Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Provide a more specific picture of your network, network devices, traffic flow, clients and so on - and then you can inquire for more specifics. Put in the effort to describe your network and you will likely get better instructions on how to stop torrents on your network.
If you want specifics, you have to give specifics.
do a company sweep of every PC in the place and uninstall any type of torrent client, then take away everyone rights to install anything on company PC's.
do a company sweep of every PC in the place and uninstall any type of torrent client, then take away everyone rights to install anything on company PC's.
This works, but I feel it causes more administrative headaches for the sysadmins, and doesn't address the real problem, which is user behavior.
I hate for my folks to get calls to install trivial things (like a WebEx plugin, which WOULD install automatically), on a dozen machines, because of restricted rights like that. I'm a firm believer in accountability. Watching your network, you can easily find out who is using the most bandwidth. Once you have some likely suspects, a company-wide email saying "Look, don't do this or else..." is in order. Keep watching...see a network spike? Time for a visit, right then, with the manager in tow.
If they're found to be doing so, hand user a cardboard box to pack their stuff in, for violation of company policy/network security rules. Word will spread like wildfire, because the rules have now been shown to have TEETH, and will bite.
Yes IT makes the default images and says "Here are the rules, please follow them."
But in a company of 80k people, as you say, there is no way we are taking all those calls, so instead -- domain is split into geos/buildings/departments/management domains,.. and software installation can be allowed by local managers. And it's their ASS if they allow something that causes an issue on my network.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.