Security Basics mailing list archives

RE: User Activity Monitoring


From: "Chad Thomsen" <chad.thomsen () bramespecialty com>
Date: Fri, 27 Aug 2004 09:38:24 -0400

I am sure something exists, but I have no idea what it is.  

If I were you I would make all of you users regular users instead of letting
them have administrative rights.  I would then use regmon (Google for it and
you should find it), which is a free tool, to find the registry keys that
this software, that requires admin privileges, accesses.  Then use regedit
and modify the security on those individual keys.  This works like a charm
because I have used it many times as I am not a fan of letting regular users
have administrative privileges on their local machines.  

Thanks,

Chad Thomsen, MCSE, CCNA
Network Administrator
Brame Specialty


-----Original Message-----
From: Edwin Rene [mailto:edwin () link net id] 
Sent: Tuesday, August 24, 2004 12:56 AM
To: Security-Basics
Subject: User Activity Monitoring

Hullo,

I'm a new security officer of a small company with some mobile users, I'd
like to know programs out there there could restrict users from copying
files to another computer or monitoring users activities off the the network
/ at home that doesn't have a key logger because we can't set restriction
for users since the need administrative rights to run certain program and we
don't want them to think with this program we are monitoring what they
doing.

Thanks in advance

Regards

Ed


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: