Prevention monitoring computer in the domain?

I have a problem: my work computer is connected to the domain. And I suspect that someone from time to time connects to it, and watching my monitor (maybe even other information available). There are many signs as I realized this, but one very annoying - I runs the mouse cursor in the left, then to the upper right corner. I suspect it admins, but not sure. I never ponaal how they do it, like no obvious signs of the programs, remote monitoring/control not (RAdmin, TeamViewer). I don't know, but maybe you have a Windows Server there is some built-in AD "function for monitoring remote computers in the domain" or something like that.
Explain how is monitoring my computer and how to prevent it.
8 answers
July 12th 19 at 17:20
Solution
Perhaps in the network of your company has security problems (incompetence or error setting access rights), where the possibility of unauthorized connections to other employees has not only IT Department.
Not without this, of course, but I think every organization has its holes. - willard_Fahey commented on July 12th 19 at 17:23
July 12th 19 at 17:22
I never ponaal how they do it, like no obvious signs of the programs, remote monitoring/control no
And must be signs?

Explain how is monitoring my computer and how to prevent it.
Connect and look soft for this car and small truck.

how to prevent it.
To resign from this organization, if you don't like.

I don't understand what's the problem if someone sees your monitor with a working information? It's not storoni man, is the administrator or the sat office.
July 12th 19 at 17:24
I have to disappoint You to the extreme.

First in the workplace You have, there can be no personal space. Work computer is a tool, allotted by the employer and he has every right to control how You use it.
And it is his right laid down in TC.
Secondly this tool is. It is through the browser. You come, choose comp. You can quietly watch the screen - just to see what the person is doing. Or get an instant screenshot. Or a list of processes. Or even a lot of reports. In this case the agent to recognize on the computer - well, we admins can't :)

The key word Stakhanovite
Reminiscent of a neat force ;) However, in General sense You are right. - willard_Fahey commented on July 12th 19 at 17:27
I think You confuse "warm" with "soft" )) . Don't know as you have made at work and how the Labor Code you follow, but it is usually like this(omitting legal.term): the employee is given the tool given the task and the deadline(usually the faster the better). And there he does his job, it's his own business. In the end, the employer should be an important end product - quality and fast performance, etc. and security should and can be done so that would not have violated the rights of employees, and then you can walk back to the beginning - to look every 5 minutes in the monitors.

>"Secondly the remedy is."
If this is not a joke, I can get more. - Cathy92 commented on July 12th 19 at 17:30
: I am guided only by the Labour Code in force in Russia. Or You links to articles direct cause Google can't? About "take a peek every five minutes" - kickidler makes it even cooler - he is everything that is happening on screen, says in the video. To those who are too concerned about the "rights of employees", would not sharilsya on Facebook, I did not read the jokes and not gamilla during working hours. And the employer has a very business - like doing his job, because he pays for it money.
About the tool in more detail? The System Administrator was in 2014, this article "Big brother sees you" - there was a small overview of the monitoring programmes users. On the computer is the agent, which transmits all data to the server. The security guy comes to the server through a web muzzle, watching reports. Or behind the screen watching him at all approach is not necessary, he may at any time to see who does what :) - willard_Fahey commented on July 12th 19 at 17:33
: thanks for the info, at leisure to get acquainted with the article. - Charlotte_Bednar75 commented on July 12th 19 at 17:36
July 12th 19 at 17:26
byasnite how is monitoring my computer and how to prevent it.

disable the network. if the mouse will run, the problem
July 12th 19 at 17:28
And I suspect that someone from time to time connects to it, and watching my monitor (maybe even other information available).
If you haven't been warned under signature about what your actions on the PC can observe, then ask a question to the security service or his boss, might reveal the insider or the existence of an abuse.

There are many signs as I realized this, but one very annoying - I runs the mouse cursor in the left, then to the upper right corner.
Adjust the mouse or put it under the rug with the rag main. Glare surface on which the moving led mouse often lead to the fact that the cursor flies to the corners of the screen. Those who watch are usually connected in view mode, not management.

I suspect it admins
Security question set and all.
July 12th 19 at 17:30
From the Windows "Remote desktop", but it knocks out the user. There is "remote assistance" but I think it's not working hidden.
Remote Desktop Shadowing - willard_Fahey commented on July 12th 19 at 17:33
The staffing mechanism, the users do not emboss, works secretly. - Cathy92 commented on July 12th 19 at 17:36
You can connect in a control mode and in playback mode. - willard_Fahey commented on July 12th 19 at 17:39
July 12th 19 at 17:32
If your PC is connected to the domain - in any case, all information on your PC stored in the clear (I don't think you in your everyday work use cryptocotylar, all documents store only in the archives with a password, etc.) available to employees of the unit IT. As for remote control / monitoring etc. - means and methods to organize both mass. From Radmin with NTI (No Tray Icon), DameWare NT Utilities, RMS, and others. If you have suspicions that someone is illegally connected to your PC - refer to your IT specialist in your organization.
July 12th 19 at 17:34
I have already contacted the admins say no, we storoni software does not use and without warning we are nothing nedelam. I believe them.
Actually, I don't legitimate don't work and have nothing to hide )) . I interesujus this issue in order to educate themselves (interested in networking, administration, etc.). Well, there is, of course, I would not want someone to pastaroni could violate my personal space (read personal correspondence, photos, social networks, etc.), just there were cases )) of Course, I don't have all that running, and I am relying on your experience and knowledge monitor their control system and safety in General, but because I am a non-practicing specialist for me still much is not known, so advice from you (maybe not quite corecto put the question).

Yes, one more question, is there such a tool for remote monitoring through a web the interface? what type of observer went through the browser to the server - maybe the domain server machine in the network with special software dedicated to monitoring using the web interface, choose the car and observe?
Thank you in advance.
The admins can not know :) for Example, we don't know. Head of it Department suspected something at first, then as the service was renamed - also calmed down. A good spy is an invisible spy :) - willard_Fahey commented on July 12th 19 at 17:37
1) this software very much. Is for surveillance/management (a La radmin), is to record videos/user actions.
2) Yes, there are products with the web console, I would even say at the present time, most decent products have a web console
3) a good product of this kind is very difficult to detect. It's almost like a quality rootkit, antivirus it deliberately ignores. - Cathy92 commented on July 12th 19 at 17:40
:
2) Yes, there are products with the web console, I would even say at the present time, most decent products have a web console

and you just a few examples of programs with a web interface?
3) a good product of this kind is very difficult to detect. It's almost like a quality rootkit, antivirus it deliberately ignores.

Yes, especially if how to register a service with nothing telling name. But is it not possible to detect which service is not real and nasamom fact performs the function of a Trojan ? - willard_Fahey commented on July 12th 19 at 17:43

Find more questions by tags Information securityRemote accessActive DirectorySystem administration