Get a Pentest and security assessment of your IT network.

Cyber Security

Domain Admin Search History: Can They See It?

TL;DR

Generally, a domain administrator can see your search history if you’re using a company network and unencrypted browsing. However, there are ways to protect yourself – use HTTPS websites, a VPN, or the privacy mode in your browser.

Understanding How It Works

Domain administrators have control over the computers and networks within an organisation. This means they can monitor internet traffic. Here’s how:

  • Network Logs: Domain admins can view logs of websites visited on company networks. These logs often show the URL (web address) you accessed, which reveals your search queries if the website isn’t secure.
  • Proxy Servers: Many companies use proxy servers to manage internet access. Proxy server logs record all web traffic passing through them.
  • Installed Software: Some organisations install monitoring software on computers that can track browsing activity, including search history.

Steps to Protect Your Search History

  1. Use HTTPS Websites:
    • HTTPS (Hypertext Transfer Protocol Secure) encrypts the communication between your computer and the website. This makes it much harder for anyone, including a domain admin, to see what you’re doing on that site.
    • Look for the padlock icon in your browser’s address bar – this indicates a secure connection.
  2. Use a Virtual Private Network (VPN):
    • A VPN creates an encrypted tunnel between your computer and a remote server, hiding your internet activity from your network administrator.
    • There are many commercial VPN providers available. Choose a reputable one with a strong privacy policy.
    • Example: Connecting to a VPN might involve downloading software and logging in with your account details. The specific steps depend on the provider.
  3. Use Your Browser’s Privacy Mode (Incognito/Private Browsing):
    • Privacy mode prevents your browser from saving your browsing history, cookies, and other temporary data locally. However, it doesn’t hide your activity from network administrators or the websites you visit.
    • Chrome: Press Ctrl+Shift+N (Windows) or Cmd+Shift+N (Mac).
    • Firefox: Press Ctrl+Shift+P (Windows) or Cmd+Shift+P (Mac).
    • Edge: Press Ctrl+Shift+N (Windows) or Cmd+Shift+N (Mac).
  4. Use a Search Engine That Respects Privacy:
    • Some search engines, like DuckDuckGo, don’t track your searches.
  5. Be Careful on Company Computers:
    • Assume that anything you do on a company computer or network is potentially monitored.
    • Avoid accessing sensitive information on company devices if possible.

Checking for Monitoring Software (Advanced)

Identifying monitoring software can be tricky. Here are some things to look for:

  • Task Manager/Activity Monitor: Check running processes for unfamiliar applications.
    tasklist

    (Windows command prompt) or Activity Monitor (Mac).

  • Installed Programs List: Review the list of installed programs in your operating system’s control panel or settings.
  • Network Connections: Use a network monitoring tool to see if any unusual connections are being made from your computer.

Note: Tampering with or attempting to disable monitoring software on a company computer could violate company policy and have serious consequences.

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation