[Last Call] Learn how to a build a cloud-first strategyRegister Now


File tracking on peer to peer network?

Posted on 2006-03-29
Medium Priority
Last Modified: 2013-11-21
I have a 4 machine network all running XP Pro.  We share an accounting package and some files from my computer.

Is there any way to track what files are being accessed and more importantly taken from the computers? (email, CDR, floppy, ftp etc...)?

I want to know what has been done in regards to that on each machine.

Question by:fekdep

Assisted Solution

samb39 earned 1000 total points
ID: 16329104
You can set Auditing on the folders, and that will record all use of them.  There is no way to see what happened before you started Auditing.

Here is a guide to setting up auditing:


It is a two-step process: first you have to enable auditing in Local Security Policy, and then you have to go into the properties of the folders and/or files of interest to set them for auditing.

The result appears in the Security log, and it is a real mess, with 8 or more events for every time anyone makes any use of any file or folder being audited.

In addition, the Security log is easily editable, so it will not hold up in court as proof that events happened.  If you plan to prove in court anything about object access, you must use third-party software that datestamps and encrypts the logs so that they cannot be altered.

Accepted Solution

imacgouf earned 1000 total points
ID: 16330652

There are a list of this year monitoring software report which may suit your needs.


What to Look for in Monitoring Software?
With technology changing at a rapid pace, it is difficult to know which monitoring software is best and what should be sought when purchasing software. Below are the criteria TopTenREVIEWS used to evaluate Internet service providers.

 Feature Set – The monitoring software should offer all of the features needed to monitor your computer’s activity and monitor chat, email, instant messaging downloads, webpages and keystrokes. The software should provide a stealth mode and various scheduling and reporting features.

 Ease of Use – The product should be easy to install, easy to setup and easy to use.  

 Easy of Installation/Setup – The program should be easy to install and setup without errors or a number of unnecessary steps so anyone could successfully install and run the program regardless of their computer literacy.

 Monitoring Effectiveness – The monitoring software should allow you to identify all activity that is occurring on your computer, by whom, and when.

Expert Comment

ID: 16338033
No.  The only thing you can do is run secpol.msc and lock down the machines.
New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.


Expert Comment

ID: 16338045
Also you can run keystroke copying software, but doing so may not be good moral for your users if they find out.  It also becomes a security issue more that what you might already be experiencing

Author Comment

ID: 16338468
what is secpol.msc?

Expert Comment

ID: 16400890
secpol.msc is the command-line command to launch Local Security Policy.  It's also in Control Panel, in Administrative tools.  These articles go into more detail about Local Security Policy.



Featured Post

Upgrade your Question Security!

Add Premium security features to your question to ensure its privacy or anonymity. Learn more about your ability to control Question Security today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question