So, you're saying you routinely audit every file and object access and
change?  There are appropriate things to audit routinely, and then there is
needless waste unless you are troubleshooting/tracking something specific.



On Wed, Jan 7, 2009 at 11:27 AM, Durf <stygm...@gmail.com> wrote:

> The performance hit is minor for a network of that size and not worth
> worrying about.
> And, for any and all of those solutions, the Audit log is the solution.
>  What is the problem that would NOT involve gathering and reporting on Audit
> logs?  That's just standard practice.
>
> -- Durf
>
>
> On Wed, Jan 7, 2009 at 11:22 AM, David Lum <david....@nwea.org> wrote:
>
>>  There will be a performance hit. I would ask what he's trying to
>> accomplish…what are his goals? Licensing? Misuse? Malware protection?
>> Information theft? He's suggested a solution to an unknown problem. It's the
>> CEO's job to tell the IT guy what he needs, it's the IT guys job to figure
>> out how to accomplish it.
>>
>>
>>
>> My FIRST comment to the CEO would be "I can do this for you, what are you
>> looking to accomplish? It will help me get your end result for the lowest
>> cost…"
>>
>> *David Lum** **// *SYSTEMS ENGINEER
>> NORTHWEST EVALUATION ASSOCIATION
>> (Desk) 971.222.1025 *// *(Cell) 503.267.9764
>>
>> *From:* Durf [mailto:stygm...@gmail.com]
>> *Sent:* Wednesday, January 07, 2009 7:49 AM
>> *To:* NT System Admin Issues
>> *Subject:* Re: Auditing Everything
>>
>>
>>
>> Christ you all.  It doesn't have to be this hard.
>>
>>
>>
>> If they have a Sonicwall, buy the Viewpoint module.  If they don't have a
>> Sonicwall, then get them one.  There are equivalent products for Cisco and
>> Watchguard.
>>
>>
>>
>> For AD, just turn on appropriate auditing and use GFI EventSentry to
>> gather and report on events.
>>
>>
>>
>> That's it, you're done.  Aside from literal keystroke logging on the
>> workstations, these two items will handle everything else on the network
>> that is appropriate.
>>
>>
>>
>> Whether they *should* do it or not is a whole different question, and not
>> what the OP asked.
>>
>>
>>
>> -- Durf
>>
>>
>>
>> On Wed, Jan 7, 2009 at 10:44 AM, Roger Wright <rwri...@evatone.com>
>> wrote:
>>
>> And how many people does he plan to hire to review and report on all this
>> data?  You'll probably need to add storage and another server to accommodate
>> it.
>>
>>
>>
>> Take a look at Adventnet's Eventlog Analyzer…
>>
>> http://manageengine.adventnet.com/products/eventlog/index.html
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> Roger Wright
>>
>> Network Administrator
>>
>> Evatone, Inc.
>>
>> 727.572.7076  x388
>>
>> _____
>>
>>
>>
>> *From:* Alex Carroll [mailto:acarr...@crabco.net]
>> *Sent:* Wednesday, January 07, 2009 10:25 AM
>>
>>
>> *To:* NT System Admin Issues
>>
>> *Subject:* Auditing Everything
>>
>>
>>
>> I have a request from my CEO to audit everything that happens on our
>> network.  When users open files, when they change files, delete files, use
>> any programs, go to any websites (we use ie7, firefox), etc etc etc.  Do any
>> of you have a good solution you can recommend for that?  I can google all I
>> want, but I won't know the real world experience by doing that.  We are a
>> smaller company – 16 users.  Right now we have 3 servers (1 SBS 03, 2 that
>> are 2003) in production.  We use XP and Vista.
>>
>>
>>
>> Thanks in advance!
>>
>>
>>
>> Alex Carroll
>>
>> Software Support
>>
>> Crabtree Companies, Inc.
>>
>> 651-688-2727
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> --
>> --------------
>> Give a man a fish, and he'll eat for a day.
>> Give a fish a man, and he'll eat for weeks!
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>
>
> --
> --------------
> Give a man a fish, and he'll eat for a day.
> Give a fish a man, and he'll eat for weeks!
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to