How to tell who accesses your shared folder

Posted on 2003-03-07
Medium Priority
Last Modified: 2010-03-18

Sometimes I share a folder on my computer with full control permission. One time, i noticed (because my antivirus allerted me) that some machine on my network was putting infected files on that folder, but i couldn't tell, for shure, where the files came from.

So, i'd like to know if Windows XP Pro (the OS i use) or any third part aplication can give information about the accesses made from other machines to my shared folders, including which files are copied to/from the folder. If possible, it should monitor and record that information for later viewing.

Question by:gandhirs
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2

Expert Comment

ID: 8087699
A very useful feature and rather too hidden in XP! Click Start, RIGHT-click My Computer, click Manage. Open Shared Folders, and click Sessions or Open Files. This should tell you who is attached to your PC and which files they have. Good luck!

LVL 79

Expert Comment

ID: 8088570
You can also turn on security auditing to log any access. Start/help/search "audit" click on "set up auditing of files and folders"
Follow the instructions

Author Comment

ID: 8101875

I followed the instructions. But, how can i see the results (the access logs)?

LVL 79

Accepted Solution

lrmoore earned 200 total points
ID: 8102327
Right-click My Computer, Manage, Event Viewer, Security.

Author Comment

ID: 8137658
After I selected the folders to audit, it worked :-)

Thanks also CheekyOne.


Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
An article on effective troubleshooting
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question