Tools for tracking usage in detail!

Discussion in 'Software' started by zapp, Mar 7, 2005.

  1. zapp

    zapp Staff Sergeant

    Friends
    I do consulting and have a need from several clients to track usage, in detail, in such a way that the tools and logs remain hidden from public users.

    In the current world of malware-everywhere these folks have systems that get used by a variety of users [i.e. part time employees], and end up with all kinds of baggage that then has to be swept up. you know what I mean. Additionally, either intentionally or not, some transgress the thin line into illegal areas such as porn, terror-related, greyware, etc that jeopardizes the integrity of the business. Last but not least: parents!

    What package or packages work best and are fairly easy to maintain by lightweight users. They don't need to be paying me to do the monitoring and cleanup.

    Thanks
    Zapp [TechWest]
     
  2. jujet84

    jujet84 Master Sergeant

    Some info are these clients using XP
    Quote:
    If you are running Windows Server 2003 (or Windows 2000 and Windows XP), many of the security requirements are built in with the operating system. So why not take advantage of them if they are already there?

    Many Internet security threats involve a user accessing data that they should not have access to. One of the most common ways of preventing this (one which all administrators know about and implement), is to use ACLs (Access Control Lists). This way you can set permissions and deny users access to data that they should not be accessing (this even applies to home users who have networks that may store sensitive data).

    Another security measure is to take advantage of the security options within group policies. There are a number of different settings that can be configured that will limit what other users can do on the network and/or computer. For example, you can use a group policy to limit which computers users can log on to. And, of course, security auditing gives you a quick and simple way of monitoring events on your network.
     
  3. zapp

    zapp Staff Sergeant

    Some clients are running XP, some Win98, some ME. This is not merely an issue of turning on and/or installing safety measures. Users are sometimes devious, and will disable the protective measures, and take pains to bury their activities.
    Finally, it is useful to simply monitor, and establish a pattern, before taking action. That way if the boss needs to have a discussion with an employee, there is a clear trail/pattern.
    z
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds