I am an information security consultant interested in monitoring laptop users' activities when they are working...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
offlline. Is there a tool that I can use to push all logs on a server while a user is working from home? We have banned USB sticks in our office and monitored all email activity, but we have no control, for example, if a person transfers a file from his laptop to a USB stick from home. We want each user's actions logged on a server when that person comes to the office and connects to our LAN.
This is a tough issue! If you want to log access, you should consider deploying a configuration management product throughout your enterprise. However, it sounds like you're simply looking for a solution that allows you to enforce your "no USB devices" policy. Fortunately, Windows XP SP2 provides a direct way to solve this problem through a registry setting. You need to add a DWORD value called WriteProtect to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlStorageDevicePolicies and set the value to 1. (Note: If you don't understand that, seek assistance from someone familiar with editing the Windows Registry. Editing the registry improperly can seriously damage your operating system).
- Visit our resource center for the latest news, tips and expert advice on how to create an effective device security policy.
Dig Deeper on Information Security Policies, Procedures and Guidelines
Related Q&A from Mike Chapple
The OWASP Top Ten list is not a compliance standard but a set of best practices for enterprises looking to boost Web app security. Here's how to get ...continue reading
A data breach notification policy is important to have, but deciding how to alert customers can be tough. Expert Mike Chapple explains some best ...continue reading
Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.