Top-Tracker Application Recommended Settings

Top-Tracker Application Recommended Settings

This document provides the recommended settings configuration for the Top-Tracker application. Follow the step-by-step guide below to ensure your tracker is set up correctly for optimal performance and compliance.

Step 1: Open Settings
Open the Top-Tracker application and click on the gear icon ( the main window to access the settings. ) located in the bottom-left corner of the main window to access the settings.


Step 2: Configure General Settings
In the General tab, make sure the following options are configured as shown below:

Tracking Interval : 5 minutes
Idle Timeout : 5 minutes
Resume Tracking After Idle : Checked
Take Screenshots : Checked
Activity Update Interval : Never
Review Images Before Upload : Unchecked
Note :  Make sure you do not enable 'Review Images Before Upload' to avoid upload delays.

Step 3: Configure Advanced Settings
In the Advanced tab, set the following options:


Screenshot Reviewing Time : 5 seconds
Blur Screenshots Before Upload : Unchecked
Blur Camerashots Before Upload : Unchecked
Randomized Tracking : Checked
Activity Auto-Complete : Checked
Ask Me for Activity Description : Both options unchecked

Step 4: Configure Tracking Sources
In the Tracking Sources tab, ensure the following settings are applied:


Count Keyboard Hits: Checked
Count Mouse Hits: Checked
Take Screenshots From: All Monitors
Camera: EasyCamera (or your available webcam)

Your Top-Tracker application configuration is now complete. With these settings, screenshots, camera shots, and activity tracking will function as intended for accurate time tracking and reporting. You can reach-out to HR or IT support any kind of issues you are facing. Do not change anything without knowledge of  HR or IT support.

Please note — review the settings regularly. If you find any changes, restore them as mentioned in the document. Ensure that all settings remain intact and in line with the documented configuration. Any unauthorized changes will be considered a policy violation. We must strictly adhere to company policies. Any violation may lead to disciplinary action by the management.
    • Related Articles

    • Palo Alto GlobalProtect VPN Usage Guide

      To maintain the security of our endpoints and infrastructure, it is mandatory to access company assets only via Corporate Wi-Fi or VPN when working remotely. While we have provisions for emergency exceptions to ensure business continuity, it’s ...