What do VPN logs reveal?

mully

Outside of how long you are connected to the network ... I'm just wondering what other information Yahoo's Marissa Mayer got about telecommuting employees' activity via the VPN.

Topic: Career
Answer this Question

Answers

4 total
jimlynch
Vote Up (15)

This article might interest you.

How to Read Microsoft VPN Logs
http://techtips.salon.com/read-microsoft-vpn-logs-28499.html

"When you use the Microsoft RAS client to create a virtual private network, or VPN, between a client computer and a server or another computer, you can check the “Enable Logging” option to save log files with connection details and event errors for later analysis. These log files won’t be saved in the usual default location for Microsoft application log files, which is a folder named “Logfiles,” just off the system root directory. With the VPN client, you must use the Event Viewer to read Microsoft VPN logs."

callie bloom
Vote Up (14)

 

Recent article here: 

http://www.itworld.com/networking/348803/why-vpn-logs-dont-measure-worke...

 

Kind of common sense, but apparently to some folks, it's not: 

 

VPN logs alone are not enough to prove that people working from home are slacking off, because connecting to the company network is not the same thing as delivering results.

jhotz
Vote Up (11)

I would think that since telecommuting users were on Yahoo's remote access VPN, the company would be able to see everything just as if the employee was physically in the office and on Yahoo's network. The encrypted tunnel exists between the network access server and the individual's machine, but once the data stream reaches the NAS, it has fulfilled it's task of secure transmission and should then be unencrypted. If a telecommuting employee wanted to hide their activity from their employer, they should probably not count on their employer's VPN to do it.  

Dr. Rose
Vote Up (3)

Checking VPN logs can prove useful in tracking down slacking employees, but that's only if employees are forced to use the VPN consistently and if supervisors or IT monitors those logs from time to time (such as when an unauthorized connection to China materializes). If no one is bothering to force employees to use the VPN or to peruse the logs once in a while, that company has more to worry about than unproductive workers; that company is setting itself up to be hacked.

Ask a question

Join Now or Sign In to ask a question.
The ironclad rule of resume writing is to highlight your career in reverse chronological order -- all the time, every time, right? Wrong.
The latest rankings of programming languages show a landscape that’s increasingly fragmented, but still dominated by the old guard
Select the mix of skills right for your data analytics business goals.
The agile framework for software development brings speed, flexibility and efficiency to IT-focused organizations.
IBM has initiated a new training program that will cut the pay of participating employees by 10%.
In the competition for developer talent, offering a good cup of joe could give your company an edge
Demand for security pros has never been higher, so why are salaries flat?
The secret to the security profession is to develop all the computer experience you can before you even begin to think about a career in cybersecurity.
It's time to change the way you think about attracting and hiring skilled workers. Here are six new IT roles for 2015 and advice on how to find talent to fill them.
A one-day class promises to teach digital literacy and break down the 'language barrier' between IT and business executives.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness