actions.

Installation Methods

Supports only simple local installation (must run the installer directly on the machine).

Supports advanced installation, including remote deployment via Remote Dashboard, GPO, or PSEXEC.

Installation Privilege

Can be installed by the end-user.

Requires administrator privileges for installation.

Installation Path (Windows)

Installed in a single folder/directory.

Uninstall Protection (Windows)

Password protection for uninstallation is not supported. Users can remove the Agent using the Removal Tool.

Optionally supports password-protected mode to prevent users from removing the Agent with the Removal Tool.

Primary Use Case

Best for transparent, non-obtrusive monitoring of remote employees, contractors, and freelancers who need to manage their time/tasks.

Best for environments where you do not want users to know they are being monitored or where you need immediate monitoring upon user login.

Did this answer your question?