I am an information security consultant interested in monitoring laptop users' activities when they are working...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
offlline. Is there a tool that I can use to push all logs on a server while a user is working from home? We have banned USB sticks in our office and monitored all email activity, but we have no control, for example, if a person transfers a file from his laptop to a USB stick from home. We want each user's actions logged on a server when that person comes to the office and connects to our LAN.
This is a tough issue! If you want to log access, you should consider deploying a configuration management product throughout your enterprise. However, it sounds like you're simply looking for a solution that allows you to enforce your "no USB devices" policy. Fortunately, Windows XP SP2 provides a direct way to solve this problem through a registry setting. You need to add a DWORD value called WriteProtect to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlStorageDevicePolicies and set the value to 1. (Note: If you don't understand that, seek assistance from someone familiar with editing the Windows Registry. Editing the registry improperly can seriously damage your operating system).
- Visit our resource center for the latest news, tips and expert advice on how to create an effective device security policy.
Dig Deeper on Information Security Policies, Procedures and Guidelines
Related Q&A from Mike Chapple
Are nonprofit organizations, like higher education institutions, subject to FTC cybersecurity regulations and oversight? Expert Mike Chapple explains.continue reading
It's important for healthcare organizations to have a clear social media policy. Expert Mike Chapple explains what needs to be in the policy to stay ...continue reading
SOC 2 evaluations can be helpful tools for organizations assessing their HIPAA compliance, but companies should not solely rely on them. Compliance ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.