logo elektroda
logo elektroda
X
logo elektroda

Identifying Monitoring Activities on Windows 10 Laptops: Wired & WiFi TP-LINK TL-WR740N Router

rotell 18471 12
ADVERTISEMENT
This content has been translated flag-pl » flag-en View the original version here
  • #1 17139513
    rotell
    Level 7  
    Is there any way to check if my activity on computers at work is being monitored by someone?

    I have two laptops with Windows 10, one is connected by a cable, the other via WIFI with a TP-LINK TL-WR740N router.
  • ADVERTISEMENT
  • #2 17139526
    kranzio
    Level 26  
    The administrator from the logs can monitor every activity of each computer.
  • #3 17139556
    rotell
    Level 7  
    Thank you for the quick reply. It just so happens that I must be the administrator and learn all this because it's a small company, two people, two computers, we don't have IT.

    I have looked through the entire router manual and still do not know where I can find such information.

    At this link is the user manual for my router:

    http://tiny.pl/gk64n

    Could I ask for help and any tips on how to monitor activity on my computers?
  • #4 17139655
    makosuu
    Network and Internet specialist
    You won't check anything with OFW on this router. And the password for the router panel is best for you only to know.
  • ADVERTISEMENT
  • #5 17145955
    rotell
    Level 7  
    Do you know any software that could check it?
  • #6 17145983
    makosuu
    Network and Internet specialist
    For computer, router?
  • ADVERTISEMENT
  • #7 17146699
    rotell
    Level 7  
    Anything that lets me know if an unauthorized person is interested in my computers too much.
  • ADVERTISEMENT
  • #8 17146712
    KOCUREK1970
    Network and Internet specialist
    @rotell
    Only what you learn is what you send, download - but you will not know what your ISP does by collecting your data, what it collects, what it stores, etc.
    To know this you would have to query operator servers collecting such data.
    You also omit the issue of outside attacks.
  • #9 17146763
    rotell
    Level 7  
    KOCUREK1970 wrote:
    you won't know what your ISP does


    I accepted that there are no secrets for ISPs :)

    I am more curious if any talented IT specialists from the office building in which I work do not test their talents on my computers by extracting information that is not intended for them.
  • #10 17146804
    KOCUREK1970
    Network and Internet specialist
    rotell wrote:
    I am more curious if any talented IT specialists from the office building in which I work do not test their talents on my computers by extracting information that is not intended for them.

    If you don't know what they can do and you don't know what they are doing / they did - you won't interpret the data so well.
    What's more, if you have such sensitive data, it should be strictly encrypted access to it and accessible only to a specific group of people.
  • #12 17147030
    KOCUREK1970
    Network and Internet specialist
    This DNS has nothing to do with your operator.
    As if the signal did not go anyway "passes" through your ISP.

    The only reasonably effective method is a VPN somewhere in the UAE or where our country, Europe, USA cannot get data from these places - your ISP will know that you are referring to the server in the UAE but will no longer know exactly what you are doing.

Topic summary

✨ The discussion revolves around concerns regarding monitoring activities on Windows 10 laptops connected to a TP-LINK TL-WR740N router in a small office setting. The user seeks methods to determine if their computer activities are being monitored by an administrator or unauthorized personnel. Responses indicate that the router's firmware may not provide sufficient monitoring capabilities, and suggest that sensitive data should be encrypted. The conversation also touches on the limitations of ISPs in tracking user activity and the potential use of VPNs to enhance privacy. Additionally, there are mentions of DNS services and their relation to ISP monitoring.
Generated by the language model.

FAQ

TL;DR: 2 laptops on Windows 10? "The administrator from the logs can monitor every activity of each computer." Start with device logs, lock down your TL‑WR740N, and use a VPN if ISP privacy matters. [Elektroda, kranzio, post #17139526] Why it matters: For small offices without IT, this FAQ shows how to check, log, and limit monitoring on Windows 10 and a TL‑WR740N router.

Quick Facts

How can I tell if my Windows 10 laptop is being monitored on our office network?

Start with what you control: device logs. Check Windows Security logs for logons, process starts, and policy changes. Review browser and antivirus logs. Router visibility is limited on a TL‑WR740N with stock firmware. Centralize logs if possible. [Elektroda, kranzio, post #17139526]

Does the TP‑LINK TL‑WR740N stock firmware record browsing history or deep logs?

No. As one expert put it, “You won’t check anything with OFW on this router.” Expect only basic status and connection info. Use endpoint logging on the PCs, or upgrade to gear with proper logging. [Elektroda, makosuu, post #17139655]

What software can I install on Windows to detect unauthorized access?

Install Sysmon to capture detailed process and network events in the Windows Event Log. Pair it with Event Viewer or your SIEM for alerts. Configure minimal, high‑value rules to avoid noise. Keep Defender, firewall, and updates enabled. [Sysmon - Windows Sysinternals]

How do I enable Windows auditing quickly to track logons and process starts?

  1. Open Local Security Policy > Advanced Audit Policy Configuration.
  2. Enable Audit Logon and Audit Process Creation (Success/Failure).
  3. Reboot, then review Security logs in Event Viewer and tune as needed. [Advanced security auditing overview]

Will switching my DNS to 1.1.1.1 or enabling DoH stop my ISP from seeing my traffic?

No. DNS changes don’t hide content. “The only reasonably effective method is a VPN... your ISP will know you refer to the server but not what you are doing.” DoH protects DNS lookups, not page content. [Elektroda, KOCUREK1970, post #17147030]

Does a VPN actually hide my activity from the ISP?

Yes, for content. Your ISP sees a connection to the VPN server, not your visited sites. Choose a trustworthy provider. Expect some speed overhead. Use device and OS hardening alongside VPN for layered defense. [Elektroda, KOCUREK1970, post #17147030]

How do I lock down the TL‑WR740N admin panel?

Set a strong, unique admin password, and keep it to yourself. Disable remote management if not needed. Update firmware, use WPA2, and hide WPS. Limit who can access the admin page. Document changes. [Elektroda, makosuu, post #17139655]

How can I detect if someone in my building tries to access my computers?

Enable auditing for logons and failed logons. Watch for unusual times or sources. Encrypt sensitive files and restrict access. Keep backups offline. If stakes are high, get a managed security tool or service. [Elektroda, KOCUREK1970, post #17146804]

What should I log by default on Windows for a small office?

Enable logon events and process creation at minimum. Add network connection logging via Sysmon. Windows supports 53 advanced audit subcategories, so focus on high‑signal ones first. Review weekly and after incidents. [Advanced security auditing overview]

Can I see exactly which websites someone visited through this router?

Not with TL‑WR740N stock firmware. It lacks per‑site user activity logs. Use endpoint controls, or deploy a firewall with web proxy or full logging. Consider upgrading hardware if detailed logging is required. [Elektroda, makosuu, post #17139655]

What can’t I detect with my current gear?

You can’t see what your ISP collects or stores. You also won’t automatically detect external attacks without proper telemetry. Endpoint encryption and access control reduce impact when detection is limited. [Elektroda, KOCUREK1970, post #17146712]

Who should use a VPN here—both laptops or just one?

Use a VPN on each laptop that needs privacy from the ISP or untrusted networks. A per‑device VPN protects traffic regardless of router limits. Keep logs locally for accountability. [Elektroda, KOCUREK1970, post #17147030]
Generated by the language model.
ADVERTISEMENT