130 likes | 258 Vues
As the lead IT Administrator at B.A.D. Inc., a Microsoft sourcing company, you face challenges with employees misusing company time by surfing the web for personal interests. This behavior not only leads to wasted bandwidth but also jeopardizes security. To combat these issues effectively, implementing keylogging technologies can help you monitor user activity and ensure compliance with internet policies. While Kaseya does not provide a specific keylogger, it's crucial to identify a compatible program that can track and report user input without infringing on privacy rights.
E N D
Background Story Problem and Motivation • You have been hired as the lead IT Administrator at B.A.D. Inc they are a Microsoft sourcing company. They are having an issue with their workings not performing to par seems if they are spending most of their time surfing the web for personal agendas and not business related things,. These users can become both bandwidth hogs, and potential security risks. Your job is to prevent users from circumventing the internet policy.
Methods • HTTP proxy • False user agents
Solution There are several methods involved in curcumventing internet restrictions. Almost all require some type of user input. The keyboard is a violator’s best friend. A simple solution is to monitor the input of the actual keyboard through keylogging.
Disclaimer: The keylogger we are using is not provided by Kaseya, you must find a compatible keylogging program