access can be done with regular auditing

the other part, (MOM) Microsoft Operations Manager, in which you can define
rules and take actions on it.
it access is made to a file, run script or page or whatever, generate alert.
An agent runs on every client.

regards,

ivo

----- Original Message -----
From: "willie domingo" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, December 13, 2001 9:40 AM
Subject: IBM Laptop Logging


> Hi all,
>
>   Our company issued an IBM laptop  running Windows ME to our field
> officers.  In order for these people to be apply the policies of the
company
> we downloaded it to their laptop.
>
>   Due to the sensitivity of these policies we would want to protect the
bank
> by having a logging mechanism if ever they copied such policies to a
> diskette or cd.  Or better yet everytime they access said policy it should
> be logged.
>
>   Is there a utility in Windows ME to do this.  If not is there a utility
> freeware or not that can do this. It should produce good reports.
>
>    Thanks for your comments.
>
>                                                    Willie
>
> _________________________________________________________________
> Join the world's largest e-mail service with MSN Hotmail.
> http://www.hotmail.com
>
>

Reply via email to