File and Folder Access Logging w/o Windows Auditing

Posted on 2005-04-25
Last Modified: 2013-12-04
I would like to know if there's some kind of software out there that logs file and folder read/write/changes and also gives me the NT user, time, and day of the change.  As I said in the title, i do not want to use NT auditing.  I want to log a folder on a NAS fileserver (with a dumbed down version of 2000 it seems) on a NT4 domain.  Thanks for any help!
Question by:jingaling
    LVL 38

    Expert Comment

    by:Rich Rumble
    That's a tough one... if the folders and files resided on an FTP share you'd use the ftp log's but if it's an NT share then there are a few other 3rd party applications that can be installed to do this, the one that sprung to mind for me was NetAware
    Monitor Magic is another
    LVL 12

    Expert Comment

    I dont know if this would work in your situation but you can try it for free:

    Hope this helps.

    Author Comment

    Thanks for the replies.  rich: netaware looks good but it does not log file creation and change which we need.  It just logs opens and closes (at least on my comptuer).  Monitor Magic doesn't seem to do this either.  gidds:  i've used GFI SELM and it is my backup choice because it runs on top of NT auditing.  Thanks for the suggestions though...keep em coming :)
    LVL 38

    Accepted Solution

    If you like SELM then you may also like Snare:

    There is a script that can be modified to alert you when a new file or folder is added to a directory... but it's not good enough for your purposes probably
    see also

    The utils on this page may also help?

    This would be easy with NT events.... grrrr:)

    Oh yeah... don't know why I didn't think of it before... sysinternals!
    Still these may not do all of what you ask
    LVL 3

    Expert Comment

    You could also take a look at File Audit its pretty basic but functional.

    LVL 38

    Expert Comment

    by:Rich Rumble
    I think my comments and links provide viable alternitives and a solution to the asker.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
    The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now