Pros

  • Makes it easy to determine exactly what’s being done by the user
  • Generates screenshots of all activity
  • Captures everything that happens on the monitored computer

Cons

  • Somewhat limited because the reporting tool requires access to shared files on the monitored computer
  • Reveals personal information such as passwords and user IDs