KnowIT Getting Started Guide

KnowIT Getting Started Guide

Welcome to KnowIT!

Let’s get started by installing and activating KnowIT on your company devices. Once activated, you'll be able to set up your KnowIT account and start receiving reports.
  1.  Log in to your KnowIT portal using the log in credentials found in your welcome email
  2. Once logged in, you will see the 'Getting Started Wizard' window
  3. Click Install KnowIT to get started
  4. The 'Device Install Guide' will appear. Select the device you wish to install KnowIT on
  5. Follow the on-screen wizard to activate KnowIT. If you get stuck, use one of the installation guides
  6. After you have activated KnowIT, proceed to KnowIT Account Setup

 


    • Related Articles

    • KnowIT Account Setup Guide

      After you've successfully installed and activated KnowIT, it's time to setup your KnowIT Account. This will allow you to receive reports and is required to get the most of KnowIT. The Account Setup is just six steps: Set Timezone Updating User ID and ...
    • Installing KnowIT on PC

      Learn how to Install KnowIT on Employee PCs Before you Begin Temporarily disable anti-virus software (learn more) What we'll be doing Downloading KnowIT Running The KnowIT Installer Activating KnowIT Configuring Exclusions Viewing your data Step 1 - ...
    • Installing KnowIT on to a rooted Android device

      If you are looking to install KnowIT on to a non-rooted Android device please see below. Installing KnowIT on to a non-rooted Android device If you wish to access all of KnowITs features on your employees Android device you have to have rooted their ...
    • Installing KnowIT on Mac

      Learn how to Install KnowIT on Employee Macs What we'll be doing Preparing the Mac Downloading KnowIT Running The KnowIT Installer Activating KnowIT Viewing your data Step 1. Preparing the Mac For MacOS Yosemite devices and below, skip to Downloading ...
    • KnowIT FAQ

      What does KnowIT do? In a nutshell, you can monitor application use and web sites visited, various E-Mail and IM chats, prevent data leaks with file transfer and activity monitoring, set alerts for unusual or malicious network activity, receive ...