Solved

User activity monitoring on workstations

Posted on 2008-06-11
4
844 Views
Last Modified: 2009-10-27
Hi Everyone,

I need an application that will monitor key activities on a particular workstation in the company, I would prefer a free solution (obvoiusly lol) however, if for the sake of a few $$ I can get a better solution I would be interested.

The things that I would like to monitor are as follows:

- Application Installation / Un-installation
- Web Activity, either through Firefox or IE
- Attachment / Detachment of removable storage

Thanks,

Xavier
0
Comment
Question by:drxav
4 Comments
 
LVL 12

Expert Comment

by:florin_s
Comment Utility
spector soft's spector pro is the best way to go. you could set it to monitor almost everything you can think off. www.spectorsoft.com
0
 
LVL 32

Accepted Solution

by:
Kamran Arshad earned 500 total points
Comment Utility
Hi,

Please check out the below options:

NetVizor
http://www.e-spy-software.com/employee_monitoring.shtml

Activity Monitor
http://www.softactivity.com/employee-monitoring.asp

IPrism
http://www.monitor.stbernard.com/monitoring-traffic.shtml

I don't think there is any open-source employee monitoring application, though using an Inventory application you can check the softwares installed on remote PCs.
0
 
LVL 4

Author Comment

by:drxav
Comment Utility
thanks guys I will test and get back soon :)
0
 
LVL 1

Expert Comment

by:flover
Comment Utility
Comparing most popular employee monitor softwares, I recommend Spector and IMonitor, the reason is those two softwares are all in one tools, and strongly stable and powerful.
If your company isn't so large and doesn't care cost, Spector would be first choice. Otherwise IMonitor must be satisfied with all you need.

However,spectorsoft is a little expensive compared with IMonitor. As Imonitor is also powerful and trusted, Imonitor would be your first choice.

http://www.imonitorsoft.com/
http://www.spectorsoft.com/
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now