Security Basics mailing list archives
RE: User Activity Monitoring
From: "Don Parker" <hydra291 () hotmail com>
Date: Wed, 25 Aug 2004 07:24:39 -0400
Hi Ed, well you may want to image the laptop and other company computers with a management approved baseline of software. Then restrict the privileges of the user on that computer ie: they are not allowed to install any s/w on it but only use what is presently there. As to employee's copying stuff onto computers? Not sure exactly your intent is here buy you may want to look into file integrity programs. Hope this helps.
Cheers, Don ---------------------------------------- Don Parker, GCIA Intrusion Detection Specialist 1.613.302.2910(c) ----------------------------------------
From: "Edwin Rene" <edwin () link net id> To: "Security-Basics" <security-basics () securityfocus com> Subject: User Activity Monitoring Date: Tue, 24 Aug 2004 11:56:18 +0700 Hullo, I'm a new security officer of a small company with some mobile users, I'd like to know programs out there there could restrict users from copyingfiles to another computer or monitoring users activities off the the network/ at home that doesn't have a key logger because we can't set restrictionfor users since the need administrative rights to run certain program and wedon't want them to think with this program we are monitoring what they doing. Thanks in advance Regards Ed ---------------------------------------------------------------------------Computer Forensics Training at the InfoSec Institute. All of our class sizesare guaranteed to be 12 students or less to facilitate one-on-oneinteraction with one of our expert instructors. Gain the in-demand skills ofa certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
_________________________________________________________________Take charge with a pop-up guard built on patented Microsoft® SmartScreen Technology. http://join.msn.com/?pgmarket=en-ca&page=byoa/prem&xAPID=1994&DI=1034&SU=http://hotmail.com/enca&HL=Market_MSNIS_Taglines Start enjoying all the benefits of MSN® Premium right now and get the first two months FREE*.
--------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- User Activity Monitoring Edwin Rene (Aug 24)
- Re: User Activity Monitoring Ansgar -59cobalt- Wiechers (Aug 25)
- RE: User Activity Monitoring David Gillett (Aug 25)
- Re: User Activity Monitoring Edwin Rene (Aug 26)
- RE: User Activity Monitoring Chad Thomsen (Aug 30)
- <Possible follow-ups>
- RE: User Activity Monitoring Don Parker (Aug 26)