Office Networks Oedipus
Any decent office network will have a firewall and a firewall log, this log can be inspected by the network admin, office/IT security and any senior officer that admin or security see fit to show it to.
The firewall log will have your PC's mac (network card) address, the ip address you were using at the time, the web address you visited, what you downloaded and what you uploaded, as well as the actual time and time spent on each site. All this will be tied to you by your username and password.
Please note, I have just given you the edited highlights of how your activities are connected to you via your PC. A bigger company will have more than just firewall logs they will have application logs, ip address logs, network logs, etc., which effectively tells them when you first turned on or booted-up your PC.
One thing you must realise, if you do anything suspect with your PC your company will be liable unless they can root out the wrong-doer, therefore they will keep logs to protect themselves.
UK Bob
PS. A few years ago I was warned about downloading MP3s and I was shown the log of my activities by my IT security (mind you, that's when I had dial-up at home). |