StopMonitor FAQ

Frequently Asked Questions - STOPMonitor

 

What is STOPMonitor?

What operating systems are compatible with STOPMonitor?

What Web browsers are compatible with STOPMonitor?

Is the STOPMonitor Web-based Console limited to only one user/administrator in my enterprise?

Do I have to download the STOPMonitor Web-based Management Console application to my computer?

How do I know that I have the latest version of STOPMonitor?

How does STOPMonitor help me to manage my assets?

Can I see my device on a map if it has the STOPMonitor agent installed?

Why are some of our assets reporting from Kansas, or off the West coast of Africa? We have none deployed there.

Is STOPMonitor compatible with my anti-virus application?

How do I install the STOPMonitor agent on my Windows-based device?

Can I uninstall the STOPMonitor agent from my device?

I’ve forgotten my STOPMonitor login password. How do I reset it?

My laptop was stolen. Can I remotely install STOPMonitor on it the next time it connects to the Internet?

Will STOPMonitor enable me to take pictures of the thief or screen shots on my stolen device?

A device that is protected by STOPMonitor was lost or stolen. What do I do?

 

What is STOPMonitor?

STOPMonitor is a software application that enables you to track, monitor and geolocate devices in real-time through a secure Web-based Management Console. Features also include: operating system and hardware/software applications monitoring and Users/Groups management and event logging.

 

STOPMonitor Pro provides these additional functions: real-time geolocation using Wi-Fi triangulation (more accurate than IP); real-time remote encryption and bootlock; pre-set triggers to encrypt or bootlock even if the device is offline.

 

What operating systems are compatible with STOPMonitor?

Currently STOPMonitor is compatible with Windows-based and MacOS systems:

— Windows 2000 with Service Pack 5

— Windows XP with Service Pack 3

— Windows Vista

— Windows 7

— Windows 8.1

— Windows Server 2003

— Windows Server 2008

— Macintosh OSX

 

Note: Microsoft’s Windows .NET 2.0 Framework is required for agent operation and can be downloaded via Windows Update or from the Microsoft support site.

What Web browsers are compatible with STOPMonitor?

STOPMonitor has been tested with the following Web browsers:

— Mozilla Firefox

— Internet Explorer 7 or later

— Google Chrome

— Safari

 

Is the STOPMonitor Web-based Console limited to only one user/administrator in my enterprise?

No. There is no limit to the number of users or administrators who can access STOPMonitor’s Web-based Management Console. However, with security issues in mind, STOP recommends that access is limited only to essential personnel with proper security credentials.

 

Do I have to download the STOPMonitor Web-based Management Console application to my computer?

No. STOPMonitor and all assets protected by the STOPMonitor agent are managed through a secure Web-based Management Console, which is accessible from any Internet-connected PC using any of the standard Web browsers. Only the agent needs to be installed on the device you want to protect.

 

How do I know that I have the latest version of STOPMonitor?

The STOPMonitor agent is self-updating. Updates will periodically be received automatically and silently installed on devices that already have the agent installed. You can check the current version number of any agent from the Web-based Management Console in the main Asset list or in the Asset Detail view.

 

How does STOPMonitor help me to manage my assets?

Once the STOPMonitor agent is installed on a device, it captures the hardware and software configurations of that asset, which administrators are able to view through the Web-based Management Console. This feature is especially helpful to enterprise administrators who must ensure employee- and user compliance policy requirements are being met.

 

Can I see my device on a map if it has the STOPMonitor agent installed?

Yes, STOPMonitor and STOPMonitor Pro enable administrators to view the geolocation of the device on a Google Map through the Web-based Management Console. STOPMonitor enables geolocation using Public IP Address. The Pro Version enables more precise geolocation through Wi-fi triangulation.

 

Why are some of our assets reporting from Kansas, or off the West coast of Africa? We have none deployed there.

This is a common issue with the Standard Version of STOPMonitor, not because of problems with our application, but because of the way Public IP Address data are entered, stored and handled by ISPs and the geolocation services’ databases. If IP Address data are entered inaccurately, or if there is a non-existent reference in the databases, the locations on the map could be off. For example, if the reported geolocation coordinates are blank, the asset will be plotted in the middle of the US (Kansas); and sometimes the reported coordinates are 0,0 – which corresponds to off the West coast of Africa. In addition to protecting your data, STOPMonitor Pro avoids these issues by using a combination of WiFi triangulation, cell tower triangulation, and GPS if equipped to ensure accurate geolocation.

 

Is STOPMonitor compatible with my anti-virus application?

Generally, yes. But in rare cases, the StopMonitor client agent may trigger false positives on antivirus software; this is easily fixed by whitelisting the executable files associated with STOPMonitor. STOP can assist with this if needed.

 

How do I install the STOPMonitor agent on my Windows-based device?

The STOPMonitor agent can be installed as interactive installation, a silent install, or mass deployment

 

— Interactive single installation

      —Download installer

      —The installer will provide you with on screen directions

 

— Mass Deployment is used for repetitive manual installs (from a network share or USB drive) or for mass deployment via network login scripts or Group Policy. In a silent installation, all interactive setup screens will be repressed and no user interaction is required. Silent installation is typically initiated from a batch file or shortcut.

      —Ability to install agent silently, with no user interaction

      —Option to create verbose installation log

      —Option to include asset tag or serial number data to be included with install

      —Option to describe the asset

      —Organization's GUID required for install

 

— STOPMonitor installer included in master disk image. Use the image-mode if you are installing the agent as part of a standard disk image. 

 

Detailed instructions on installations modes are provided in the STOPMonitor User Guide provided with deployment.

 

Can I uninstall the STOPMonitor agent from my device?

Yes, owners/adminstrators can quickly uninstall or delete the STOPMonitor agent from a device or batch of devices. Instructions for deleting STOPMonitor are included in the User Guide in the Web-based Management Console.

 

I’ve forgotten my STOPMonitor login password. How do I reset it?

If you forget your password, click the “forgotten password” link on the login page (https://monitor.stoptheft.com) and enter the email address you use for logging in to STOPMonitor. A password reset form will be sent to that email address. STOP does not store or manage clients’ passwords, so we cannot reset them.

 

My laptop was stolen. Can I remotely install STOPMonitor on it the next time it connects to the Internet?

STOPMonitor cannot be installed on stolen or missing devices. Installation requires user interaction with administrative privileges either through a network connection, mass-installation or disk image prior to loss or theft incidents.

 

Will STOPMonitor enable me to take pictures of the thief or screen shots on my stolen device?

No. STOPMonitor does not integrate with on-board camera devices or enable screen grabs.

 

To avoid possible legal issues, be sure to check with your local privacy laws and/or privacy policies at your organization when considering deploying other types of tracking software that use these image-capture features.

 

A device that is protected by STOPMonitor was lost or stolen. What do I do?

You have a few options, depending on which version of STOPMonitor is installed on the missing PC:

 

STOPMonitor:

Provides Public IP Address of the server through which the missing device is reporting to the STOPMonitor Web-based Management Console. Use the Public IP Address to geolocate the missing device on the Google Map that appears to the right of the device profile in the Web-based Management