Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Internet use monitoring on Windows Server 2003

Posted on 2006-11-09
7
207 Views
Last Modified: 2010-04-10
I have been asked by management to investigate staff Internet use, to make sure no inappropriate sites are visited and that all Internet use is work-related. This will be per-username, as users don't necessarily use the same workstation each time.

Without installing additional software, I'd like a list of every website each user visits (i.e. a separate list for each user) to be stored somewhere accessible to IT administrators (preferably on the server, if this won't slow down the loading of websites), for up to 30 days.

I was initially thinking of maybe redirecting the Temporary Internet Files folder to a location on the server, then using the list of cookies to generate such a list. However, not all sites use cookies, and users are able to delete cookies in Internet Explorer.

[We are running Windows XP Pro on workstations connected to a Windows 2003 file server. I have used the term "Internet" broadly here - I'm referring to http access via Internet Explorer; we can leave Telnet, FTP et al. alone for now!]
0
Comment
Question by:skrysiak
7 Comments
 
LVL 14

Expert Comment

by:Juan Ocasio
ID: 17907562
Why not just look at the log files?
0
 
LVL 26

Expert Comment

by:jar3817
ID: 17907680
"...to make sure no inappropriate sites are visited and that all Internet use is work-related."

Unless you have software in place to filter content, I guarantee that inappropriate sites are being visited.

You could go with some commercial windows-based software to filter your web access like surfcontrol or you can go the free linux route with squid and dansguardian. I use both at the school I work for, surfcontrol is our main filter and if that box were to explode, dansguarian can be used a backup. Both work fairly well for me.
0
 
LVL 3

Expert Comment

by:KVR_Solutions
ID: 17908336
Set up your server as a proxy server. That's the easiest way without purchasing extra hardware or software.

However, this will create a bottleneck and make file access slow.

Another solution would be to google "network monitoring software demo" and try and find a software company that will give you a demo for the 30 days or so. You may be able to milk out an enterprise level solution to get the results you want - for free.

Ira @ KVR

0
Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

 

Author Comment

by:skrysiak
ID: 17920881
I know for sure that not all Internet use is work-related! We're quite laissez-faire at our company, but we need our staff to be using the Internet only as part of their job, and with staff using different workstations throughout the day it is easy to abuse this.

We use a filter already, but they don't always block sites such as email portals based outside of the company, MySpace, and personal blogs. Log files are easy for users to delete, as they are stored locally on the user's workstation.

I had already considered the proxy server idea, but the server already handles a lot of large files over about 100 users, so file access is likely to be slow.

I guess what would be ideal is to automatically copy the contents of Temporary Internet Files or History to a folder per-user on the server where I can manually monitor what's going on. This would work better if it were silent, i.e. so that staff weren't able to see where files are being stored. Does anyone know if this (or something similar) is possible??
0
 
LVL 26

Expert Comment

by:jar3817
ID: 17921383
If you already have a filter, its logs should have all the data you need. What kind of filter is it?
0
 
LVL 1

Accepted Solution

by:
babu_pm earned 200 total points
ID: 17929506
hi, there is a alternate way, that you can restrict the user from visiting unauthorised websites,

first, list down the websites, that essentially need for your company business.

but you must do it for all computers.

the instruction is available in Microsoft Knowledge base,
the Article ID is 267930

hope it will works.
0
 

Author Comment

by:skrysiak
ID: 17937519
Thanks for that, seems to have worked so far. Getting some complaints from the typing pool though - seems they can't live without LiveJournal and Hotmail!
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
eigrp routing loop 5 59
How to change the nameserver on Ubuntu Server 6 48
Windows 7 Networking - Public vs. Work vs Public 8 35
Disabling SNMP Write-Access on Switches 6 28
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question