Solved

Employee Web Monitoring Software

Posted on 2011-02-19
4
596 Views
Last Modified: 2013-12-07
Hello Experts,

I need to know if my employees are using the internet for non-work related purposes and if so, what sites they are visiting and the duration.  A quick search on Google reveals a plethora of employee monitoring options - it's quite overwhelming.  Perhaps someone can recommend a reliable, fairly inexpensive solution (under $200).  We're running  Win 2008 in workgroup mode with approximately 10 clients.  The ideal product would be invisible to all users at their workstations.  Additionally the product would not require a 3rd party website to access the reports/stats, but rather be accessible from the server or another admin's workstation.  

Thanks in advance,
Mike
0
Comment
Question by:jumptohigh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 5

Accepted Solution

by:
sameer_goyal earned 167 total points
ID: 34933462
This one is a good tool and we use it for our organization.

http://www.track4win.com/Buynow.asp

0
 
LVL 63

Assisted Solution

by:btan
btan earned 167 total points
ID: 34935791
The sure approach is to enforce client to direct all web traffic to a central central exit point using a proxy (or leverage on firewall /gateway). Typically this involved configuring the web browser to the proxy IP address. You can state that this is for the seek of monitoring web threats in the traffic , actually you are indirectly also able to see where user are going centrally via web content filtering. Killing two birds with one stone

Some solution include
a) BlueCoat Suite - It can be expensive though as it has an appliance (Bluecoat SG) as the proxy or gateway server. Client end will have Proxyclient installed to enforce the setting. For remote client there is also "free" K9 web protection at client end (free for home use). They have specific Web Filter solution but this may be beyond your needs. The pricing will be high
@ http://www.bluecoat.com/products/sg
@ http://www.bluecoat.com/products/proxyclient
@ http://www1.k9webprotection.com/aboutk9/overview

b) GFI WebMonitor - It enforce an Internet Usage Policy and reduce cyberslacking – time wasted by employees online. Check out the sample policy - minimally there should be such in paper (and as much as possible enforce in s/w instead of manual audit). The user's Internet browser must be configured to use the GFI WebMonitor server as the proxy to enforce web filtering. GFI WebMonitor counts either users or IP addresses for licensing purposes. This would depend if the traffic being processed by GFI WebMonitor has been authenticated or not.  GFI WebMonitor is also available as a dedicated plug-in for Microsoft’s Internet Security and Acceleration (ISA) Server and Threat Management Gateway Server (TMG).

@ http://www.gfi.com/internet-monitoring-software
@ http://www.gfi.com/internet-monitoring-software/webmonscreenshots.htm
@ http://www.gfi.com/internet-monitoring-software/sample-internet-usage-policy

C) WebSense Web Filter - Similar approach as above just that it can be flexible to scale (remove the security bulk unless needed) for small business needs. It is also a on-premise software but for pricing will need to check out, I believe it is license based

@ http://www.websense.com/content/web-filter-features-and-benefits.aspx

Overall, there are many means as you can see in this old (but still valid) summarised strategy below for a more holistic controls to keep in pace with the organisation exposure to threats due to non compliance by user. Note the use of keylogger and related for the stealthy part. To achieve stealthiest is rather hard - in the sense that user should accept the User acceptance policy before using of organization asset, so let them know instead and that would serve as greater reminder (and probably deterence to majority)

@ http://www.techrepublic.com/blog/10things/10-ways-to-monitor-what-your-users-are-doing-with-company-computers/192

#1: Use auditing to monitor access to files
#2: Examine cached Web files
#3: Monitor Web access at the firewall
#4: Filter Web access by URL
#5: Filter Web access by keywords
#6: Monitor incoming and outgoing e-mail messages
#7: Monitor instant messages (IMs)
#8: Use keyloggers to capture typed data
#9: Use screen capture tools to find out what users are doing
#10: Control what software employees can install or run
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 166 total points
ID: 34935923
I do Squid(Free)! I'd recommend running Squid with Dansguardian ....squid is the best but keep in mind it requires times and skills to install, manage and configure it with other components. I used it in many complex environments with success but again you need  the skill in Linux and squid (open source packages)...

check these documents too
http://www.linuxhelp.net/guides/squid/
http://wiki.squid-cache.org/
http://wiki.squid-cache.org/SquidFaq/SquidAcl#head-926288cb0cbbdea92bc4a807f06dd75ddbc446ff
http://www.linux-magazine.com/w3/issue/100/052-054_squid.pdf
http://www.linux-magazine.com/w3/issue/72/Squid_Bridge_HTTP_Proxy.pdf

Use comodo DNS,  norton DNS or openDNS services. Run or your clients PC http://www.prevx.com/


also you can check

K9
http://www1.k9webprotection.com/
Block web sites in more than 70 categories, including pornography, gambling, drugs, violence/hate/racism, malware/spyware, phishing
Force SafeSearch on all major search engines
Set time restrictions to block web access during designated times
Configure custom lists for "always allow" and "always block"
Override a web page block with password
Trust the enhanced anti-tampering, even children can't break
View easy reports to monitor and control web activity
Real-time categorization of new adult and malicious sites
Best free parental controls software/internet filter available


http://www.untangle.com/
Untangle provides a powerful suite of Internet management applications for small-to-medium businesses and education institutions.


http://www.iambigbrother.com/
IamBigBrother is the leading internet monitoring software available for both homes and business. And when using IamBigBrother, you'll know exactly who your kids chatted with last night and be able to read the full conversation!

http://www.refog.com/download.html
REFOG Employee Monitor is the ultimate surveillance suite offered by our company. Having all features of our less advanced products, REFOG Employee Monitor is designed to boost productivity of your employees. The product can watch multiple PCs and workstations at once without leaving your chair. Instant alerts are handy to prevent information leaks the moment they are about to happen

http://www.eblaster.com/
eBlaster spy software is the ONLY software in the world that will capture their incoming and outgoing email, chats and instant messages - then IMMEDIATELY forward you an EXACT COPY.
0
 

Author Closing Comment

by:jumptohigh
ID: 34954149
Thanks to all.  You were most helpful!
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question