Solved

Tracking a laptop users activity in the field

Posted on 2007-03-29
1
262 Views
Last Modified: 2013-11-15
Hello,

 I have a user who spends a majority of their time off our network and in the field, and some concerns have been raised about this user’s activity. I will have an opportunity to have this user’s laptop in front of me in a few days, and again in two weeks. I would like to be able to see any files that may have been transferred to a removable storage device.

Thank you in advance
0
Comment
Question by:knada242
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
altra22 earned 500 total points
ID: 18825378
Here is a spy monitor software that can log user activity in stealth mode you can install it and make the program send you the log over mail

http://www.brothersoft.com/security/monitoring_software/pc_spy_monitor_xp_38506.html
there's many programs like this
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Video by: Tony
This video teaches viewers how to export a project from Adobe Premiere Pro and the various file types involved.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question