10 ways to monitor what your users are doing with company computers

Like it or not, organize chairmen nowadays should go up against the additional errand of playing Big Brother — checking representatives’ utilization of the PCs and system. Regardless of whether the organization’s administration theory takes into account some private utilization of organization hardware, you regularly need to realize what Web locales workers are going to, what records they’re sending and accepting, and even what they’re stating in their email. That is on the grounds that representative activities can subject the organization to financial misfortune, common claims, and even criminal allegations on the off chance that they include think or unplanned divulgence of private organization data, transmission of explicit entertainment, or presentation to vindictive code. This rundown covers 10 ways you can monitor what your clients are doing with the organization’s PCs.

#1: Use examining to screen access to documents

On a Windows organize, you can monitor which documents representatives open — or even fizzled endeavors to get to records — by utilizing the review arrangement include that is incorporated with the working frameworks. In Windows 2000 or more, examining is empowered by means of Group Policy. Setting up reviewing of access to records and envelopes is a two-advance process: First, you should empower evaluating in the Group Policy interface; at that point, you should set inspecting in the properties of the specific system objects (documents or organizers) you need to review. For nitty gritty directions on the best way to set up inspecting of access to documents, organizers, and printers on a Windows XP PC, see KB article 310399.

#2: Examine reserved Web records

In the event that you have just a couple of PCs and need to discover what Web destinations their clients are going by, you might have the capacity to do it without purchasing any exceptional programming in the event that you look at the Web program’s reserve (called Temporary Internet Files in Internet Explorer). Duplicates of the pages and illustrations that a client downloads are put away here so they can be all the more immediately showed if the client needs to backpedal to a similar page. In any case, adroit clients who visit destinations they don’t need you to think about may clear the reserve to keep you from seeing these records.

You can make this circumvention more troublesome on Windows XP PCs by utilizing the User Restrictions Tool in Microsoft’s free Shared Computer Toolkit to deny clients access to the Internet Options determination on the Tools menu, which is the interface for getting to and clearing the History and Temporary Internet Files.

#3: Monitor Web access at the firewall

Another approach to screen which Internet Web locales clients are going to will be to arrange your firewall to investigate Web destinations got to as indicated by client name as well as PC name. Endeavor level edge firewalls, for example, Microsoft’s ISA Server, Cisco PIX, and CheckPoint Firewall-1, either have worked in revealing highlights or have additional items accessible that can give reports of all Web locales got to through the firewall and from what record and PC they were gotten to.


#4: Filter Web access by URL

You can go above and beyond. As opposed to simply checking which Web destinations representatives visit, really piece unwanted locales. This is a particularly decent strategy on account of obscene locales that could subject your organization to lewd behavior claims or destinations that are known to contain malignant programming downloads, for example, some programmer destinations. You may likewise need to obstruct certain “recreational” locales (amusement subjects, talk destinations, and so on.) to keep representatives from sitting idle when they ought to work.

There are many blocking programs accessible, going from those proposed for home clients (NetNanny, Cybersitter) to effective undertaking level bundles, for example, those made by SurfControl, Websense, and GFI referenced previously.

#5: Filter Web access by watchwords

The issue with URL or area name sifting is that you need to know the URLs of the locales you need to screen or square. Numerous organizations keep up boycotts of Web locales that have been resolved to be unwanted as per specific criteria (counting the sellers of most Web-blocking programming). Be that as it may, regardless of whether these rundowns are refreshed every now and again, it’s far fetched they’ll contain all bothersome Web locales.

Rather than blocking locales just by address, some application sifting firewalls and extra Web-blocking projects can channel destinations by catchphrases.

#6: Monitor approaching and active email messages

You can screen representatives’ email messages utilizing projects, for example, Spector CNE from SpectorSoft. It joins the highlights of its Spector Pro observing programming for shoppers with establishment, arrangement, and sending abilities for corporate systems. You can consequently catch and audit both sent and got messages and set up alarms to advise you in a flash if specific words or expressions are distinguished. CNE likewise screens IM interchanges, Web perusing, and other Internet movement and incorporates keystroke logging and depiction recording.

#7: Monitor texts (IMs)

Since they’re traded progressively and clients some of the time write before they think, texts are frequently a wellspring of security breaks. You can piece texting by and large by designing your firewall to obstruct the ports utilized by IM programs or by utilizing programming, for example, Akonix Enterprise or Symantec IM Manager. In any case, since texting can really be helpful in the business condition, helping clients and empowering quick correspondences with associates, merchants, and so on., you may want to control it as opposed to square it. The Akonix and Symantec projects can likewise be utilized to control and screen IM correspondences by applying strategies to particular gatherings and clients and catching utilization insights and other data. You can, for instance, permit visit yet forbid document sharing highlights of IM programs.

#8: Use keyloggers to catch composed information

Keyloggers record all data that is composed on a PC’s console and come in two kinds: equipment and programming based. The equipment gadgets, for example, KeyGhost, are little gadgets that introduce between the console’s connector and the PS2 or USB port on the PC. Programming keyloggers can be arranged to send the caught keystrokes to you on a remote PC and are regularly included as a feature of the usefulness of a more wide based observing system, for example, CNE, or more affordable, customer situated projects, for example, SpyRecon.

#9: Use screen catch apparatuses to discover what clients are doing

Like keyloggers, screen catch utilities are frequently incorporated into checking bundles. Not at all like keyloggers, they empower you to screen what your workers read on their screens, not simply data they write in. So notwithstanding discovering the URL of a Web website a representative went to, you can really observe the webpage that was shown on his or her screen, an opened Word record or designs document, the substance of a discourse box, a computer game being played by the worker.

#10: Control what programming workers can introduce or run

You can utilize worked in devices in Windows XP and Server 2003 to control representatives’ establishment and running of programming. Keep clients from introducing programs by means of Group Policy’s User Rights and utilize the Software Installation highlight to deal with the dispersion of programming all through the association. At that point, you can utilize Group Policy’s Software Restriction Policies to personality programming running on your system’s PCs and to control whether those projects can run.

About the Author