Solved

network mapping software

Posted on 2011-03-04
4
432 Views
Last Modified: 2013-12-07
1.      Hello all, I’m searching software that can map our network topology and generate a visual network mapping report, need
Recommendation,

2.      Also I’m still searching a tool that can generate network usage in visual report I post that question in the past but the suggestion was not accurate to my needs, I need an easy and friendly tool that I can provide to manager (not sys admin or technical person) that able to present visual report regarding general network usage like how many time employee spent on facebook, porno, etc….

Regards,
0
Comment
Question by:Robert-Prodigy
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
DewFreak earned 125 total points
ID: 35041036
0
 
LVL 16

Assisted Solution

by:Nenad Rajsic
Nenad Rajsic earned 62 total points
ID: 35041049
might be a long shot but we used Finjan security appliance (proxy) years ago. reporting function was awesome. you could create reports based on username, user's local ip, web address, time started, time finished, bandwidth used, display custom messages to users surfing during work hours etc. My HR dept used those reports in disciplinary hearings and managers were able to request certain data for certain users. Great tool but expensive
0
 
LVL 6

Assisted Solution

by:DewFreak
DewFreak earned 125 total points
ID: 35041103
0
 
LVL 8

Assisted Solution

by:jako
jako earned 63 total points
ID: 35056705
2. If you think about it, downloading static web content now and then does not mean you are spending time on it all that time in between. Because of that one can not have expectations for this report (of employees spending time on smth) to be accurate (and thus would mean diddly squat to any manager with more than air in betwixt their ears).

Otherwise this could be true: let us say the report shows you opening a NSFW (or facebook) URL at January 2nd from a DHCP lease that does not get used again in a year. And some other NSFW URL from the same domain at December 30th with the same lease again. having this data it could very well report that you've been spending all your time whacking your NSFW at the first URL. if the software assumes that employees have to leave at the end of the day adjust data so that it would be true for a day not a year. Still a ridiculous outcome of improperly interpreted data.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now