Solved

Computer Monitoring Tools

Posted on 2003-11-12
7
300 Views
Last Modified: 2010-04-14
I would like to monitor everything a user does WITHOUT them knowing. I want to know when the user logs in, and what exactly he/she is doing. If possible I would like the utility to take screenshots. Is there a well documented free utility or something inexpensive that I can use? If no free utilities exist, what are some good monitoring tools that I should consider?
0
Comment
Question by:gbarrientos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9733757
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9733770
Also this

http://www.sysinternals.com/ntw2k/source/regmon.shtml

http://www.labmice.net/Utilities/networkmonitor.htm

These are general monitoring tools about computer and its performance..

>>  user does WITHOUT them knowing   - I am not sure if this can be answered .....Experts suggestions might be misused

Sunray
0
 
LVL 9

Author Comment

by:gbarrientos
ID: 9734035
The misused concern is understood. Allow me to clarify: I am trying to find out who is doing what on my servers. There are a couple of people that have access to the servers and lately I have found apps such as VNC, IRC and other possible malicious apps installed on my servers. When i question the allowed users they all deny knowledge, but someone had to do it. So i want to use these monitoring utilities to find who is at fault and have the ability to gather enough evidence. Now that I think about it... the users can be aware that their actions are being monitored but CANNOT have the ability to turn off the tool without proper authorization.
0
Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

 
LVL 1

Expert Comment

by:FlowMotion
ID: 9734348
I use TightVNC to monitor the activity on my LAN in real time.  I'm not sure if this is a viable option for you, as I'm not sure what kind of environment you're working in.  I know with our small 12 client LAN, it works very effictively in that the clients know I am able to monitor them, that alone deters alot of misuse of our machines.  The only drawback to the setup I am currently running is:

In order to keep the clients unaware that they are being monitored, I have to start the service on their machine from the server when I wish to view what their doing (this prevents the Icon from being displayed in the system tray) and stop it when finished.  It can become quite tedious, especially if you're running a large network.  As long as you start the service while they're logged in, and kill it before the next login, the icon will never appear and they'll never know they were being watched.  
0
 
LVL 48

Accepted Solution

by:
Mikal613 earned 500 total points
ID: 9734487
Ive used them all and the best is spybuddy
http://www.sharewaresoft.com/SpyBuddy-download-473.htm

My workers have no clue!!!

Screenshots, timely emails
0
 
LVL 32

Expert Comment

by:LucF
ID: 9734953
For a safe way to trace a lot of information of what a user does, try  http://msdn.microsoft.com/library/default.asp?url=/library/en-us/netdir/adsi/iadsuser.asp

LucF
0
 
LVL 2

Expert Comment

by:hakalugi
ID: 9740013
anyone ever used spy buddy on a 2k3 terminal server?  seems like a cheap way to have full idea of what's being done on the box by remote users.
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows 2000 Sever Lab Setup 1 703
Windows 7 7 281
Trust between Windows Domains 2000/2003 and Windows 2012-R2 2 309
Migrating from IIS5 to IIS8.5 3 187
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Unified and professional email signatures help maintain a consistent company brand image to the outside world. This article shows how to create an email signature in Exchange Server 2010 using a transport rule and how to overcome native limitations …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Suggested Courses

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question