Solved

Web Monitoring

Posted on 2011-02-28
2
507 Views
Last Modified: 2012-05-11
I'm looking on advice on a tool I can use to monitor which websites my LAN users are visiting.

We know some are spending way too much time surfing the web rather than working and need to know who is doing this and how much time they are actually wasting.  Can anyone recommend any products to us?

We are using Forefront Threat Management Gateway 2010 on a Server 2008 R2 box which I'm assuming I'll need to install this on to see what's going through.  So something compatible with that version of ISA would be great.
0
Comment
Question by:LogicalSolutionsNZ
2 Comments
 
LVL 39

Expert Comment

by:Adam Brown
ID: 35001495
I don't have any direct experience with it, but Spector360 looks like it will meet your needs and then some. Websense is a good blocking tool, but it's also the most common out there, and there may be some ways to get around it. I don't know if it provides monitoring, since the clients I've worked with that had it only utilized it for blacklist/whitelist functionality.
0
 
LVL 5

Accepted Solution

by:
piwowarc earned 500 total points
ID: 35006559
I think that GFI Web Monitor plugin for TMG might be what you're looking for

http://www.gfi.com/isa-server-monitoring-security

Visit www.isaserver.org It has the best resources, tutorials and guides for ISA line of products.

HTH

Chris
0

Featured Post

Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question