The guy that gave this LISA talk isn't a complete idiot, and even though it was
2010, you might still find some applicable ideas in there:
Enterprise-scale Employee Monitoring | USENIX
| |
| | | | | | | |
| Enterprise-scale Employee Monitoring | USENIXSince June 2009, I have been the
program manager responsible for successfully deploying an employee monitoring
system in a 12K employee business unit of a large U... |
| |
| View on www.usenix.org | Preview by Yahoo |
| |
| |
From: Edward Ned Harvey (lopser) <[email protected]>
To: "[email protected]" <[email protected]>
Sent: Friday, February 19, 2016 7:12 AM
Subject: [lopsa-tech] Identify illicit behavior
<!--#yiv5112711548 _filtered #yiv5112711548 {font-family:"Cambria
Math";panose-1:2 4 5 3 5 4 6 3 2 4;} _filtered #yiv5112711548
{font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;}#yiv5112711548
#yiv5112711548 p.yiv5112711548MsoNormal, #yiv5112711548
li.yiv5112711548MsoNormal, #yiv5112711548 div.yiv5112711548MsoNormal
{margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Calibri",
sans-serif;}#yiv5112711548 a:link, #yiv5112711548
span.yiv5112711548MsoHyperlink
{color:#0563C1;text-decoration:underline;}#yiv5112711548 a:visited,
#yiv5112711548 span.yiv5112711548MsoHyperlinkFollowed
{color:#954F72;text-decoration:underline;}#yiv5112711548
span.yiv5112711548EmailStyle17 {font-family:"Calibri",
sans-serif;color:windowtext;}#yiv5112711548 .yiv5112711548MsoChpDefault
{font-family:"Calibri", sans-serif;} _filtered #yiv5112711548 {margin:1.0in
1.0in 1.0in 1.0in;}#yiv5112711548 div.yiv5112711548WordSection1 {}-->Suppose a
company has a policy about permitted use of the company laptops and internet,
but you have suspicion that some user(s) are using it for illicit purposes such
as porn. You've already taken measures to prevent accidental access - content
filtering firewall, dns filtering, etc. You want to take reasonable steps to
prevent misuse, but you also want to be alerted and catch people, if they try
to misuse it. Can you name any products? I'm thinking either some agent that
runs on pc's, or something that monitors network traffic and triggers alerts.
I'm fully aware of the need for caution in how such tools are applied - both
in terms of respecting peoples' privacy, and legal rights, and distinguishing
accidental misuse and false positives from real violations.
_______________________________________________
Tech mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/
_______________________________________________
Tech mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/