25Ağu
I used a work VPN on my personal computer at home while doing…"non-work" things…am I in trouble/can they see me?
I was using my own home personal computer on a weekend while connected to my work's VPN (it's called pulse secure), and was bored so I decided to look at some "non-work" related websites (possibly/definitely nsfw stuff). Am I exposed? Can they see all my activity? Obviously I don't know anything about this stuff so please help me out cause I'm kinda panicking.
Edit: Added Route Table Below
===========================================================================
Interface List
13...02 05 85 7f eb 80 ......Juniper Networks Virtual Adapter
15...60 45 cb 81 cc d8 ......Intel(R) Ethernet Connection (2) I219-V
1...........................Software Loopback Interface 1
===========================================================================
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.158 25
0.0.0.0 0.0.0.0 On-link 10.2.100.225 1
10.2.100.225 255.255.255.255 On-link 10.2.100.225 256
127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
151.188.247.203 255.255.255.255 192.168.1.1 192.168.1.158 25
192.168.1.0 255.255.255.0 On-link 192.168.1.158 281
192.168.1.158 255.255.255.255 On-link 192.168.1.158 281
192.168.1.255 255.255.255.255 On-link 192.168.1.158 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
224.0.0.0 240.0.0.0 On-link 192.168.1.158 281
224.0.0.0 240.0.0.0 On-link 10.2.100.225 256
255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
255.255.255.255 255.255.255.255 On-link 192.168.1.158 281
255.255.255.255 255.255.255.255 On-link 10.2.100.225 256
===========================================================================
Persistent Routes:
None
Edit:
Via company's IT handbook: "All user activity on any County information system and County-approved mobile communications or fixed devices is subject to monitoring, logging, auditing, review, dissemination and archiving"
I'm pretty sure this quote answers my question.