Solved

Monitor I/O and which files are being accessed

Posted on 2003-12-08
2
682 Views
Last Modified: 2012-06-21
We're currently in the process of analyzing a third-party application, and we noticed it does a LOT of file I/O.   However, we're curious as to which files it's accessing.  All the IO is on the local machine.

Are there any programs that can monitor this?  Kind of like TCPView from SysInternals, which tells you which process is accessing which files, bytes read and written, etc.

Any help will be greatly appreciated.
0
Comment
Question by:EschbacherG
2 Comments
 
LVL 83

Accepted Solution

by:
oBdA earned 250 total points
ID: 9902551
Seems you've come already pretty close ;) Have you tried FileMon from Sysinternals already?
FileMon for Windows
http://www.sysinternals.com/ntw2k/source/filemon.shtml
0
 
LVL 2

Author Comment

by:EschbacherG
ID: 9904137
I'll be darned.... Good call.    I'm using FileMon and Process Explorer.   Good call.

Thanks oBda
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
auto copy 8 614
Recovering backup .Qic files on Windows 7 6 2,183
How to install Windows 2000 network drivers 4 94
Screen Mirroring 7 53
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 recommendations for managing major incidents (https:…
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now