Solved

How do I monitor employee activity on a computer discreetly?

Posted on 2009-04-02
9
453 Views
Last Modified: 2012-05-06
I have an employee who I am suspecting of conducting illegal activities. Therefore, I am keen to monitor any emails sent from and to his work computer, and any web browsing activities he performs on the computer, including accesing gmail or hotmail using the web browser.

The problem is that this employee has domain administrator and exchange administrator access into part of our organisation so unfortunately I cannot put any obvious exchange rules onto the mail server. Therefore, I am looking to see if there are any software I can install discreetly onto the employee's computer in order to monitor his activities on the laptop.

I have also have full domain administrator access into any computer onto the domain. It is not easy for me to get hold of his computer physically.
0
Comment
Question by:jwlchan
  • 2
  • 2
  • 2
  • +3
9 Comments
 
LVL 5

Accepted Solution

by:
LinkNJ earned 100 total points
ID: 24055128
I know somebody that used the software below just for the trial period and said they liked it.  I have no experience with it myself:
http://www.global-spy-software.com/remote_desktop_spy/
Good luck, Rob.
0
 
LVL 8

Assisted Solution

by:skywalker39
skywalker39 earned 200 total points
ID: 24055152
Hi jwlchan,

There's a program called Activity Monitor, here's the link: http://www.softactivity.com/employee-monitoring.asp

Hope this helps.
0
 
LVL 17

Assisted Solution

by:Jared Luker
Jared Luker earned 100 total points
ID: 24055184
I hate to recommend it, but you'd probably be best suited with a hardware key logger.  Software key loggers will give you and your AV software a headache.

Something like this (just reference... not a recommendation)  http://www.keyghost.com/

If you have a spam filter, like the Barracuda devices, you might be able to have a peek at his inbound e-mails (again... a recommendation without regard to legalities of the issue.)
0
 
LVL 2

Expert Comment

by:Pixies21
ID: 24055219
Yeah, I worked for a company used software similar to what skywalker39 suggested.
They used remote monitoring tools to view our desktops in realtime and we were unable to detect when they were on our machine.  It may have actually been Activity Monitor, but I don't know for sure.

I'll try to find out.
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 
LVL 1

Author Comment

by:jwlchan
ID: 24055269
Thank you very much for everybody's help. I will try out each of the program detailed above on a laptop which should have the identical security setup (group policy, antivirus, firewall, etc).

jared_luker: I appreciate your suggestion of hardware keylogger but since he uses a laptop and is rarely unattended it is not easy for me to use the hardware keylogger.

As luck would have it, we do have barracuda like devices in our organisation and we can extract his inbound cooperate email without leaving too much traces. It is the outbound which will be an issue (he has full exchange rights for his mail server) - and the fact that we suspect he uses webmail anyway.
0
 
LVL 8

Assisted Solution

by:skywalker39
skywalker39 earned 200 total points
ID: 24055839
I forgot to mention another one, it's called Spector CNE Investigator. Here's the link to there site: http://www.spectorcne.com/
0
 
LVL 6

Assisted Solution

by:jimmmg
jimmmg earned 100 total points
ID: 24057938
i know one that is pretty smart for office use, powerful and affordable, u can take a look and have a free trial:
www.employee-monitoring.net 
0
 
LVL 1

Author Closing Comment

by:jwlchan
ID: 31566023
I am sure the above information would be able to help with my problem However, this job was changed to another person to deal with so I am no longer need to worry about it at all.
Anyway, thanks for the information.
0
 
LVL 6

Expert Comment

by:jimmmg
ID: 25213186
professional employee monitoring software for monitoring interent and computer activity:
http://www.monitoring-softwares.com/employee-monitoring-software.html 
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A quick step-by-step overview of installing and configuring Carbonite Server Backup.
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
A short film showing how OnPage and Connectwise integration works.
Concerto provides fully managed cloud services and the expertise to provide an easy and reliable route to the cloud. Our best-in-class solutions help you address the toughest IT challenges, find new efficiencies and deliver the best application expe…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now