10 skills of Enterprise Network Monitoring

Source: Internet
Author: User
Welcome to the network technology community forum and interact with 2 million technical staff, whether they like it or not, nowadays, enterprise network administrators generally have to take on the task of monitoring the network or computer behavior of company employees, because some company bosses may need to know which websites their employees visit during work hours, which files have been sent or accepted, or even sent?

Welcome to the network technology community forum and interact with 2 million technical staff> whether people like it or not, nowadays, enterprise network administrators generally have to take on the task of monitoring the network or computer behavior of company employees, because some company bosses may need to know which websites their employees visit during work hours, which files have been sent or accepted, or even sent?

Welcome to the network technology community forum and interact with 2 million technical staff> enter

Regardless of whether people like it or not, enterprise network administrators generally have to take on the task of monitoring the network or computer behavior of company employees, some company bosses may need to know which websites their employees visit during work hours, what files they send or receive, or even what they say in the emails they send. These employees' behaviors may cause losses to the company's interests, such as irrelevant work during work hours or leakage of confidential company information. The common method is as follows:

1. monitor employees' access to files and folders through audit policies
In a Windows Network, by enabling the audit policy feature in the operating system, the network administrator can know which files or folders an employee opens, or you have tried to open files or folders that do not have permissions. In Windows 2000 and later versions, the audit function is implemented by group policies. You only need two steps to create a review function for some files or folders:

1. First, you must set the review function on the Group Policy Settings page. ,

Enable Review

2. Set audit in the attributes of the file or folder you want to audit. ,

Set Audit Object

For detailed steps on how to set audit, see Microsoft Knowledge Base article KB article 310399 (http://support.microsoft.com /? Kbid = 310399 ).

Ii. Check cached Web files
If the number of computers in the company is small, the network administrator can achieve this goal if he wants to check which sites the company's users visit and does not need special software, you only need to check the cache folder of the web browser (which is usually called a Temporary Internet File in IE ). To allow users to quickly display accessed pages, ie stores copies of pages and images downloaded by users. However, some smart users may delete the content in the Temporary Folder to avoid being viewed by you. ,

Temporary files generated by employees going online

However, network administrators can use Microsoft's free tool Shared Computer Toolkit's user restriction tool to deny users access to Internet Options in the tool menu in IE, to prevent users from clearing access history and Temporary Internet Files.

3. monitor Web access on the firewall
Another way to monitor the website users are visiting is to set up in the firewall, and view the user's access records through the user's account, IP address, or computer name. Enterprise-level firewalls, such as Microsoft's ISA Server, Cisco's PIX and CheckPoint Firewall-1, or itself has this built-in report function, you can also use the plug-in function to provide the Website access history report function. These functions can be used to view these access history records. Many firewalls provide the user access record analysis function. This function allows you to query and analyze user access records in multiple ways, including: by time period, by access address range, by source address range, by protocol type, etc. It also monitors user access content, monitors user access content, identifies user identities, analyzes user access target addresses, user access content, and whether the user has accessed illegal websites. If your company uses a firewall, You can carefully read the help documentation to learn how to use this function.

[1] [2]

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.