Solved

Turn off client monitoring

Posted on 2002-07-11
11
187 Views
Last Modified: 2010-04-13

I heard from somebody that we as a network client (not network admin) can turn off the client monitoring to our computer if we use windows 2000 as our network operating systems.
Does anybody know how to do that?
Is there any way for network admin to prevent this?

Thank you,

Budenk


0
Comment
Question by:Budenk
  • 4
  • 2
  • 2
  • +3
11 Comments
 
LVL 7

Expert Comment

by:jmiller47
ID: 7147473
what do you mean by client monitoring?
0
 
LVL 7

Expert Comment

by:jmiller47
ID: 7147474
and what doyou mean by network client. You can only be a network client if you were a computer. You as a person are a network user....
0
 

Author Comment

by:Budenk
ID: 7147565
IThere is a feature in Windows 2000 for network admin to monitor the clients.
What I am asking is how to turn off the monitoring feature from client side.
I mean as a user, Can I disable that feature so the network admin is not be able to monitor my computer?
That's my question as if I am a user.

One more question from admin side:
If it's possible for user from client computer to turn off that feature.
How to prevent that?
0
 
LVL 7

Accepted Solution

by:
jmiller47 earned 100 total points
ID: 7147677
It would depend what the monitor software is. If you as an admin are just monitoringTempory Internet Files and history, a user can delete those files. If the admin is monitoring it will a specially-built software, possibly deleting the fiels will not do anything, everything is logged. If an Admin is using a Proxy server or equivalent firewall software, etc... he can log every single email, web site, etc... A user cannot do anything about it.

This situation is really up to what software and environment is in place.

If you are an Admin trying to make sure that users cannot circumvent your security policies, then if you list what you want to do, I'm sure one of us can help you.

If you are just a user trying to circumvent certain security and monitoring software, well then that is not the purpose of this forum and I highly doubt that any of the Experts here will offer any help.

0
 
LVL 12

Expert Comment

by:pjknibbs
ID: 7148440
Budenk: Even assuming this monitoring capability exists, and there is a way to turn it off, do you really think your network admin is going to be so stupid as to not NOTICE you've turned it off? Once he does notice, the mere fact you HAVE turned it off will immediately look suspicious, and he's likely to turn your machine upside down looking for anything dodgy.
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 7

Expert Comment

by:jmiller47
ID: 7149721
Or just send a new OS and software image image to it...
0
 
LVL 2

Expert Comment

by:Chicko
ID: 7151585
Its not a complete answer, however start by disabling the "Remote Registry Service" in Comp Management.
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 7151752
If you are on a DOMAIN with Policies enforced, then if it is properly setup, you should not be able to turn off access by the Network Admin.
Normally on a Domain, the Netadmin can directly acces all the local hard drives on any computer on the Domain. So unless you can turn that off, he can read any files, and check for anything he/she wants.

I hope this helps !
0
 

Expert Comment

by:modulo
ID: 7528507
Dear expert(s),

A request has been made to delete this Q in CS:
http://www.experts-exchange.com/Community_Support/CleanUp/Q_20411933.html

Without a response in 72 hrs, a moderator will finalize this question by:

 - Saving this Q as a PAQ and refunding the points to the questionner

When you agree or disagree, please add a comment here.

Thank you.

modulo

Community Support Moderator
Experts Exchange
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 7534828
Well there were quite a few comments.
My last one is probably very close to the truth in a Domain environment.

 I hope this helps !
0
 

Expert Comment

by:modulo
ID: 7542322
Request for delete rejected.

modulo

Community Support Moderator
Experts Exchange
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this article, I will show you HOW TO: Suppress Configuration Issues and Warnings Alert displayed in Summary status for ESXi 6.5 after enabling SSH or ESXi Shell.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now