1 / 13

Web Browsing Policy Compliance Monitoring Using Keylogging

As the lead IT Administrator at B.A.D. Inc., a Microsoft sourcing company, you face challenges with employees misusing company time by surfing the web for personal interests. This behavior not only leads to wasted bandwidth but also jeopardizes security. To combat these issues effectively, implementing keylogging technologies can help you monitor user activity and ensure compliance with internet policies. While Kaseya does not provide a specific keylogger, it's crucial to identify a compatible program that can track and report user input without infringing on privacy rights.

libba
Télécharger la présentation

Web Browsing Policy Compliance Monitoring Using Keylogging

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Web Browsing Policy Compliance Monitoring Using Keylogging

  2. Background Story Problem and Motivation • You have been hired as the lead IT Administrator at B.A.D. Inc they are a Microsoft sourcing company. They are having an issue with their workings not performing to par seems if they are spending most of their time surfing the web for personal agendas and not business related things,. These users can become both bandwidth hogs, and potential security risks. Your job is to prevent users from circumventing the internet policy.

  3. Methods • HTTP proxy • False user agents

  4. Solution There are several methods involved in curcumventing internet restrictions. Almost all require some type of user input. The keyboard is a violator’s best friend. A simple solution is to monitor the input of the actual keyboard through keylogging.

  5. Disclaimer:  The keylogger we are using is not provided by Kaseya, you must find a compatible keylogging program  

More Related