![]() ![]() #3: Monitor Web access at the firewallĪnother way to monitor which Internet Web sites users are visiting is to configure your firewall to report on Web sites accessed according to user name and/or computer name. You can make this circumvention more difficult on Windows XP computers by using the User Restrictions Tool in Microsoft’s free Shared Computer Toolkit to deny users access to the Internet Options selection on the Tools menu, which is the interface for accessing and clearing the History and Temporary Internet Files. However, savvy users who visit sites they don’t want you to know about may clear the cache to prevent you from seeing these files. Copies of the pages and graphics that a user downloads are stored here so they can be more quickly displayed if the user wants to go back to the same page. If you have only a few computers and want to find out what Web sites their users are visiting, you may be able to do it without buying any special software if you examine the Web browser’s cache (called Temporary Internet Files in Internet Explorer). For detailed instructions on how to set up auditing of access to files, folders, and printers on a Windows XP computer, see KB article 310399. Setting up auditing of access to files and folders is a two-step process: First, you must enable auditing in the Group Policy interface then, you must set auditing in the properties of the particular network objects (files or folders) you want to audit. In Windows 2000 and above, auditing is enabled via Group Policy. On a Windows network, you can keep tabs on which files employees open - or even failed attempts to access files –by using the audit policy feature that’s built into the operating systems. #1: Use auditing to monitor access to files This list covers 10 ways you can keep tabs on what your users are doing with the company’s computers. That’s because employee actions can subject the company to monetary loss, civil lawsuits, and even criminal charges if they involve deliberate or accidental disclosure of confidential company information, transmission of pornography, or exposure to malicious code. Even if the company’s management philosophy allows for some private use of company equipment, you often need to know what Web sites employees are visiting, what files they’re sending and receiving, and even what they’re saying in their e-mail. Like it or not, network administrators these days must take on the added task of playing Big Brother - monitoring employees’ use of the computers and network. This information is also available as a PDF download. Even if the company’s management philosophy allows for some private use of company equipment, you often need to know. 10 ways to monitor what your users are doing with company computers ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |