Solved

Internet Expolrer History Collector

Posted on 2010-09-09
4
585 Views
Last Modified: 2013-11-15
Hi All

My problem is the following:

In my company policy, social networking is blocked like facebook, tweeter, and I am blocking them via the ISA Server.
My users run proxy-bypass applications like Freegate and UltraSurf and can access these blocked sites.

Is there any application or program to collect the IE history for the users and so I can know who is trying to access these sites? or any other recommendation?
I also don’t want to user Software Restriction policy from Active Directory to restrict applications.

0
Comment
Question by:alaaay
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 2

Expert Comment

by:ngmarowa
ID: 33634248
Hi.

A suggestion would be a proxy server that logs the websites visited by user. Not sure if ISA has this. Maybe you can try squid and run it in transparent mode
0
 

Author Comment

by:alaaay
ID: 33634262
The problem is tha the proxy Server can't log the real websites name, if he can dicover it it will be possible to block them.
But the UltrSurf hides this info
0
 
LVL 2

Expert Comment

by:ngmarowa
ID: 33634334
I am researching on how these application work but a crude way of doing it is disabling gateways on the client computers and access list on the routers
0
 
LVL 6

Accepted Solution

by:
jimmmg earned 125 total points
ID: 33642660
you can try some internet spy software to track users' website usage.
netvisor works fine with lan environment and spyagent for standalone pcs.
http://www.monitoring-softwares.com/ 
0

Featured Post

Space-Age Communications Transitions to DevOps

ViaSat, a global provider of satellite and wireless communications, securely connects businesses, governments, and organizations to the Internet. Learn how ViaSat’s Network Solutions Engineer, drove the transition from a traditional network support to a DevOps-centric model.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A list of useful business intelligence software.
Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Viewers will learn how to use the Hootsuite Dashboard.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question