What do you want to do to monitor computers in your LAN?

Updated on technology 2024-03-22
7 answers
  1. Anonymous users2024-02-07

    With the gradual popularization of Internet office, the daily work of many enterprises is inseparable from the computer, because the dependence of employees on the computer is relatively strong, so it is necessary to manage the computer in the local area network, to prevent employees from chatting or doing something unrelated to work during the work period, if you want to monitor the computer in the local area network what to do?

    In order to prevent employees from receiving private orders and doing some things unrelated to work in the process of going to work, enterprise managers can use the domain shield to manage the computers in the LAN in a unified manner, for example, after the tool is deployed on the employee's computer, different planning can be realized by setting up different department groups, and the browsing audit and application audit can be turned on in the Internet behavior audit. It can also prohibit employees from browsing on the computer and prohibit the use of software.

    It can also audit the operation behavior of employees' computer files, automatically back up files, protect data security through document encryption, restrict employees from sending out and copying files, solve internal data security problems, and analyze whether employees have done something unrelated to work during working hours by recording and viewing real-time screenshots of employees' computers, which can effectively improve the office efficiency of employees.

  2. Anonymous users2024-02-06

    You can buy a router with online behavior management.

  3. Anonymous users2024-02-05

    At present, in the vast majority of office environments are inseparable from computers, employees are easy to do something unrelated to work when working through the computer, such as using the computer to watch news, browsing non-work-related web pages and chatting, etc., so how to manage the staff computer in the local area network?

    Most of the current enterprise offices are carried out under the local area network, in the daily work process, it is inevitable that there are unconscious employees will use working hours to browse some web pages that have nothing to do with work, idle chats and other behaviors, for these behaviors through the domain shield can prohibit employees from doing it during working hours, with screen monitoring can be a detailed record of the employee's computer operation behavior, through the network audit and the audit can record the operation behavior of the employee in all aspects of the computer, It can allow managers to better analyze the operation behavior of employees' computers, and only need to put the management end on the manager's computer and the client on the employee's computer, and the above operations can be realized.

  4. Anonymous users2024-02-04

    There are many such software on the market that can play a large extent on the computer to limit and monitor some roles, such as prohibiting web pages, prohibiting software, prohibiting U disks, screen recording, etc., with workwin you can effectively monitor and control the employee's computer, there are still many functions, you can install a workwin online behavior management software to try it.

  5. Anonymous users2024-02-03

    At present, the popularity of the Internet is relatively wide, it is more difficult to manage the Internet access of employees within the enterprise, many employees will do something unrelated to work during working hours, such as chatting, playing games or browsing web pages that have nothing to do with work, so how to monitor the LAN computer?

    The management of employees' online behavior can effectively improve the office efficiency of employees, it is more important to understand the online behavior of employees in the process of work, the management of managers can determine the work efficiency of employees, and the domain shield can be used to specifically control employees' computers, and the operation of employees' computers can be recorded by way of screen recording, or through real-time screenshots to view employees' computer operation screens. In order to facilitate the management of enterprise managers, the real-time screen screen of multiple employee computers in the LAN can be displayed in batches on the manager's computer, and the employee's computer screen can be switched at any time, just like looking at the screen wall, and it is more convenient for the manager to manage it; Managers can set up network audit to record employees' online behavior, and then set up their specific functions by analyzing employees' operating behaviors, which can prohibit employees from operating on the computer during work, which can timely standardize employees' online behaviors and improve employees' office efficiency.

  6. Anonymous users2024-02-02

    Find a network enforcer registration version, you can monitor the online time, offline time, network card and physical address name of each computer in the network, the type of interface connected to the outside world, the incoming and outgoing data traffic, and can fully control the network connection of the target machine in real time, according to the command mode you execute, the network warning of the target computer will appear: IP address conflicts with other addresses in the network, there is no connection available, and you cannot browse the Internet or all content. However, it is difficult to find a new version of the registered version of this software.

    In addition, you can also use the ARP controller, which is not very ethical, using the routing packet tampering function of the local machine, detecting the network card and its physical address of other machines in the network, intercepting the data packets that need to enter the target machine, and removing the network card and physical address information of the target machine in the packet content, so as to achieve the network connection function of controlling other machines in the local area network.

    The landlord should be kind, and if you don't want to be forced to go to the beam, it's better not to do it, and you'll be embarrassed if you're caught.

  7. Anonymous users2024-02-01

    It is recommended to choose network management software for local area network, network management software can play a large extent to some restrictions and monitoring of the computer, such as workwin software, this software can not only prohibit web pages, prohibit software, prohibit U disk, etc., but also monitor the window, **, screen recording, etc., the function is still more.

Related questions
9 answers2024-03-22

There is no need to set up a route twice. You only need to cascade the LAN port on R2 to the LAN port of R1 with a 568A and 568B network cable. >>>More

8 answers2024-03-22

LAN settings, key five points:

1.Each machine needs to be in the same network segment, that is, the firewall with the same number for the first three sets of IP needs to allow "file and printer sharing". >>>More

8 answers2024-03-22

Your network architecture is a medium-sized network, don't use class C IP, change to class B, divide several VLANs, divide the office building into a VLAN, each office is divided into VLAN, and then put the OA and business system server separately into a VLAN, the default VLAN can be, easy to manage, but also can prevent ARP attacks, and then there are ARP attacks can only attack in this VLAN, will not affect the server, you can enable the routing function on the main switch, Support cross-VLAN data exchange, control the direction of data exchange through ACL, how do you usually manage the external network, you can see if you need to change it again, as for ARP detection, your VLAN should be attacked in a certain VLAN after it is divided, you can know which switch under the computer issued the ARP attack, you can then go to the corresponding switch web page through the MAC detection function to detect the attacker's MAC and IP, Even if someone manually changes the MAC and IP, the above will also be recorded, as for what you said can not find the attacker's MAC, it may be manually modified, you can find the attacker's real MAC address and IP through the MAC detection function on the web page, you can easily find out which computer is attacking, in this way, the network is safe, viruses, and human aspects are all eliminated After reading your information above, I feel that your network is a little messy, and you can apply to move the network once, Let's make a rectification and re-plan.

4 answers2024-03-22

How to set up a simple FTP server in a LAN.

Step 1: Start -- Control Panel -- Administrative Tools -- Internet Information Services double-click Run -- then double-click Local Computer -- FTP Site -- Right-click Default FTP Site -- Properties -- Home Directory -- Local Directory -- Browse the selected files to share. >>>More

14 answers2024-03-22

Change your own IP protocol The IP address of the router is generally I don't know if you're there. If yes, the IOP protocol writes this in the first line. 111 write by yourself, do not repeat between the computer and the computer The number is from 001 254) the second line will be filled in automatically, and the third line will be filled in with the mouse click on the line, which is the IP address of the router).