It has a powerful ability to control all computers and resources on networks and monitor all activities on the networks, and to scan all information over the network, including host name, workgroups, IP address, MAC address and shared documents. Its strong network management can help to set restriction to Internet for each machine based on time .