Solved

Computer Monitoring Tools

Posted on 2003-11-12
7
298 Views
Last Modified: 2010-04-14
I would like to monitor everything a user does WITHOUT them knowing. I want to know when the user logs in, and what exactly he/she is doing. If possible I would like the utility to take screenshots. Is there a well documented free utility or something inexpensive that I can use? If no free utilities exist, what are some good monitoring tools that I should consider?
0
Comment
Question by:gbarrientos
7 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9733757
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9733770
Also this

http://www.sysinternals.com/ntw2k/source/regmon.shtml

http://www.labmice.net/Utilities/networkmonitor.htm

These are general monitoring tools about computer and its performance..

>>  user does WITHOUT them knowing   - I am not sure if this can be answered .....Experts suggestions might be misused

Sunray
0
 
LVL 9

Author Comment

by:gbarrientos
ID: 9734035
The misused concern is understood. Allow me to clarify: I am trying to find out who is doing what on my servers. There are a couple of people that have access to the servers and lately I have found apps such as VNC, IRC and other possible malicious apps installed on my servers. When i question the allowed users they all deny knowledge, but someone had to do it. So i want to use these monitoring utilities to find who is at fault and have the ability to gather enough evidence. Now that I think about it... the users can be aware that their actions are being monitored but CANNOT have the ability to turn off the tool without proper authorization.
0
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

 
LVL 1

Expert Comment

by:FlowMotion
ID: 9734348
I use TightVNC to monitor the activity on my LAN in real time.  I'm not sure if this is a viable option for you, as I'm not sure what kind of environment you're working in.  I know with our small 12 client LAN, it works very effictively in that the clients know I am able to monitor them, that alone deters alot of misuse of our machines.  The only drawback to the setup I am currently running is:

In order to keep the clients unaware that they are being monitored, I have to start the service on their machine from the server when I wish to view what their doing (this prevents the Icon from being displayed in the system tray) and stop it when finished.  It can become quite tedious, especially if you're running a large network.  As long as you start the service while they're logged in, and kill it before the next login, the icon will never appear and they'll never know they were being watched.  
0
 
LVL 48

Accepted Solution

by:
Mikal613 earned 500 total points
ID: 9734487
Ive used them all and the best is spybuddy
http://www.sharewaresoft.com/SpyBuddy-download-473.htm

My workers have no clue!!!

Screenshots, timely emails
0
 
LVL 32

Expert Comment

by:LucF
ID: 9734953
For a safe way to trace a lot of information of what a user does, try  http://msdn.microsoft.com/library/default.asp?url=/library/en-us/netdir/adsi/iadsuser.asp

LucF
0
 
LVL 2

Expert Comment

by:hakalugi
ID: 9740013
anyone ever used spy buddy on a 2k3 terminal server?  seems like a cheap way to have full idea of what's being done on the box by remote users.
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows WEb Server sp2 13 520
create a second domain controller and then make primary controller 9 554
Corrupted W2K  serverregistry 2 158
no logon server available 8 158
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The business world is becoming increasingly integrated with tech. It’s not just for a select few anymore — but what about if you have a small business? It may be easier than you think to integrate technology into your small business, and it’s likely…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question