Solved

Utilities other than GFI SELM to audit event logs with

Posted on 2004-08-19
1
228 Views
Last Modified: 2012-05-05
Does anybody know of another application I can use to keep track of file deletions? I enabled Audit success for the local security policy and I am able to enable successful and unsuccessful file deletions. But I want an easier way than going through the security event log and looking for event id 560 plus I want it to keep track of it for a long time where as the event logs are set to overwrite after when full. I looked at GFI SELM and didn't really care for it but that was the only program I could find for Event log management and reporting.

Thanks.
0
Comment
Question by:shogo669
1 Comment
 
LVL 17

Accepted Solution

by:
Eagle6990 earned 125 total points
ID: 11844838
I really like EventSentry www.eventsentry.com

It can e-mail you when events are happening and lots of other things.
0

Featured Post

Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question