Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How to log user activity?

Posted on 2003-10-23
4
279 Views
Last Modified: 2013-12-04
Hi,
  My company only got 10 people and we don;t use server.  All we use peer-to-peer network connection with WindowsXP.

  My boss want to monitor the users everyday activity like where they visit from Internet, what document they use etc..   How can we do??  Can we install something and we check the log ?

Please advise
0
Comment
Question by:gorexy
4 Comments
 
LVL 11

Expert Comment

by:ewtaylor
ID: 9609652
yes just do a google search on keyboard loggers
0
 
LVL 18

Expert Comment

by:JConchie
ID: 9610519
and then hire a good employment lawyer...................
0
 

Accepted Solution

by:
centium earned 50 total points
ID: 9612430
For logging what uses access on a system I'd recommend using GPO's on the workstations itself.  You don't need a Domain to enable them.

Just open up the MMC (Start -> Run -> mmc) console and add the Group Policy snap inn.

Here's the path in the GPO snap inn:

Local Computer Policy -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policy -> Audit Policy

Here's a link to descibe the options within this Snap in:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/prodtech/win2000/win2khg/appxa.asp

This can keep track of new/open/changed/deleted files as well as logins and other user based events.


Hope this helps some.
0
 

Author Comment

by:gorexy
ID: 9720366
can we log where does the user visit??  We want to log the user accesss internet activities .
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question