DE EN ES
wolfeye.co
Pricing Demo & Trial

How to Investigate Suspicious Activity on a Company PC

A practical “triage → timeline → decision” playbook for SMBs and MSPs using live view + optional screenshot history — so you can verify what actually happened on a specific company computer (without guessing).

Key takeaways (read this first)

This is a technical playbook. Legal admissibility varies by country and use case — always clarify with qualified counsel.

On this page

Wolfeye dashboard grid view for investigating suspicious activity

Use the live grid as a radar, then zoom into one PC to investigate details.

Sometimes something simply doesn’t add up: an employee’s results do not match claimed working hours, a customer reports slow responses while the agent claims they were “working the whole time”, or you spot unusual behavior on one specific workstation. In those moments, you don’t want to guess. You want a clear technical way to answer two questions:

(1) What is happening right now? (live view)
(2) What happened earlier? (screenshot history, if enabled)

This article turns that into a simple workflow you can repeat: a short live check (triage), then a time-based reconstruction (timeline), then a decision based on evidence. It’s designed for SMB owners and IT service providers/MSPs who support company-controlled Windows PCs.

Compliance & legal disclaimer (no legal advice): Monitoring software may only be used if it is lawful in your country and lawful for your specific use case (for example training supervision, quality assurance, or security). In many jurisdictions, users must be informed and/or explicit consent is required. This article is technical information only. Before deployment or any investigation, obtain independent legal advice in all relevant countries and implement appropriate policies, transparency steps, and access controls.

1) What counts as “suspicious” (signals + scope)

In real operations, “suspicious activity” usually starts as a signal — not proof. The goal is to validate context quickly and avoid overreaction.

1.1 Common signals in SMB environments

1.2 Define scope before you look

Even technically, investigations go wrong when scope is unclear. Define these four items first:

  1. Which PC(s): one specific company-controlled Windows PC (start narrow).
  2. Which time window: “last 30 minutes” or “yesterday 14:00–16:00”.
  3. Which purpose: training/QA/security workflow (document internally).
  4. Who may view: restrict dashboard access to authorised roles only.

Rule that prevents chaos

Live view = triage (short, targeted). History = timeline (only if you truly need it). Don’t turn monitoring into permanent watching.

2) Live view triage: what to check in 2–5 minutes

Live view answers the “what is happening right now?” question. In Wolfeye, live view typically updates as periodic screenshots (often around every 2–3 seconds, depending on setup). The purpose is fast clarity, not endless observation.

2.1 Start with the grid (radar), then zoom

  1. Open the dashboard grid: scan for obvious anomalies (frozen screen, repeated dialogs, unexpected windows).
  2. Identify the target PC: open it in a larger view (single-screen tab) for details.
  3. Confirm context: what website/app/window is open right now?

2.2 What to look for on-screen (practical checklist)

2.3 Fast triage questions (write down answers)

Do not turn triage into a “debate”

Live view gives technical context. If you need organisational or HR action, follow your internal process. Keep notes factual (“what was on screen”), not interpretive (“what they intended”).

Wolfeye dashboard showing multiple company PCs in grid view

Grid view helps you scan many screens quickly, then focus on one PC for investigation.

3) Screenshot history: how to rebuild a timeline (if enabled)

Live view alone can’t answer “what happened earlier?” That’s where screenshot history becomes useful — but only if you enabled it and only for PCs where you actually need a timeline.

3.1 Important technical concept: live ≠ stored history

In a typical screenshot-based live setup, a current screenshot is sent to the server so it can be shown in the dashboard. The previous screenshot is overwritten by the new one. That means: without history enabled, you do not have a timeline — you only see “now”.

3.2 Enable history intentionally (interval choice)

History is commonly disabled by default. If you choose to enable it, you typically select an interval (for example every 1, 5, or 10 minutes). Operational guidance:

3.3 How to reconstruct what happened (step-by-step)

  1. Pick the time window: define start/end (“yesterday 14:00–16:00”).
  2. Scroll by timestamps: note what app/site/window appears at each step.
  3. Mark transitions: “CRM export started”, “upload page opened”, “unknown installer ran”.
  4. Cross-check with internal signals: ticket times, customer complaint timestamps, EDR alerts.

Minimal data principle (operational, not legal)

Store and review only what you need for the defined purpose. Too much history creates noise and increases organisational risk. Keep scope small and purpose-based.

4) Incident timeline worksheet (copy/paste)

Teams get faster (and safer) when they use a consistent documentation format. Below is a simple worksheet you can copy into your ticket system or incident notes. Keep it factual and time-based.

