logging software to keep track of network user activaty

Posted on 2007-07-24
Last Modified: 2010-05-19
I have a client who wants to keep track of what users are doing on their computers.  IE: Internet pages, Programs opened, Messaging (Yahoo, MSN Messenger etc).  He wants to find out how productive each user is and if they are doing work or messing around.

The network is a MS Domain with sbs2003 server and all workatations are xp-pro
Question by:jcrust
    LVL 74

    Accepted Solution

    First, read my blog post on this subject:  "!AB2725BC5698FCB8!228.entry"

    Overall, I believe the managers should find out how productive employees are by setting goals and actively managing them rather than policing their activities.  I do realize that there are some instances where this may not be possible, or there is a regulatory agency which requires such monitoring.

    Then, I have used a few monitoring programs before that were implemented due to regulatory compliance.  The one that I thought worked best was Activity Monitor from  I recommend that this not be installed on the server, but rather on the workstation of the person who will use it.

    LVL 74

    Expert Comment

    by:Jeffrey Kane - TechSoEasy
    By the way, if you are in the US, you MUST issue an Acceptable Use Policy.  An example of one is at

    LVL 69

    Expert Comment

    LVL 8

    Expert Comment

    xpcspy :

    Healthy spare time activities in office environment cannot be just achieved by keeping a check, you need to still educate the staff after this monitoring with examples of better use of spare time in focus. Remember that unless the amount of work is overwhelming, its better for the staff to use it in some good activity than sit idle with their outlook opened in front, (a monitoring software will register a 90% working on mails...)

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    This video shows how use content aware, what it’s used for, and when to use it over other tools.
    This video will demonstrate how to find the puppet warp tool from the edit menu and where to put the points to edit.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now