π Overview
Stealth Monitoring is designed for company-owned devices and controlled environments where monitoring must run silently in the background.When enabled:
- Work tracking starts automatically on system startup
- Tracking stops automatically on system shutdown
- The Trackpilots desktop app is hidden from the user
- Users cannot view or control the monitoring agent
Once your new settings are saved, they will be applied and reflected on your dashboard and employee systems within 1 hour.
π Stealth Monitoring Table
The table lists all employees and their stealth monitoring configuration.Table Columns
| Column | Description |
|---|---|
| Full Name | Employee name and email address |
| Device Status | Current device status (Work Mode / Offline) |
| Enable Stealth Monitoring | Toggle stealth monitoring on or off |
| Action | Save configuration for the employee |
π΅οΈ Enable Stealth Monitoring
Controls whether stealth monitoring is enabled for the employee device.Options
- On β Hidden background monitoring enabled
- Off β Standard visible Trackpilots agent
Behavior
| Mode | Behavior |
|---|---|
| On | Agent runs silently on system startup |
| Off | Agent runs normally with visible UI |
π₯ Device Status
Shows the current status of the employeeβs device.Possible States
- Work Mode β Device is active and tracking
- Offline β Device is not connected or powered off
πΎ Saving Configuration
Each employee row includes a Save action to persist stealth monitoring settings.Flow
- Toggle stealth monitoring for the employee
- Click Save
- System stores the configuration
- Agent syncs and applies policy within 1 hour
π Impact on Trackpilots Modules
Stealth monitoring affects:- Work activity tracking
- Screenshot capturing
- App & website tracking
- Idle detection
- Attendance and productivity analytics
Stealth mode does not change tracking logic, only visibility and startup behavior.
π Permissions & Access Control
Only users with the following permissions can manage stealth monitoring:- Admin
- Custom Role with Stealth Monitoring Permission
π§© Developer Notes
- Stealth monitoring policies are stored in the Agent Policy Service
- Desktop agents run as background services/daemons in stealth mode
- Policies are synced via secure agent configuration endpoints
- API validation rules:
- Stealth flag must be boolean
- Device must be registered before enabling stealth
- Changes apply only to future sessions; active sessions may require restart
β οΈ Legal & Compliance Warning
Stealth monitoring is subject to strict legal and regulatory requirements.Important
- Use only on company-owned devices
- Inform employees and obtain consent where required
- Follow local labor and privacy laws (GDPR, IT Act, SOC2, ISO 27001)
- Avoid enabling stealth on personal (BYOD) devices without explicit policy
β Best Practices
- Enable stealth mode only for corporate-managed laptops
- Maintain internal monitoring policy documentation
- Provide transparency to employees
- Periodically audit stealth-enabled devices
- Combine with blur screenshots for privacy protection
π Example Stealth Monitoring Policy Matrix
| Role | Device Type | Stealth Monitoring |
|---|---|---|
| Full-Time Staff | Company Laptop | On |
| Remote Contractors | BYOD | Optional |
| Support Team | Company Laptop | On |
| Executives | Company Laptop | Optional |
| Test Accounts | Any | Off |
