Solved

Windows 2003. How to view which application was accessed by who?

Posted on 2004-04-18
1
257 Views
Last Modified: 2012-05-04
We have a application (software) was accessed by some one. My boss want to know who have acceseed this file. The application is running on the server. Operation System is Windows 2003.
0
Comment
Question by:jmw168
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 67

Accepted Solution

by:
sirbounty earned 500 total points
ID: 10855898
You would have needed to have Auditing enabled...

Auditing is only available on NTFS volumes. Follow the instructions below:

Start Explorer
Right click on the file/directory you want to audit, and from the context menu select properties
Select the Security tab and click Auditing
If you have selected a directory, check the "replace auditing on subdirectories"
Click the Add button and add the user(s) who you wish to audit by selecting and clicking Add. When finished adding users, click OK
Select the events you wish to audit and then click OK (ref: http://www.winnetmag.com/Article/ArticleID/14761/14761.html)

You could determine this in the future by checking your security logs in Event Viewer...
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question