Enterprise-grade endpoint visibility and control with a local-authority trust model. Your machines, your rules.
╔═══════════════════════════════════════════════════════════╗ ║ EyeLog Agent ║ ╠═══════════════════════════════════════════════════════════╣ ║ Status: ● ACTIVE ║ ║ Manifest: standard v2.1.0 ║ ║ Collector: collector.example.com:11129 ║ ║ Connected: Yes (mTLS) ║ ╠═══════════════════════════════════════════════════════════╣ ║ INFO Capabilities: ║ ║ ✓ System Metrics ✓ Network Telemetry ║ ║ ✓ Inventory ✗ Security Monitoring ║ ╠═══════════════════════════════════════════════════════════╣ ║ CONTROL Capabilities: ║ ║ ✓ Config Push ✓ Diagnostics ║ ║ ✓ Lock Screen ✗ Remote Shell ║ ╚═══════════════════════════════════════════════════════════╝
A lightweight agent that provides real-time visibility into what's happening on your machines, with the control capabilities you need to respond.
Real-time visibility into processes, connections, services, and everything happening on your endpoints.
Local-authority trust model. Your machines, your rules. The agent decides what it will do—not the collector.
Execute commands, manage services, respond to incidents—all with capability-based permissions.
Separate channels for control and data. Each optimized for its purpose.
UDP-based, handles high throughput, multiplexed streams, 0-RTT reconnection
Reliable delivery, bidirectional streaming, strong typing with Protobuf
Mutual authentication, encrypted in transit, certificate-based identity
From basic visibility to full incident response. Choose what you need.
The agent—controlled by a local administrator—has final say over what it will do. No blind trust in centralized infrastructure.
To compromise an agent, an attacker needs ALL THREE layers:
Transport protection. Agent ↔ Collector connection encrypted and mutually authenticated.
Content protection. Capability manifests are cryptographically signed. Password required to sign.
Human gate. Local administrator must approve capability changes with elevated privileges.
A YAML document defines exactly what the agent will do:
manifest:
id: "standard"
version: "2.1.0"
name: "Standard Monitoring"
# What the agent will SEND
info:
metrics:
enabled: true
categories: [cpu, memory, disk, network]
inventory:
enabled: true
exclude: [user_accounts] # Privacy
security_monitoring:
enabled: false # Explicitly disabled
# What the agent will ACCEPT
control:
diagnostics:
ping: true
traceroute: true
execution:
shell: false # No remote shell!
system:
lock_screen: true
reboot: false
# Who controls capabilities
meta:
collector_can_manage_capabilities: false
Free tier for individuals. Premium features for teams that need more.
Individual / Hobbyist
Small Teams
Growing Orgs
Large Orgs / Regulated
All plans include: mTLS encryption, capability manifests, local admin control, and the same agent binary.
Feature availability is determined by your license, not a different agent build.
Deploy your first agent in under 5 minutes. No credit card required for Core tier.