Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How can I track a specific user account during a set range of time each day as to waht they are doing

Posted on 2006-10-26
8
Medium Priority
?
183 Views
Last Modified: 2010-04-11
I need to know a way to determine what activity a user is doing on our system during a set period of time each day for example 11-12 every day

Thank you
0
Comment
Question by:MyDanes
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
8 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17812622
There are spying programs like SpectorPro that track URL's, programs opened, log keystrokes, take screen shots etc... BackOriface is free and can do the same things.
-rich
0
 

Author Comment

by:MyDanes
ID: 17812682
Rich, thank you and I am on the site now reading about it.  will it run on a server

and can I specify to only monitor a specific user
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17812717
Will it be installed on their machine, or on a TerminalServer ? Either should work with TS or RemoteDesktop but I'm not positive. You can place the program in the "startup" directory for that user (if they've logged on to that pc/server before and have a profile) c:\documents and settings\user_name\Start Menu\Programs\Startup
-rich
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 

Author Comment

by:MyDanes
ID: 17813337
can you please give me the 'link' to backoriface so I can be sure I am at the correct site

thank you
0
 

Author Comment

by:MyDanes
ID: 17813389
Rich thank you!  If you could get me the link for it I think it sounds like it will work.  The user does have a profile - we log in through citrix and the servers are 2003!

0
 

Author Comment

by:MyDanes
ID: 17813409
with the management console I have it logging logins so I can see the person is logging on but have no way to determine activity thus I need this tool.  the company won't permit me to just ax her from certain hours (seems the most plausible solution to me) but wants to know what they are doing after hours on the company's system.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 17814471
0
 
LVL 4

Expert Comment

by:LBACIS
ID: 17815402
Just an FYI that the Supreme Court has upheld some expectation of privacy in certain situations even if the equipment is completely owned by the company. Besides there are tons of ways to skin this cat within group policy and firewall. Give me some details and I will try to help out.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question