Solved

Utilities other than GFI SELM to audit event logs with

Posted on 2004-08-19
1
226 Views
Last Modified: 2012-05-05
Does anybody know of another application I can use to keep track of file deletions? I enabled Audit success for the local security policy and I am able to enable successful and unsuccessful file deletions. But I want an easier way than going through the security event log and looking for event id 560 plus I want it to keep track of it for a long time where as the event logs are set to overwrite after when full. I looked at GFI SELM and didn't really care for it but that was the only program I could find for Event log management and reporting.

Thanks.
0
Comment
Question by:shogo669
1 Comment
 
LVL 17

Accepted Solution

by:
Eagle6990 earned 125 total points
ID: 11844838
I really like EventSentry www.eventsentry.com

It can e-mail you when events are happening and lots of other things.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Note: This is the second blog post in a series on email clearinghouses (https://www.xmatters.com/alert-management/blog-email-has-failed-us?utm_campaign=70138000000ydLoAAI&utm_source=exex&utm_medium=article&utm_content=blog-post).   Every month t…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now