Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Computer Monitoring Tools

Posted on 2003-11-12
7
Medium Priority
?
303 Views
Last Modified: 2010-04-14
I would like to monitor everything a user does WITHOUT them knowing. I want to know when the user logs in, and what exactly he/she is doing. If possible I would like the utility to take screenshots. Is there a well documented free utility or something inexpensive that I can use? If no free utilities exist, what are some good monitoring tools that I should consider?
0
Comment
Question by:gbarrientos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9733757
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9733770
Also this

http://www.sysinternals.com/ntw2k/source/regmon.shtml

http://www.labmice.net/Utilities/networkmonitor.htm

These are general monitoring tools about computer and its performance..

>>  user does WITHOUT them knowing   - I am not sure if this can be answered .....Experts suggestions might be misused

Sunray
0
 
LVL 9

Author Comment

by:gbarrientos
ID: 9734035
The misused concern is understood. Allow me to clarify: I am trying to find out who is doing what on my servers. There are a couple of people that have access to the servers and lately I have found apps such as VNC, IRC and other possible malicious apps installed on my servers. When i question the allowed users they all deny knowledge, but someone had to do it. So i want to use these monitoring utilities to find who is at fault and have the ability to gather enough evidence. Now that I think about it... the users can be aware that their actions are being monitored but CANNOT have the ability to turn off the tool without proper authorization.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 1

Expert Comment

by:FlowMotion
ID: 9734348
I use TightVNC to monitor the activity on my LAN in real time.  I'm not sure if this is a viable option for you, as I'm not sure what kind of environment you're working in.  I know with our small 12 client LAN, it works very effictively in that the clients know I am able to monitor them, that alone deters alot of misuse of our machines.  The only drawback to the setup I am currently running is:

In order to keep the clients unaware that they are being monitored, I have to start the service on their machine from the server when I wish to view what their doing (this prevents the Icon from being displayed in the system tray) and stop it when finished.  It can become quite tedious, especially if you're running a large network.  As long as you start the service while they're logged in, and kill it before the next login, the icon will never appear and they'll never know they were being watched.  
0
 
LVL 48

Accepted Solution

by:
Mikal613 earned 1500 total points
ID: 9734487
Ive used them all and the best is spybuddy
http://www.sharewaresoft.com/SpyBuddy-download-473.htm

My workers have no clue!!!

Screenshots, timely emails
0
 
LVL 32

Expert Comment

by:LucF
ID: 9734953
For a safe way to trace a lot of information of what a user does, try  http://msdn.microsoft.com/library/default.asp?url=/library/en-us/netdir/adsi/iadsuser.asp

LucF
0
 
LVL 2

Expert Comment

by:hakalugi
ID: 9740013
anyone ever used spy buddy on a 2k3 terminal server?  seems like a cheap way to have full idea of what's being done on the box by remote users.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The online market is growing at an unprecedented rate and retail eCommerce sales are expected to reach $4 trillion by 2020. Yet, the profit is not just there for the taking because you have to set yourself apart from the competition.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question