The guy that gave this LISA talk isn't a complete idiot, and even though it was 2010, you might still find some applicable ideas in there: Enterprise-scale Employee Monitoring | USENIX | | | | | | | | | | | Enterprise-scale Employee Monitoring | USENIXSince June 2009, I have been the program manager responsible for successfully deploying an employee monitoring system in a 12K employee business unit of a large U... | | | | View on www.usenix.org | Preview by Yahoo | | | | |
From: Edward Ned Harvey (lopser) <lop...@nedharvey.com> To: "tech@lists.lopsa.org" <tech@lists.lopsa.org> Sent: Friday, February 19, 2016 7:12 AM Subject: [lopsa-tech] Identify illicit behavior <!--#yiv5112711548 _filtered #yiv5112711548 {font-family:"Cambria Math";panose-1:2 4 5 3 5 4 6 3 2 4;} _filtered #yiv5112711548 {font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;}#yiv5112711548 #yiv5112711548 p.yiv5112711548MsoNormal, #yiv5112711548 li.yiv5112711548MsoNormal, #yiv5112711548 div.yiv5112711548MsoNormal {margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Calibri", sans-serif;}#yiv5112711548 a:link, #yiv5112711548 span.yiv5112711548MsoHyperlink {color:#0563C1;text-decoration:underline;}#yiv5112711548 a:visited, #yiv5112711548 span.yiv5112711548MsoHyperlinkFollowed {color:#954F72;text-decoration:underline;}#yiv5112711548 span.yiv5112711548EmailStyle17 {font-family:"Calibri", sans-serif;color:windowtext;}#yiv5112711548 .yiv5112711548MsoChpDefault {font-family:"Calibri", sans-serif;} _filtered #yiv5112711548 {margin:1.0in 1.0in 1.0in 1.0in;}#yiv5112711548 div.yiv5112711548WordSection1 {}-->Suppose a company has a policy about permitted use of the company laptops and internet, but you have suspicion that some user(s) are using it for illicit purposes such as porn. You've already taken measures to prevent accidental access - content filtering firewall, dns filtering, etc. You want to take reasonable steps to prevent misuse, but you also want to be alerted and catch people, if they try to misuse it. Can you name any products? I'm thinking either some agent that runs on pc's, or something that monitors network traffic and triggers alerts. I'm fully aware of the need for caution in how such tools are applied - both in terms of respecting peoples' privacy, and legal rights, and distinguishing accidental misuse and false positives from real violations. _______________________________________________ Tech mailing list Tech@lists.lopsa.org https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech This list provided by the League of Professional System Administrators http://lopsa.org/
_______________________________________________ Tech mailing list Tech@lists.lopsa.org https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech This list provided by the League of Professional System Administrators http://lopsa.org/