Below are the list of features we test the keyloggers to have. In order for you to easily understand what they all mean, we united them into groups, wrote you explanations and added a mindmap on this page.


Here we test if keylogger logs all the keyboard-related information.

Keychars – usual typed keys: letter, numbers, signs, etc.

System Keys – such keys as Ctrl, Alt, Space, Enter, etc, all the ones that are pressed, but not printed

Ability to Change View between All Keys/Read Easy – feature allowing you to either see all the keys typed, or to see the text that all ended up with

Comparison of What is Written with User and Application – this feature will allow you to understand in which application the text was written

Clipboard – allows you to see which text was copied/pasted into the clipboard

Files & Apps.

Here we see how the keylogger performs with apps and files. Which of possible manipulations with them, it can detect.

Files Creating – records if a file was created

Files Removing – records if a file was removed

Files Copying – detects if a file was copied

Files Printing – shows which file was printed

Files Uploading to Internet/USB – logs uploading files somewhere to the Internet, or their copying to attached USD device

Apps Launch Time – records a time when application was launched

Apps Stop Time – records when application was stopped

Apps Installation – detects installation of new software

Apps Removal – detects if some of the software was removed from PC


Here we see how good keylogger is at logging online activities of a user under monitoring.

Browsers – see if a keylogger can log the visited websites, not only the URLs typed, but also the ones clicked, i.e. all his Internet surfing in tested browser (except HTTPS traffic, that’s a separate category)

  • Google Chrome – Internet surfing in Google Chrome, one of the most popular browsers in the world
  • Mozilla Firefox – websites visited in Mozilla Firefox, another popular browser
    Microsoft Edge – all the webpages opened in Microsoft Edge, a default browser in Microsoft Windows OS

Messengers – see if a keylogger can monitor conversation in instant messengers (only both sides of conversations counts)

  • Facebook Messages – chats in Facebook, one of the most popular social networks
  • Skype Messages – chats (not calls) made in Skype, one of the most popular software for phone calls, yet is also very popular as an instant messenger
  • Google Talk Messages – all the chats (not calls) via GTalk, a very popular instant messenger by Google company
  • Slack Messages – all the correspondence in Slack, new, yet already very popular service for instant messaging, mostly within the companies or groups of people working together

Social Networks – here we see if keylogger detects user’s acitivity in social networks (logging in, visiting profiles, pages, etc)

  • Facebook – user’s activity in Facebook, one of the most popular social networks
  • Twitter – user’s actions in Twitter, one of the most popular social networks with posts limited to 140 characters
  • LinkedIn – user’s activity in LinkedIn, the most popular social network for finding a new job or new business connections

Emails in Desktop Client – logging the emails sent and received via desktop Email clients, such as Microsoft Outlook, Mozilla Thunderbird, Mail, etc.

HTTPS Traffic – logging of information sent via encrypted, HTTPS protocol. This protocol is usually used to send some sensitive information, such as passwords, credit card numbers, etc.


Here we test if keylogger records various events, happening more with PC itself, then with its files.

PC Turn On – recording PC turn on time

PC Turn Off – logging PC turn off time

Inactivity Time – detecting a time interval during which user was inactive (no actions with PC were made, i.e. user either was away from PC or didn’t use it)

USB Device Attaching – detecting the fact of attaching a USB device to PC


Here we check what options the keylogger has to configure the screenshots making.

Quality/Size – a feature allowing the user to change the quality of screenshots, thus increasing or decreasing their size in the location they are being saved to

Quantity – a feature, allowing the user to configure the number of screenshots per time interval for a keylogger to make

Per Action – an option of a keylogger to make a screenshot every time a key action happens, e.g. every time a Space button is pressed, a browser is opened, a word is typed, etc.

Uploading to Cloud – an option to upload screenshots to a server and store them there, not on a monitored PC

Second Display – ability of a keylogger to monitor second display attached to the PC

Logs & Reports.

Here we look at how the information logged is shown to a user and what he can do with the log-files.

Aggregated Statistics – any kind of summary about user’s activity, like most used websites, top 10 launched apps, etc.

Filters – feature, allowing user to separate various types of information from each other

  • By Date – allows filtering the logged information by date when it was logged
  • By User – allows filtering information recorded by PC users that had made these actions
  • By Application – allows filtering logs by applications used
  • By Keyword – allows performing a keyword search

Remote Sending – a feature, allowing the keylogger to send log-files somewhere outside the monitored PC

  • By Email – sending log-files to a specified email address
  • To the Cloud – uploading log-files to some remote server


A set of features allowing the keylogger to restrict this or that activity. Pay attention to this category if the main aim you are searching keylogger for is parental control.

Apps – allows blocking the software/applications from starting

Users – allows blocking the users accounts from using PC

Websites – allows blocking the websites from visiting

Attached USB devices – allows blocking of the attached USD devices (flash-drives, hard disks, etc.)

Blocking by Schedule – a feature, allowing the keylogger to perform any or all of the three ones mentioned above in a specified time, days of the week, month, etc.


These features help the keylogger to hide either itself or the information logged from other people

By Password – a keylogger that has this feature won’t show its control panel or any of information logged until user puts in the proper password

Started By Hotkey Combination – a feature allowing the user to start logging or access keylogger’s control panel by simultaneously pressing a set of keys

Started By Secret Keyword – a keylogger with this feature can start logging or show the user its control panel, one the user types a secret word anywhere on the screen

Hidden Executable File – this feature means that the keyloggers executable file is hidden from other users

Remote Removal of Log-files/Self-Removal – this feature allows the user to remove the log-files from the place they are stored in remotely

Encrypted Log-Files – this means that if someone finds log-files on your PC, he won’t be able to view them without the access to the keylogger itself.