I'm good at catching external attacks, using ACLs with syslog monitoring on WAN links, WireShark and Ethereal for tracking down bandwidth hogs and infected PCs.
But how do you monitor the activity of a single user who has nothing better to do than attempt to exploit servers, printers, switches on a LAN?
Is there any type of application that can be installed without the user knowing to log his activity?
Gary
But how do you monitor the activity of a single user who has nothing better to do than attempt to exploit servers, printers, switches on a LAN?
Is there any type of application that can be installed without the user knowing to log his activity?
Gary