Solved

How to log user activity?

Posted on 2003-10-23
4
280 Views
Last Modified: 2013-12-04
Hi,
  My company only got 10 people and we don;t use server.  All we use peer-to-peer network connection with WindowsXP.

  My boss want to monitor the users everyday activity like where they visit from Internet, what document they use etc..   How can we do??  Can we install something and we check the log ?

Please advise
0
Comment
Question by:gorexy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 11

Expert Comment

by:ewtaylor
ID: 9609652
yes just do a google search on keyboard loggers
0
 
LVL 18

Expert Comment

by:JConchie
ID: 9610519
and then hire a good employment lawyer...................
0
 

Accepted Solution

by:
centium earned 50 total points
ID: 9612430
For logging what uses access on a system I'd recommend using GPO's on the workstations itself.  You don't need a Domain to enable them.

Just open up the MMC (Start -> Run -> mmc) console and add the Group Policy snap inn.

Here's the path in the GPO snap inn:

Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policy -> Audit Policy

Here's a link to descibe the options within this Snap in:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/prodtech/win2000/win2khg/appxa.asp

This can keep track of new/open/changed/deleted files as well as logins and other user based events.


Hope this helps some.
0
 

Author Comment

by:gorexy
ID: 9720366
can we log where does the user visit??  We want to log the user accesss internet activities .
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Host Profile issue on Esxi 5.5 U3a 6 613
latest list of viruses / malware signatures for F-Secure 5 97
Forensic audit of SBS 2008 3 98
FTP server windows 2008 5 60
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question