Skip to main content

What are the differences between the Revealed, Stealth and Standard Agents?

Updated yesterday

Refer to this article to learn how to switch between Agent types.

Review this article for the complete Agent specifications and supported platforms.

The table below outlines the major differences between the Agent types to help you choose the right one for your monitoring needs.

Feature

Revealed Agent

Stealth/Standard Agent

User Acknowledgement

Required.

Standard Agent: Required during installation. Subsequent updates don't require acknowledgements.

Stealth Agent: Not required.

Deployment Restrictions

No restrictions.

Stealth Agent: Available to vetted customers only.

Standard Agent: Available to unvetted/trial accounts.

User Interface

Has a user interface:

mceclip0__3_.png

Has no user interface.

Starting Monitoring (Clock-in)

Monitoring begins only when the user signs into the Agent and clicks the Start button.

Users are monitored automatically as soon as they log into their local or domain account (no manual login required).

Stopping Monitoring (Clock-out)

User can stop monitoring by clicking the Stop button in the interface.

Monitoring cannot be stopped by the user.

Projects & Tasks

Users can create, select, and manage active tasks, sub-tasks, and view task history directly from the Agent's interface.

Users cannot manually create or choose a task. Tasks must be set up by an admin to be assigned automatically based on usage.

Default Task

No default task is set by the system.

Admins can set a default task for all users.

Data Capture

Tracks the user, not the computer. Multiple users on the same machine are tracked separately.

Tracks the computer. A new employee account is automatically created for each logged-on user. (Cloud users require a separate license for each new account).

User Profile Management

An admin must manually add the user and create a profile on the dashboard before installation.

The user/employee profile is created automatically on the dashboard upon the Agent's first connection.

Computer Names

Computer names do not have to be unique.

Computer names must be unique. Only the first computer with a non-unique name will be monitored.

Offline Recording

Not supported.

Supported. The Agent records activity when the network connection is lost.

Offline Policy Enforcement

Supported, but only if the user was on an active session when the network connection was disrupted.

Supported regardless of session status.

Locked Session Time

Does not count productivity or session time for locked sessions.

Productivity and session time are counted for locked sessions.

Remote Lockout Action

Does not support the Employees > Lock or Rule > Lock Out actions. You can, of course, freeze keyboard and mouse input from the Session Player.

Supports the Employees > Lock and Rule > Lock Out actions as well as the freeze actions.

Installation Methods

Supports only simple local installation (must run the installer directly on the machine).

Stealth Agent: Supports advanced installation, including remote deployment via Remote Dashboard, GPO, or PSEXEC.

The Standard Agent only supports local installation.

Installation Privilege

Can be installed by the end-user.

Requires administrator privileges for installation.

Installation Path (Windows)

Installed in a single folder/directory.

Installation Parameters

Supported.

Stealth Agent: Supported.

Standard Agent: Not supported.

Uninstall Protection

Not supported.

Stealth Agent: The Windows version of the Stealth Agent supports password-protected mode to prevent users from removing the Agent with the Removal Tool.

Standard Agent: Not supported.

Primary Use Case

Best for transparent, non-obtrusive monitoring of remote employees, contractors, and freelancers who need to manage their time/tasks.

Stealth Agent: Optimized for discreet monitoring where user awareness is not required.

Standard Agent: Offers the same robust monitoring capabilities as the Stealth Agent, but prevents unauthorized use and ensure privacy compliance.

Did this answer your question?