?
Solved

File audit

Posted on 2003-10-22
7
Medium Priority
?
251 Views
Last Modified: 2013-12-28
I have been tasked at work to reduce the number of files that are used by the organisation, there are 40000+ files and I want to be able to log which ones are being used so that I can archive ones that are not used.
Is there any way of achieving this without using the built in auditing as I don't find this very usefull.
Ideally I want to be able to get the info into a database so that I can extract the info I need.

Any ideas how I could achieve this ??

many thanks
0
Comment
Question by:duckp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 86

Expert Comment

by:jkr
ID: 9602134
Use the Auditing mechanism of NT (you can enable that in the user manager) - so the OS itself will automatically create an event log file for you.
0
 

Author Comment

by:duckp
ID: 9602335
The NT auditing only seems to allow viewing using the event viewer, this is not very practical when tracking 40000+ files, I need to be able to get the results into a database so that I can analyse and extract the info that I need.
0
 
LVL 19

Accepted Solution

by:
Dexstar earned 500 total points
ID: 9602897
Using the NT Auditing mechanism is definitely the way to go.  The trick is just getting at the information.

While it is possible to access the EventLog programmatically and get the information you need, I would take advantage of the "Export" feature of the EventLog viewer.

1) Open the Computer Management console.
2) Right-click on the "Security" section under "Event Viewer".
3) Select "Export List"
4) Then clear the log.

Then import that list into a database, and analyze the data anyway that you need.

Enjoy.
Dex*
0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 
LVL 86

Expert Comment

by:jkr
ID: 9603671
>>The NT auditing only seems to allow viewing using the event viewer

Yes, but what is problem with dumping an event log to a file? :o)

http://www.sysinternals.com/ntw2k/freeware/psloglist.shtml
0
 

Author Comment

by:duckp
ID: 9608104
Thanks Dexstar.....I must be half asleep as I have used the export in the past....I think my brain is fried :-)

Thanks again
0
 
LVL 86

Expert Comment

by:jkr
ID: 9608125
Um, didn't I point aut the auditing mechanism or was this a Q about how to export an event log?
0
 

Author Comment

by:duckp
ID: 9608191
jkr as mentioned in my original question I already knew about the built in auditing and mentioned wanting to be able to use a database to extract the info I required, Dexstar reminded me about the export facility and the fact I would be able to import that output into a database.

Thanks for your input to the question but I felt Dexstar had a better idea what I was trying to achieve and gave the best answer to help me achieve my goal.
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question