Skip to content

Browsermon Introduction

Welcome to Browsermon, the revolutionary browser monitoring tool designed to provide unparalleled insights into browsing activities. With seamless compatibility with Google Chrome, Mozilla Firefox, and Microsoft Edge browsers, Browsermon stands as a unique solution in the realm of browser monitoring. Whether operating in real-time mode or scheduled mode, this tool meticulously records browsing histories, capturing a comprehensive range of 18 distinct parameters.

Features

  • Comprehensive Monitoring: BrowserMon captures a rich set of 18 browsing parameters, providing a comprehensive view of browsing activities. This depth of data enables accurate analysis and informed decision-making.

  • Data Privacy: BrowserMon focuses solely on browser history and does not infringe upon broader internet activity or compromise user privacy beyond the scope of browsing data.

  • Non-Intrusive Monitoring: One of the standout benefits of BrowserMon is its non-intrusive monitoring capability. Regardless of the operating system you’re using, BrowserMon operates seamlessly behind the scenes without causing disruptions or interfering with other data on your system.

  • Centralized management with Watchdog - Only for enterprise version: Browsermon enterprise is managed by Watchdog. Which serves as a centralized management and licensing server for Browsermon agents installed in the enterprise. Watchdog operates on a dedicated Linux server (or VM) and registers all enterprise Browsermon instances to perform health checking and validate licenses.

  • Incremental Reads: Browsermon reads the history in incremental mode. This means that the reader maintains a cache file named {reader}_cache, where a counter is stored for each profile indicating how many records have been read. On the next run, it reads only the records that come after the last read position. Browsermon also has an intelligent feature: if the user's history file has not been modified, it will not run the query. To maintain these incremental reads, you must preserve the cache file. Make sure that it is present; otherwise, duplicate records will be read each time.

  • EUNOMATIX Threat Intel (ETI) - Only for enterprise version: Browsermon enterprise provide advanced URL threat intel. Identifying potential security threats such as phishing and malware This ensures that enterprises can effectively safeguard their users from malicious websites by automatically classifying URLs based on a continuously updated threat intelligence database collected from OSINT like URLhause and Phishtank.

Browsermon application captures a rich set of 18 browsing parameters in CSV or JSON format.

Parameter Description
hostname The name of the host computer.
os Operating system used (e.g., Windows).
os_username Operating system username.
browser Web browser used (e.g., edge).
browser_version Version of the web browser.
browser_db Database type/version used by the browser.
profile_id Identifier for the browser profile (if applicable).
profile_title Title of the browser profile.
profile_username Username associated with the browser profile.
profile_path File path to the browser profile data.
username Username of the profile.
session_id Unique identifier for the session.
referrer Referrer URL (if any).
url URL of the webpage visited.
title Title of the webpage visited.
visit_time Time of the visit.
visit_count Number of times the URL was visited.
url_classification Class of URL

License

Browsermon Comm is available under MIT License

MIT License

Copyright (c) 2025 Eunomatix

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.