The guy that gave this LISA talk isn't a complete idiot, and even though it was 
2010, you might still find some applicable ideas in there:
Enterprise-scale Employee Monitoring | USENIX
|   |
|   |  |   |   |   |   |   |
| Enterprise-scale Employee Monitoring | USENIXSince June 2009, I have been the 
program manager responsible for successfully deploying an employee monitoring 
system in a 12K employee business unit of a large U... |
|  |
| View on www.usenix.org | Preview by Yahoo |
|  |
|   |




 
      From: Edward Ned Harvey (lopser) <lop...@nedharvey.com>
 To: "tech@lists.lopsa.org" <tech@lists.lopsa.org> 
 Sent: Friday, February 19, 2016 7:12 AM
 Subject: [lopsa-tech] Identify illicit behavior
   
 <!--#yiv5112711548 _filtered #yiv5112711548 {font-family:"Cambria 
Math";panose-1:2 4 5 3 5 4 6 3 2 4;} _filtered #yiv5112711548 
{font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;}#yiv5112711548 
#yiv5112711548 p.yiv5112711548MsoNormal, #yiv5112711548 
li.yiv5112711548MsoNormal, #yiv5112711548 div.yiv5112711548MsoNormal 
{margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Calibri", 
sans-serif;}#yiv5112711548 a:link, #yiv5112711548 
span.yiv5112711548MsoHyperlink 
{color:#0563C1;text-decoration:underline;}#yiv5112711548 a:visited, 
#yiv5112711548 span.yiv5112711548MsoHyperlinkFollowed 
{color:#954F72;text-decoration:underline;}#yiv5112711548 
span.yiv5112711548EmailStyle17 {font-family:"Calibri", 
sans-serif;color:windowtext;}#yiv5112711548 .yiv5112711548MsoChpDefault 
{font-family:"Calibri", sans-serif;} _filtered #yiv5112711548 {margin:1.0in 
1.0in 1.0in 1.0in;}#yiv5112711548 div.yiv5112711548WordSection1 {}-->Suppose a 
company has a policy about permitted use of the company laptops and internet, 
but you have suspicion that some user(s) are using it for illicit purposes such 
as porn. You've already taken measures to prevent accidental access - content 
filtering firewall, dns filtering, etc.    You want to take reasonable steps to 
prevent misuse, but you also want to be alerted and catch people, if they try 
to misuse it. Can you name any products? I'm thinking either some agent that 
runs on pc's, or something that monitors network traffic and triggers alerts.   
 I'm fully aware of the need for caution in how such tools are applied - both 
in terms of respecting peoples' privacy, and legal rights, and distinguishing 
accidental misuse and false positives from real violations. 
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/


   
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to