Incident timeline worksheet

INCIDENT ID:
Reported by:
Date / Time (timezone):
Device (PC name):
User / role:
Trigger (what felt suspicious?):

SCOPE
- Time window to review:
- Live check performed at:
- Screenshot history enabled? (yes/no)
- History interval (if yes):

LIVE VIEW (NOW)
- What was on screen?
- Which website/app/window?
- Any obvious errors/warnings?
- Immediate risk indicators? (yes/no)

TIMELINE (PAST)
[Time]  [What is visible on screen]  [Notes]
14:05   CRM export page             Export started
14:10   File archive tool           Large folder compressed
14:15   Upload page / webmail       Destination visible
14:20   Returned to normal tools    Context unclear

DECISION
- Likely benign / workflow issue?
- Training/coaching needed?
- Security escalation needed?
Actions taken:
Next review time:
Owner:

Use your internal policies and legal advice to define who may document and access such notes.

4.1 What “good notes” look like

Wolfeye full-screen live view of one company PC for investigation

Single-screen live view: use it for detail during investigation, not for constant watching.

5) Decision paths: benign vs. training vs. security escalation

After triage and (if needed) timeline review, you usually end up in one of three buckets. This keeps investigations constructive and prevents “monitoring drama”.

5.1 Bucket A: benign / expected work

5.2 Bucket B: workflow friction or training gap (common)

5.3 Bucket C: security escalation (treat as an incident)

If you see strong indicators (unknown installers, mass exports to unapproved destinations, credential harvesting patterns, etc.), follow your internal incident process. Typical technical steps (examples, not exhaustive):

Note: HR/employment actions and legal admissibility are jurisdiction-specific. Obtain legal advice before taking steps that affect employment or privacy rights.

6) MSP workflow: how to run investigations safely for clients

For IT providers, “investigation capability” is valuable — but it must be governed. A clean MSP workflow reduces mistakes and builds trust.

6.1 MSP checklist (operational)

6.2 Position it as an outcome (not surveillance)

Clients buy outcomes: faster incident clarification, fewer blind spots, better training and QA. When you present it that way, it becomes easier to sell as a managed service — with clear boundaries, limited access, and a documented purpose.

MRR-friendly packaging idea

Always align scope and governance with the client’s legal advice and internal policies.

7) Video walkthrough: Investigate suspicious activity (Live View + History)

This video shows the exact workflow: open the live dashboard, zoom into one PC in a larger view, and (if enabled) use screenshot history to review earlier moments by date and time.

Reminder (no legal advice): Use monitoring software only if it is lawful in your country and for your specific use case. Where required, inform users and obtain consent. Always obtain independent legal advice before deployment.

Video: “How to Investigate Suspicious Activity on a Company PC - Live View + History”.

FAQ – Investigating suspicious activity with live view + history

Is “live view” a continuous video stream?
No. In a typical Wolfeye setup, live view is based on periodic screenshot updates (often around every 2–3 seconds, depending on configuration).
Is screenshot history enabled by default?
No. History is usually optional and must be enabled intentionally. Choose an interval (e.g., 1/5/10 minutes) based on your purpose.
How do I avoid constant surveillance?
Use a trigger-based workflow: short live triage when there is a reason, and history only when you need a timeline.
Does this work for remote company laptops?
Technically yes, as long as the company-controlled PC is connected and can reach the dashboard over the internet.
Who should have access to the dashboard?
Only authorised roles. Treat it like an admin panel: least privilege, strong passwords, and clear purpose documentation.

Conclusion

When something feels off, the best outcome is not “more monitoring” — it’s faster clarity. A short live view triage confirms what is happening now. If you enabled it, screenshot history lets you rebuild a timeline and make decisions based on what actually appeared on-screen.

The repeatable model is simple: triage → timeline → decision. Keep scope narrow, document facts, restrict access, and integrate findings into your normal support/QA/security workflows.

Final reminder (no legal advice): Monitoring is only permissible if lawful in your country and for your specific use case. Where required, inform users and obtain consent. Always obtain independent legal advice before production use.

Want to test the workflow on your own company PCs?

Book a Demo & Start Your 14-Day Free Trial

Wolfeye is monitoring software. Any use must comply with the laws and regulations that apply in all relevant countries, your industry and your specific use case (for example training supervision, quality assurance or security). In many jurisdictions, permissibility depends on factors such as prior information of users and consent requirements. This article and the embedded video are for general technical and organisational information only and do not constitute legal advice or a guarantee of legal admissibility.

Chat with me on WhatsApp