Solved

monitor users, security breach

Posted on 2008-10-31
10
316 Views
Last Modified: 2013-12-04
Hello Experts,

I have 5 terminal servers that allow my plant workers to use thin clients to logon.
Each department has a workstation.
So say i have a windows department, with 8 employees that work in it.
the username is different for each department, with a generic password for all departments.
Recently i have had some reports of one department that is no 24 hours logon being used to probe our network.
I know the username and the password and to which termial server they are logging.
What i want to try and do, is catch them "in the act" so to speak.
I can turn on secuity logging on the domain and monitor for logon times, thats my first step.
Are there any other tips or tricks that will aid me in dealing with my offender?
0
Comment
Question by:wlacroix
  • 3
  • 3
  • 2
  • +2
10 Comments
 
LVL 14

Expert Comment

by:dfxdeimos
Comment Utility
Do you have a baseball bat?

Seriously though, what types of tips are you looking for? How to detect logins, monitor what they are doing, etc...
0
 
LVL 18

Expert Comment

by:sk_raja_raja
Comment Utility
hahhhhahahhhahahahahhhahahhhaha...... probably you should some spy agent on those workstations as a background service, but still it will not be more effective
0
 
LVL 18

Expert Comment

by:sk_raja_raja
Comment Utility
probably you can install the dameware client on these workstations and see from your machine what they are doing...even the VNC would help
0
 
LVL 18

Expert Comment

by:sk_raja_raja
Comment Utility
The Classroom Spy Professional allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers from your computer

http://www.sharewareconnection.com/titles/remote-screen.htm
0
 
LVL 9

Expert Comment

by:BDoellefeld
Comment Utility
I've used employee activity monitor before, it's ok.

http://www.imonitorsoft.com/products.htm
0
Want to promote your upcoming event?

Is your company attending an event or exhibiting at a trade show soon? Are you speaking at a conference? Spread the word by using a promotional banner in your email signature. This will ensure your organization’s most important contacts are in the know.

 
LVL 3

Author Comment

by:wlacroix
Comment Utility
the workstations in my plant are dumb terminals, i use standard PCs with boot disks to hit my terminal servers, so nothing to install on the local, they dont even have hard drives.

So with all the users logged into termial services i need to monitor a session.

Can i view what they are doing without having to ask them permission, i think its a termial server setting but need to test.
0
 
LVL 14

Accepted Solution

by:
dfxdeimos earned 250 total points
Comment Utility
0
 
LVL 3

Author Comment

by:wlacroix
Comment Utility
dfx,

what i got out of that article is the ability to remote into a users session without permission. Thank you. I will award you partial points if anything else comes up.

In the mean time, where can one buy a bat :)
0
 
LVL 3

Author Comment

by:wlacroix
Comment Utility
tonqxiaofeng,

this product looks to be designed for the desktop. We are running terminal services and I dont remember reading anything regarding terminal services.
0
 
LVL 4

Expert Comment

by:neopumpkin
Comment Utility
late contribution, i know, but why didn't anyone mention that wlacroix could have used terminal services manager to view the session that his users are logged into.  

wlacroix, the setting you referred to is on the properties page of the users account in AD. on the terminal services tab, you can specify whether a user is required to click ok or not when viewing their session.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around t…
This video discusses moving either the default database or any database to a new volume.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now