File Access Audit
Hi,is there a 3rd party software that can be used to audit the file/folder access by a user... i want to create a log based on how user access the files. for example a user access to a folder he/she tries to copy and paste or move a another folder and a log will be created.thankscharles
September 15th, 2009 10:48pm

Hello,you can audit file/folders with windows:-------------------------------------------------------------------------------------------Enabling file auditing is a 2-step process. [1] Configure "audit object access" in AD Group Policy or on the server's local GPO. This setting is located under Computer Configuration-->Windows Settings-->Security Settings-->Local Policies-->Audit Policies. Enable success/failure auditing for "Audit object access." [2] Configure an audit entry on the specific folder(s) that you wish to audit. Right-click on the folder-->Properties-->Advanced. From the Auditing tab, click Add, then enter the users/groups whom you wish to audit and what actions you wish to audit - auditing Full Control will create an audit entry every time anyone opens/changes/closes/deletes a file, or you can just audit for Delete operations. After you've done both of these steps, any file deletions will show up in the Security log of the file server that hosts those files. HTH-------------------------------------------------------------------------------------------Best regards Meinolf Weber Disclaimer: This posting is provided "AS IS" with no warranties, and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
September 16th, 2009 1:19am

Hi Charles! You might want to give a look to FileAudit. FileAudit monitors, archives and reports on accesses (or access attempts) to sensitive data stored on Microsoft Windows systems. With a simple right click in Windows explorer or from the console, FileAudit instantly gives an error ridden and comprehensive list of: - read/write accesses - appropriation attempts (accepted or denied) - permission modification attempts (accepted or denied) each record detailing: - the user - the domain - the date and time of connection and disconnection for: - a file - a selection of files - a folder and subfolders - a selection of folders and subfolders Hope it will help. Franois Amigorena President & CEO IS Decisions (Security Software) http://www.isdecisions.com
August 4th, 2010 3:58pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics