Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


How can I log the Browsing of my Users on my Network?

Posted on 2015-02-20
Medium Priority
Last Modified: 2015-03-20
Looking for a solution where I can log the activity of each user and create

a Log for the owner to audit

Question by:Joseph Salazar
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

by:Amaury Lopez
ID: 40622241
The easiest way the I've implemented to control and log user network traffic would be to create a Proxy server, you can simply use Linux Squid, relatively easy to set up. With this you can establish permissions to each machine (via IP, or network segment) on what websites they can access (Access Control Lists) and it will log all activity by IP.

Basic tutorial to configure squid:
LVL 12

Accepted Solution

Bryant Schaper earned 2000 total points
ID: 40622255
as mentioned you would ideally need something in the middle.  Squid or a firewall / content filter.  What kind of hardware do you have now, maybe some of that can be leveraged.

Expert Comment

ID: 40622384
If you have Sophos End Point Protection - it will log all web activity and it can block certain sites per policy. Websense is an in-path solution.
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!


Author Comment

by:Joseph Salazar
ID: 40622486
I have a LInksys RV042 Router

LVL 32

Expert Comment

by:Kamran Arshad
ID: 40644208

You need to install some proxy application or use employee monitoring application.

Author Comment

by:Joseph Salazar
ID: 40651320
Is there a 3rd Party Agent I can install?


Author Closing Comment

by:Joseph Salazar
ID: 40679483
Installed a Sophos Firewall


Featured Post

Q2 2017 - Latest Malware & Internet Attacks

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out our latest Quarterly Internet Security Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question