Solved

Monitoring Inet shared connection

Posted on 2001-06-14
2
213 Views
Last Modified: 2010-04-13
How can I monitor connections made by other computers in office LAN via my shared internet connection???
0
Comment
Question by:DMN
2 Comments
 
LVL 63

Expert Comment

by:SysExpert
ID: 6192463
What kind of monitoring ??

ICS does not have any good tools for knowing what sites have been visited etc.

For this you need a proxy server such as ms Proxy 2 or any 3rd party proxy.

I hope this helps !
0
 
LVL 4

Accepted Solution

by:
tengage earned 100 total points
ID: 6193126
little brother is a good third party tool for this.  It runs on a separate machine and doesn't interfere too much, just watches.  If you just want to see who's using the connection, then you could run NETMON.

Little Bro' (surf control)
http://www.surfcontrol.com/
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Task scheduler to manage event fails 4 779
Migrate DFS role 3 853
Windows 2000 Server Pagefile.sys Error 7 650
OLD CPUs 12 80
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
As a business owner, there are many things that keep you up at night. Profit margins, employee retention, human resource protocols, whether your product or service will remain competitive. When you own or manage a technology company that operates la…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question