How can I log the Browsing of my Users on my Network?

Posted on 2015-02-20
Medium Priority
Last Modified: 2015-03-20
Looking for a solution where I can log the activity of each user and create

a Log for the owner to audit

Question by:Joseph Salazar
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

by:Amaury Lopez
ID: 40622241
The easiest way the I've implemented to control and log user network traffic would be to create a Proxy server, you can simply use Linux Squid, relatively easy to set up. With this you can establish permissions to each machine (via IP, or network segment) on what websites they can access (Access Control Lists) and it will log all activity by IP.

Basic tutorial to configure squid:
LVL 12

Accepted Solution

Bryant Schaper earned 2000 total points
ID: 40622255
as mentioned you would ideally need something in the middle.  Squid or a firewall / content filter.  What kind of hardware do you have now, maybe some of that can be leveraged.

Expert Comment

ID: 40622384
If you have Sophos End Point Protection - it will log all web activity and it can block certain sites per policy. Websense is an in-path solution.
Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  


Author Comment

by:Joseph Salazar
ID: 40622486
I have a LInksys RV042 Router

LVL 32

Expert Comment

by:Kamran Arshad
ID: 40644208

You need to install some proxy application or use employee monitoring application.

Author Comment

by:Joseph Salazar
ID: 40651320
Is there a 3rd Party Agent I can install?


Author Closing Comment

by:Joseph Salazar
ID: 40679483
Installed a Sophos Firewall


Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
In this article, we’ll look at how to deploy ProxySQL.
Google currently has a new report that is in beta and coming soon to Webmaster Tool accounts. This Micro Tutorial will highlight new features for Google Webmaster Tools.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Suggested Courses
Course of the Month11 days, 14 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question