How can I log the Browsing of my Users on my Network?

Posted on 2015-02-20
Last Modified: 2015-03-20
Looking for a solution where I can log the activity of each user and create

a Log for the owner to audit

Question by:Joseph Salazar
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

by:Amaury Lopez
ID: 40622241
The easiest way the I've implemented to control and log user network traffic would be to create a Proxy server, you can simply use Linux Squid, relatively easy to set up. With this you can establish permissions to each machine (via IP, or network segment) on what websites they can access (Access Control Lists) and it will log all activity by IP.

Basic tutorial to configure squid:
LVL 12

Accepted Solution

Bryant Schaper earned 500 total points
ID: 40622255
as mentioned you would ideally need something in the middle.  Squid or a firewall / content filter.  What kind of hardware do you have now, maybe some of that can be leveraged.

Expert Comment

ID: 40622384
If you have Sophos End Point Protection - it will log all web activity and it can block certain sites per policy. Websense is an in-path solution.
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.


Author Comment

by:Joseph Salazar
ID: 40622486
I have a LInksys RV042 Router

LVL 32

Expert Comment

by:Kamran Arshad
ID: 40644208

You need to install some proxy application or use employee monitoring application.

Author Comment

by:Joseph Salazar
ID: 40651320
Is there a 3rd Party Agent I can install?


Author Closing Comment

by:Joseph Salazar
ID: 40679483
Installed a Sophos Firewall


Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question