Avatar of nigelbeatson
nigelbeatsonFlag for United Kingdom of Great Britain and Northern Ireland asked on

reviewing internet activity on an XP Pro workstation

We have an employee who we feel has been using the internet for inappropriate use.

We have a small business server 2003, and the workstation in question is running XP pro with internet explorer version 9.

Is there any way we can audit this computer to review what has been taking place, other than the standard Internet Explorer history?

I know that there is software that can provide this facility, but unfortunately we have nothing else in place at the moment.

If anyone can give any assistance, I would be very much obliged.
Windows XP

Avatar of undefined
Last Comment

8/22/2022 - Mon

find a freeware utility to read the index.dat file
Scott Gorcester

you can look through the temporary internet folders and this should provide a few clues.  this might help


You will have to use a proxyserver with authentication in order to log this kind of info securely.  I use Blue Coat - ProxySG for this.

Experts Exchange has (a) saved my job multiple times, (b) saved me hours, days, and even weeks of work, and often (c) makes me look like a superhero! This place is MAGIC!
Walt Forbes

Log in or sign up to see answer
Become an EE member today7-DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform
Sign up - Free for 7 days
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
See how we're fighting big data
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
ask a question

And all these can be reactive..... Don't need anything in place in advance.....

K-9 web filter has integrated scanning solutions that automatically generate reports of usage. It is designed to protect children. Absolutely amazing piece of software and worth every penny if you are using it for commercial use. Note: You can remove all of the blocking filters and run the usage reports behind the scenes.

You can then use those usage reports to integrate blocks.

Ethically, I always suggest you let the user know up front "everyone" is being monitored, quite often this solves your problem without the need for confrontation. Send out a memo or let everyone know "due to bandwidth issues we need to start scanning system usage, this includes user internet history and behavior". This approach eliminates lots of behavior when they know they are being watched.

Note: K-9 is free for personal use...
Get an unlimited membership to EE for less than $4 a week.
Unlimited question asking, solutions, articles and more.

Thanks to all