Set up Usage Tracking

The following options are available when setting up Usage Tracking:

  • Log current activity: logs all activity in real-time, making it possible to see instantly which users are using which applications.
  • Log history: if selected, all application usage is logged.
    • Detailed history logs specific dates and times of usage. For example: a user started Microsoft Word on Monday between 11:00 and 13:00, and on Tuesday between 15:00 and 16:00.
      This information is shown on the Details tab of the Usage Tracking Viewer, and includes the following data:
      • when the application was used
      • by whom
      • for how long
      • on which system
      • what the processor usage was for that application during the time it was used.
    • Cumulative history does not include specific dates and times, but cumulates the application usage data for the specified period. For example: a user had Microsoft Word open for a total of 3 hours in Week 2017-12.
      It includes the following data:
      • when the application was used
      • by whom
      • for how long
      • on which system
      • what the processor usage was for that application during the time it was used.
  • Log Session Information: logs all information concerning sessions. The storage duration of the session information depends on the number of days you enter in the Keep session history field.
  • Anonymous logging: filters user names from the information provided. This can be used to protect users' privacy.
  • Enable Usage Tracking access for end-users and application managers: provides end users and Application Managers with access to Usage Tracking from within their Workspace Control session. A user can only see personal information about his own sessions and applications. An Application Manager can only see information related to the applications he manages.
  • Enable Website Usage Tracking and log web sites visited by Internet Explorer: logs all websites visited by the end user. If selected, you also need to enable third-party browser extensions in Microsoft Internet Explorer (via Tools > Internet Options > Advanced > Browsing > Enable third-party browser extensions or via Microsoft Windows system policies that are set up for your company. Microsoft Internet Explorer Enhanced Security Configuration disables this option by default.
  • Log path and executable in addition to application name: logs the application path, executable and name. This can be used to distinguish between different applications with the same name, which can be useful when comparing application usage for reporting purposes.
  • In some countries or companies, Usage Tracking can conflict with privacy policies. If so, it is advisable not to use Usage Tracking.
  • The Usage Tracking database only stores OU information on the lowest OU level. This means that if the OU structure changes, the information displayed by Usage Tracking will change accordingly.
  • The Usage Tracking settings Log current activity, Log history and Anonymous logging also apply to WebTrace.
  • If you enable Usage Tracking access for end users, they can view their website usage in the Usage Tracking viewer.
  • Microsoft Internet Explorer instances running as a Workspace Extension (RES Subscriber for VDX and VDX) are not tracked by WebTrace.