Keeping Your Family Safe While Using Your Computer
|
659
6. On the “Which programs can...use?” page, the “Use all programs” option is
selected by default. To restrict program use so that only programs specifically
allowed can be run, select the ...can only use the programs I allow” option.
You’ll then see a list of every program installed on the computer, as shown in
Figure 18-25.
7. You can now control the allowed programs. Select the checkbox for a program
you want the user to run. Clear the checkbox for a program you don’t want the
user to run. Alternatively, click Check All to select all programs and then selec-
tively clear the programs the user shouldn’t be able to run.
8. Click OK to save the settings. Whenever you install new programs on the com-
puter that you want the user to be able to run, you’ll need to repeat this proce-
dure to allow running the program and its related executable files.
Accessing Activity Reports
When you turn on parental controls, you can view activity reports that provide com-
plete details about the user’s activities while using your computer.
You can turn on activity reporting by completing these steps:
1. Click Start and then click Control Panel.
2. In the Control Panel, click the User Accounts and Family Safety heading and
then click User Accounts.
Figure 18-25. Configuring application restrictions
660
|
Chapter 18: Managing User Accounts and Parental Controls
3. On the User Accounts page, click “Manage another account.”
4. Click “Set up Parental Controls” and then click the account you want to work
with.
5. On the “Set up how...will use the computer” page, click “On, collect informa-
tion about computer usage” under Activity Reporting.
6. Click OK to save your settings.
You can view activity reports for a user by following these steps:
1. Click Start and then click Control Panel.
2. In the Control Panel, click the User Accounts and Family Safety heading and
then click User Accounts.
3. On the User Accounts page, click “Manage another account.”
4. Click “Set up Parental Controls” and then click the account you want to work
with.
5. Click “View activity reports” to access the Activity Viewer page, shown in
Figure 18-26. By default, Activity Viewer provides summary details for all cate-
gories of information tracked. To view more detailed information, expand the
Account Activity, General System, or both nodes.
6. Access summary details for each major category by selecting the category head-
ing in the left pane.
7. Access detailed information for subcategories by selecting the subcategory head-
ings in the left pane.
Computer usage details fall into the following categories:
Web Browsing
Websites Visited
A date/time list of web sites the user visited
Websites Blocked
A date/time list of web sites the user tried to visit, but were blocked
Web Overrides
A date/time list of web sites the user was initially blocked from visiting,
but that were allowed to be visited by someone else with an Administra-
tor account
File Downloads
A date/time list of files downloaded
Keeping Your Family Safe While Using Your Computer
|
661
System
Logon Times
A date/time list of when the user logged on and how long she was
logged on for each session
Applications
Applications Run
A date/time list of the applications the user started or was blocked from
starting. For applications started, the length of time the programs were
used is also provided.
Application Overrides
A date/time list of programs the user was initially blocked from run-
ning, but that were allowed to be run by someone else with an Adminis-
trator account.
Figure 18-26. Viewing activity reports
662
|
Chapter 18: Managing User Accounts and Parental Controls
Gaming
Games Played
A date/time list of the games the user started or was blocked from start-
ing. For games started, the length of time the games were played is also
provided.
Email
Email Received
A date/time list of emails received as well as who those emails were
from, the subject of the email, and the list of attachments to the email
messages (if any)
Email Sent
A date/time list of emails sent as well as to whom those emails were
sent, the subject of the email, and the list of attachments to the email
messages (if any)
Contact List Change
A date/time list of email contacts changed as well as details on who
changed the contact and what type of change was made
Instant Messaging
Conversations
A date/time list of instant messaging according to the participants
involved
Web Cam
A date/time list of web cam use according to the participants involved
Audio
A date/time list of instant messaging that used voice or audio according
to the participants involved
Game Play
A date/time list of instant messaging games played according to the par-
ticipants involved
File Exchange
A date/time list of files exchanged during instant messaging according
to the filenames and participants involved
Link Exchange
A date/time list of files exchanged during instant messaging according
to the link address and participants involved

Get Windows Vista Security: Praxisorientierte Sicherheit für Profis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.