File tracking on peer to peer network?

I have a 4 machine network all running XP Pro.  We share an accounting package and some files from my computer.

Is there any way to track what files are being accessed and more importantly taken from the computers? (email, CDR, floppy, ftp etc...)?

I want to know what has been done in regards to that on each machine.

Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

You can set Auditing on the folders, and that will record all use of them.  There is no way to see what happened before you started Auditing.

Here is a guide to setting up auditing:

It is a two-step process: first you have to enable auditing in Local Security Policy, and then you have to go into the properties of the folders and/or files of interest to set them for auditing.

The result appears in the Security log, and it is a real mess, with 8 or more events for every time anyone makes any use of any file or folder being audited.

In addition, the Security log is easily editable, so it will not hold up in court as proof that events happened.  If you plan to prove in court anything about object access, you must use third-party software that datestamps and encrypts the logs so that they cannot be altered.

There are a list of this year monitoring software report which may suit your needs.

What to Look for in Monitoring Software?
With technology changing at a rapid pace, it is difficult to know which monitoring software is best and what should be sought when purchasing software. Below are the criteria TopTenREVIEWS used to evaluate Internet service providers.

 Feature Set – The monitoring software should offer all of the features needed to monitor your computer’s activity and monitor chat, email, instant messaging downloads, webpages and keystrokes. The software should provide a stealth mode and various scheduling and reporting features.

 Ease of Use – The product should be easy to install, easy to setup and easy to use.  

 Easy of Installation/Setup – The program should be easy to install and setup without errors or a number of unnecessary steps so anyone could successfully install and run the program regardless of their computer literacy.

 Monitoring Effectiveness – The monitoring software should allow you to identify all activity that is occurring on your computer, by whom, and when.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
No.  The only thing you can do is run secpol.msc and lock down the machines.
Introducing the "443 Security Simplified" Podcast

This new podcast puts you inside the minds of leading white-hat hackers and security researchers. Hosts Marc Laliberte and Corey Nachreiner turn complex security concepts into easily understood and actionable insights on the latest cyber security headlines and trends.

Also you can run keystroke copying software, but doing so may not be good moral for your users if they find out.  It also becomes a security issue more that what you might already be experiencing
fekdepAuthor Commented:
what is secpol.msc?
secpol.msc is the command-line command to launch Local Security Policy.  It's also in Control Panel, in Administrative tools.  These articles go into more detail about Local Security Policy.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
File Sharing Software

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.