English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

R search inquiries logged on my server if links are'nt opened. Can I tell what employees are searching?

2007-01-12 02:46:50 · 2 answers · asked by ROCKET 3 in Computers & Internet Other - Computers

2 answers

Using a sniffer without a detailed specification of that right in the workplace is a big no-no; legal repercussions on the violation of implied privacy would probably get you fired. There was a court case to that effect not too long ago, so you have to approach this in a professional manner.

Since you said "my server", I'm assuming that you work in the IT department at your workplace. For a server functioning as a Domain Controller, you will not be able to see what your employees have been searching... unless they are using Terminal Services accounts (unlikely), in which case you would be able to find what they have been searching, but you probably wouldn't be able to single out specific people and their searches.

The best way to monitor web traffic in a corporate environment is to use a proxy server. At my workplace, we use the open source Squid proxy server, running on Linux, and I monitor the logs for any "unwanted" web traffic. If you do a moderate amount of research, you will find how you can force all outbound web traffic to go through the proxy server first, which will place the destination addresses in the log file. If you don't feel like doing the moderate amount of research, then you could just specify the proxy server in each user's Internet Settings and use Group Policy on your DC to keep them from changing the proxy settings.

The key thing to remember is that "search inquiries" involving a search engine online will use POST or GET requests to load a new page relevant to the search. Why is that important? Even if they don't open any links from the search, it is still loading a web site, which will be logged on your proxy server.

As mentioned before, you need to explicitly state in the Computer Usage Policy (or specific policy at your company) that all web traffic may be monitored to prevent prohibited content. Specify what would constitute "prohibited traffic", and demonstrate this right of monitoring by documenting violations of the policy through either disciplinary write-ups or written warnings. Keep those examples of your stated right to monitoring traffic, and you will dodge any legal repercussions that could come of it.

2007-01-12 03:11:06 · answer #1 · answered by Not a punk like you 2 · 0 0

Sure. Use a sniffer.

2007-01-12 10:57:55 · answer #2 · answered by Linux OS 7 · 0 0

fedest.com, questions and answers