Solved

Monitoring software...

Posted on 2016-10-04
2
57 Views
Last Modified: 2016-10-05
A property management software company performed a major software upgrade on a client's server of hours back in July.   My client has actually deemed it a "downgrade" because, the upgrade has caused the server to become unstable and crash frequently.  My client even went to the extreme of replacing the server with a new server and a clean installation of Windows 2012 R2.  However, as soon as the management property company reinstalled their software platform on the new server, you guessed it, the server began crashing again.  
The property management software company recently  requested total remote access to the server and, you bet I'm reluctant to grant this kind of "open-season/free-reign" access to them.  This said, their request for full remote access raises my concerns ever so more since, they've disabled most of the Windows Server 2012 R2 firewall features and have repeatedly edited the registry when I've manually monitored them on the server remotely.  Yet, this software is the only one that knows its own software better than anyone else, right!
While I'm aware of the built-in auditing features, I believe video capturing would be even more precise.  Can anyone make any recommendations for video capturing a server's activity for at least of couple of days?  Software?  I intend to allow this vendor access to the server for up to 48hours and would very much like to capture their remote access activities.   I've used TeamViewer successfully to capture video but, someone from our end must remain logged into to TeamViewer in order to capture the entire 48hrs and moreover, if the TeamViewer connection is severed for whatever reason, it automatically locks out the user logged into the server.
0
Comment
Question by:eitconsulting
2 Comments
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 41829238
So what I would have done is use Virtualization (should have been used in the first place).  Install Server 2012 R2 with Hyper-V  role ONLY on the physical server, install a VM for DC and other functionality, install a VM for the property management software.  Then give local admin rights to that server only to the software developers - basically, let them do as the please with that server - it's ONLY job is property management AND because it's NOT a DC, giving admin rights ONLY to that server does not expose any other server functionality to them.

Otherwise, recording activity in a video ... I've never heard of that specifically... there are screen recording products but running for DAYS?  I don't know about that - they'd likely take a LOT of space... and how do they record multiple RDS sessions?  Basically, I think your approach is flawed and you should look at the other options (such as the one I suggest above).
0
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 41829459
Have a look at problem steps recorder (psr.exe).
It can be started using command line options and it documents exactly what happened when and that is smaller and easier to handle compared to a movie.
Command line options are discussed here: https://social.technet.microsoft.com/Forums/office/en-US/b78253b1-6e38-4563-9efa-4973414e9a75/problems-step-recorder-psrexe-command-line-options?forum=w7itprogeneral
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows Server File/Folder permissions 6 80
EXCHANGE 2007, EXCHANGE 2013 8 79
Is the 2017 Annual Visitor Survey on Chrome a Virus? 11 199
Admin account lockout 10 39
Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question