Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Tracking a laptop users activity in the field

Posted on 2007-03-29
1
Medium Priority
?
267 Views
Last Modified: 2013-11-15
Hello,

 I have a user who spends a majority of their time off our network and in the field, and some concerns have been raised about this user’s activity. I will have an opportunity to have this user’s laptop in front of me in a few days, and again in two weeks. I would like to be able to see any files that may have been transferred to a removable storage device.

Thank you in advance
0
Comment
Question by:knada242
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
altra22 earned 1000 total points
ID: 18825378
Here is a spy monitor software that can log user activity in stealth mode you can install it and make the program send you the log over mail

http://www.brothersoft.com/security/monitoring_software/pc_spy_monitor_xp_38506.html
there's many programs like this
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Are you an Exchange administrator employed with an organization? And, have you encountered a corrupt Exchange database due to which you are not able to open its EDB file. This article will explain all the steps to repair corrupt Exchange database.
The main intent of this article is to make you aware of ‘Exchange fail to mount’ error, its effects, causes, and solution.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question