?
Solved

How to log user activity?

Posted on 2003-10-23
4
Medium Priority
?
282 Views
Last Modified: 2013-12-04
Hi,
  My company only got 10 people and we don;t use server.  All we use peer-to-peer network connection with WindowsXP.

  My boss want to monitor the users everyday activity like where they visit from Internet, what document they use etc..   How can we do??  Can we install something and we check the log ?

Please advise
0
Comment
Question by:gorexy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 11

Expert Comment

by:ewtaylor
ID: 9609652
yes just do a google search on keyboard loggers
0
 
LVL 18

Expert Comment

by:JConchie
ID: 9610519
and then hire a good employment lawyer...................
0
 

Accepted Solution

by:
centium earned 200 total points
ID: 9612430
For logging what uses access on a system I'd recommend using GPO's on the workstations itself.  You don't need a Domain to enable them.

Just open up the MMC (Start -> Run -> mmc) console and add the Group Policy snap inn.

Here's the path in the GPO snap inn:

Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policy -> Audit Policy

Here's a link to descibe the options within this Snap in:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/prodtech/win2000/win2khg/appxa.asp

This can keep track of new/open/changed/deleted files as well as logins and other user based events.


Hope this helps some.
0
 

Author Comment

by:gorexy
ID: 9720366
can we log where does the user visit??  We want to log the user accesss internet activities .
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Suggested Courses
Course of the Month8 days, 8 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question