Including proxy logging ? ISA logs ? Content Filter Logs ? Sniffers & Packet Header Checkers ? ? To circumvent this you will need a level of amin access yourself shorly ?
If you send a packet on a corporate network you can do nowt to prevent it being analysed for what it is. The best circumvention policy to avoid admin staff reviewing where you’ve been is to give them nothing to look at.
I have yet to come accross a company outside of government that will have admins with the time to dedicate to review the logs that Una has been looking at. THey come in handy when you have a target in mind and are trying to make a case but can you imagine reviewing them for an organisation of any size ?
Even when you are blocked by proxy blacklists from accessing a site it would be rare that that would prompt a further investigation …after all IS now know you didnt look at soemthing.
Lets take an example , a monthly report of a proxy will easily identify TOP 10 users being warned of a contravenetion. Then there logs will be looked at , anything else suspicious ? after hours activity for example , then we might expect that access logs will be looked and in case things might go legal , sniffers and keyloggers etc , will be introduced.