[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Proxy server needed to monitor users internet traffic

Posted on 2012-04-05
6
Medium Priority
?
476 Views
Last Modified: 2012-05-21
I have a small client that has about 5 workstations and a Windows XP workstation that is used as a back-up server.

The client wants to be able to monitor what their employees are doing on the internet. For example, they want to be able to see if John or Jane Doe have been spending too many hours on Facebook or whatever. I am thinking of a proxy server but not sure which way to go with it or what product is good. This is a Microsoft Windows shop. There is no actual server but I can install a small cheap one if need be. Please let me know ASAP.

Thanks in advance !! :-)
0
Comment
Question by:PAULADAMSJR
6 Comments
 

Author Comment

by:PAULADAMSJR
ID: 37814442
I forgot to add that they ( as everyone is) are on a very tight budget.
0
 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 37814457
0
 
LVL 57

Accepted Solution

by:
giltjr earned 2000 total points
ID: 37815704
Squid, http://www.squid-cache.org/.

It's free.  Does caching and reporting.  Has a few add on programs can do do URL filtering and content filtering.

However, see how long somebody is on web site, is fairly difficult.  You could go site and from the proxy's point of view it may take just a few seconds to download the web page, but the person may sit on that page reading it for an hour.
0
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

 
LVL 15

Expert Comment

by:Russell_Venable
ID: 37828691
How thorough must this proxy be? You should be made aware that logging personal information from proxy traffic even from a business perspective without consent of the user being monitored is a violation to privacy rules and other laws. If you want to log the sites there visiting that's not a problem. It just gets complicated when it's a uncontrolled collection of information is where you can run into problems.

You could always buy a hardware firewall that sits at the front of the network and logs http dns and queries. That might meet your specifications and follow the laws in your country.
0
 

Author Comment

by:PAULADAMSJR
ID: 37830350
When they login to the domain, they acknowledge their concent and agreement of all computer activity including their internet content being recorded and randomly monitored. So that's a non-issue. Thank you for the insite though.

PA~
0
 

Author Closing Comment

by:PAULADAMSJR
ID: 37994927
this solution was perfect. thank you all for your input. It was all valued. PA~
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ITIL has an elaborate incident management framework. This article serves as a starter for those who'd like to know more or need to suss out the baseline elements in a typical incident response execution plan on the "need to have" and the "good to ha…
Data security in the cloud is very much like a security in an on-premises data center - only without costs for maintaining facilities and computer hardware.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

608 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question