A practical “triage → timeline → decision” playbook for SMBs and MSPs using live view + optional screenshot history — so you can verify what actually happened on a specific company computer (without guessing).
This is a technical playbook. Legal admissibility varies by country and use case — always clarify with qualified counsel.
Use the live grid as a radar, then zoom into one PC to investigate details.
Sometimes something simply doesn’t add up: an employee’s results do not match claimed working hours, a customer reports slow responses while the agent claims they were “working the whole time”, or you spot unusual behavior on one specific workstation. In those moments, you don’t want to guess. You want a clear technical way to answer two questions:
(1) What is happening right now? (live view)
(2) What happened earlier? (screenshot history, if enabled)
This article turns that into a simple workflow you can repeat: a short live check (triage), then a time-based reconstruction (timeline), then a decision based on evidence. It’s designed for SMB owners and IT service providers/MSPs who support company-controlled Windows PCs.
Compliance & legal disclaimer (no legal advice): Monitoring software may only be used if it is lawful in your country and lawful for your specific use case (for example training supervision, quality assurance, or security). In many jurisdictions, users must be informed and/or explicit consent is required. This article is technical information only. Before deployment or any investigation, obtain independent legal advice in all relevant countries and implement appropriate policies, transparency steps, and access controls.
In real operations, “suspicious activity” usually starts as a signal — not proof. The goal is to validate context quickly and avoid overreaction.
Even technically, investigations go wrong when scope is unclear. Define these four items first:
Live view = triage (short, targeted). History = timeline (only if you truly need it). Don’t turn monitoring into permanent watching.
Live view answers the “what is happening right now?” question. In Wolfeye, live view typically updates as periodic screenshots (often around every 2–3 seconds, depending on setup). The purpose is fast clarity, not endless observation.
Live view gives technical context. If you need organisational or HR action, follow your internal process. Keep notes factual (“what was on screen”), not interpretive (“what they intended”).
Grid view helps you scan many screens quickly, then focus on one PC for investigation.
Live view alone can’t answer “what happened earlier?” That’s where screenshot history becomes useful — but only if you enabled it and only for PCs where you actually need a timeline.
In a typical screenshot-based live setup, a current screenshot is sent to the server so it can be shown in the dashboard. The previous screenshot is overwritten by the new one. That means: without history enabled, you do not have a timeline — you only see “now”.
History is commonly disabled by default. If you choose to enable it, you typically select an interval (for example every 1, 5, or 10 minutes). Operational guidance:
Store and review only what you need for the defined purpose. Too much history creates noise and increases organisational risk. Keep scope small and purpose-based.
Teams get faster (and safer) when they use a consistent documentation format. Below is a simple worksheet you can copy into your ticket system or incident notes. Keep it factual and time-based.
INCIDENT ID: Reported by: Date / Time (timezone): Device (PC name): User / role: Trigger (what felt suspicious?): SCOPE - Time window to review: - Live check performed at: - Screenshot history enabled? (yes/no) - History interval (if yes): LIVE VIEW (NOW) - What was on screen? - Which website/app/window? - Any obvious errors/warnings? - Immediate risk indicators? (yes/no) TIMELINE (PAST) [Time] [What is visible on screen] [Notes] 14:05 CRM export page Export started 14:10 File archive tool Large folder compressed 14:15 Upload page / webmail Destination visible 14:20 Returned to normal tools Context unclear DECISION - Likely benign / workflow issue? - Training/coaching needed? - Security escalation needed? Actions taken: Next review time: Owner:
Use your internal policies and legal advice to define who may document and access such notes.
Single-screen live view: use it for detail during investigation, not for constant watching.
After triage and (if needed) timeline review, you usually end up in one of three buckets. This keeps investigations constructive and prevents “monitoring drama”.
If you see strong indicators (unknown installers, mass exports to unapproved destinations, credential harvesting patterns, etc.), follow your internal incident process. Typical technical steps (examples, not exhaustive):
Note: HR/employment actions and legal admissibility are jurisdiction-specific. Obtain legal advice before taking steps that affect employment or privacy rights.
For IT providers, “investigation capability” is valuable — but it must be governed. A clean MSP workflow reduces mistakes and builds trust.
Clients buy outcomes: faster incident clarification, fewer blind spots, better training and QA. When you present it that way, it becomes easier to sell as a managed service — with clear boundaries, limited access, and a documented purpose.
Always align scope and governance with the client’s legal advice and internal policies.
This video shows the exact workflow: open the live dashboard, zoom into one PC in a larger view, and (if enabled) use screenshot history to review earlier moments by date and time.
Reminder (no legal advice): Use monitoring software only if it is lawful in your country and for your specific use case. Where required, inform users and obtain consent. Always obtain independent legal advice before deployment.
Video: “How to Investigate Suspicious Activity on a Company PC - Live View + History”.
When something feels off, the best outcome is not “more monitoring” — it’s faster clarity. A short live view triage confirms what is happening now. If you enabled it, screenshot history lets you rebuild a timeline and make decisions based on what actually appeared on-screen.
The repeatable model is simple: triage → timeline → decision. Keep scope narrow, document facts, restrict access, and integrate findings into your normal support/QA/security workflows.
Final reminder (no legal advice): Monitoring is only permissible if lawful in your country and for your specific use case. Where required, inform users and obtain consent. Always obtain independent legal advice before production use.
Wolfeye is monitoring software. Any use must comply with the laws and regulations that apply in all relevant countries, your industry and your specific use case (for example training supervision, quality assurance or security). In many jurisdictions, permissibility depends on factors such as prior information of users and consent requirements. This article and the embedded video are for general technical and organisational information only and do not constitute legal advice or a guarantee of legal admissibility.