access can be done with regular auditing the other part, (MOM) Microsoft Operations Manager, in which you can define rules and take actions on it. it access is made to a file, run script or page or whatever, generate alert. An agent runs on every client.
regards, ivo ----- Original Message ----- From: "willie domingo" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, December 13, 2001 9:40 AM Subject: IBM Laptop Logging > Hi all, > > Our company issued an IBM laptop running Windows ME to our field > officers. In order for these people to be apply the policies of the company > we downloaded it to their laptop. > > Due to the sensitivity of these policies we would want to protect the bank > by having a logging mechanism if ever they copied such policies to a > diskette or cd. Or better yet everytime they access said policy it should > be logged. > > Is there a utility in Windows ME to do this. If not is there a utility > freeware or not that can do this. It should produce good reports. > > Thanks for your comments. > > Willie > > _________________________________________________________________ > Join the world's largest e-mail service with MSN Hotmail. > http://www.hotmail.com > >