Solved

Tracking a laptop users activity in the field

Posted on 2007-03-29
1
258 Views
Last Modified: 2013-11-15
Hello,

 I have a user who spends a majority of their time off our network and in the field, and some concerns have been raised about this user’s activity. I will have an opportunity to have this user’s laptop in front of me in a few days, and again in two weeks. I would like to be able to see any files that may have been transferred to a removable storage device.

Thank you in advance
0
Comment
Question by:knada242
1 Comment
 
LVL 2

Accepted Solution

by:
altra22 earned 500 total points
ID: 18825378
Here is a spy monitor software that can log user activity in stealth mode you can install it and make the program send you the log over mail

http://www.brothersoft.com/security/monitoring_software/pc_spy_monitor_xp_38506.html
there's many programs like this
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CPU at 100% usage, why? 27 133
Mailchimp - Security and where is the data stored? 2 52
MS hosted exhange security 2 35
How do You Stop a DDoS Attack 7 28
Ensuring effective and secure communication in the age of healthcare BYOD.
With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question