Solved

How can I log the Browsing of my Users on my Network?

Posted on 2015-02-20
7
59 Views
Last Modified: 2015-03-20
Looking for a solution where I can log the activity of each user and create

a Log for the owner to audit

Cjoego
0
Comment
Question by:Joseph Salazar
7 Comments
 
LVL 1

Expert Comment

by:Amaury Lopez
Comment Utility
The easiest way the I've implemented to control and log user network traffic would be to create a Proxy server, you can simply use Linux Squid, relatively easy to set up. With this you can establish permissions to each machine (via IP, or network segment) on what websites they can access (Access Control Lists) and it will log all activity by IP.

Basic tutorial to configure squid:
http://www.cyberciti.biz/tips/howto-rhel-centos-fedora-squid-installation-configuration.html
0
 
LVL 11

Accepted Solution

by:
Bryant Schaper earned 500 total points
Comment Utility
as mentioned you would ideally need something in the middle.  Squid or a firewall / content filter.  What kind of hardware do you have now, maybe some of that can be leveraged.
0
 
LVL 1

Expert Comment

by:amigan_99
Comment Utility
If you have Sophos End Point Protection - it will log all web activity and it can block certain sites per policy. Websense is an in-path solution.
0
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

 

Author Comment

by:Joseph Salazar
Comment Utility
I have a LInksys RV042 Router

Cjoego
0
 
LVL 32

Expert Comment

by:Kamran Arshad
Comment Utility
Hi,

You need to install some proxy application or use employee monitoring application.
0
 

Author Comment

by:Joseph Salazar
Comment Utility
Is there a 3rd Party Agent I can install?

Cjoego
0
 

Author Closing Comment

by:Joseph Salazar
Comment Utility
Installed a Sophos Firewall

Cjoego
0

Featured Post

Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

Join & Write a Comment

Suggested Solutions

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
How to create a custom search shortcut to site-search Experts Exchange using Google in the Firefox browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch your Bookmark Menu: Press 'Ctrl +…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now