?
Solved

How can I see if a file has been copied to an external device?

Posted on 2008-10-08
13
Medium Priority
?
1,848 Views
Last Modified: 2012-06-27
One of our users left the company. His manager suspects that he gave some confidential files to our business rival. He wants me to check the laptop for files that have been copied to an external device.
Is there any way to do this?
Thanks.
0
Comment
Question by:elkep
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
  • 2
  • +2
13 Comments
 
LVL 4

Expert Comment

by:Chris James
ID: 22668585
Check the creation/modification/access date on the files that may have been copied by going into the file properties.
0
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 22668871
When you're viewing files in explorer, view > details, it will give you the date when the file was last modified.

0
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 22668913
Sorry, for the duplication, ignore my post.
0
Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

 

Author Comment

by:elkep
ID: 22668937
I could do that but that is no proof. And also, there are lots of files.
0
 
LVL 4

Expert Comment

by:Chris James
ID: 22669015
Why isn't it proof?  it clearly shows the times on the timestamp.

What you can do is CD into the directory through CMD

and do a DIR listing on the contents of the directory and send the output to a file.


ex..

dir > C:\file.txt

If you go to CMD and type DIR /? it will give you a list of switches and options you can use to filter out specific information such as creation date, ex... /T  (time field)    C is for Creation, A is for last Accessed, and W is for last written.

Hope this helps.
0
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 22669092
>>> And also, there are lots of files.<<<

When viewing them via file properties you can only see each file, but in explorer, when you rightclick anywhere on the right pane and click View > Details, and you can see all the files and their 'last modified' dates in one page.
0
 
LVL 33

Expert Comment

by:MikeKane
ID: 22669121
The modify date of the file is not proof the file was copied.  For all he knows, the file was opened, a comma was added, then saved back to the original file name.  

I don't think you can get this type of historical info unless you had a process in place to monitor the file usage already.  

0
 
LVL 47

Expert Comment

by:rpggamergirl
ID: 22669149
No, not a proof of course.
I don't know if there's anyway to prove that a file has been copied.
0
 
LVL 23

Assisted Solution

by:Danny Child
Danny Child earned 300 total points
ID: 22669446
We have some software in use called Sanctuary, which used to be from SecureWave, who have become Lumension
http://www.lumension.com
 - it blocks access to all removable media - USB, Floppy, CD, fitting a 2nd hard disk, scanners, iPods, , mobiles, PDAs, the works.

Perhaps this is a case in point for your organisation to consider using it....

Of course, you'll also need to block access to Hotmail and other file-sharing sites too.  And keep some solid logs of (supposedly legitimate) email traffic too.
0
 
LVL 4

Assisted Solution

by:Chris James
Chris James earned 300 total points
ID: 22669512
rpggamergirl:  there is proof, ever hear of a honey pot before? They run software that monitors hard disk activity and file activity, etc.

It is possible.
0
 
LVL 33

Accepted Solution

by:
MikeKane earned 900 total points
ID: 22669736
Like I said, It is possible, but it requires a solution setup up before the incident.  You can't go back to pull historicals with a 3rd party prior to the date the 3rd party was installed.  

Unless you have this setup already,  I don't see a way to get this info now.


0
 
LVL 4

Expert Comment

by:Chris James
ID: 22669775
MikeKane:  Yea, that's 100% true.
0
 

Author Closing Comment

by:elkep
ID: 31504213
Thank you all for your answers. Indeed, you need a 3rd party software already installed if you want to prove anything. Maybe the Sanctuary Software is an option here.
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An introduction to the wonderful sport of Scam Baiting.  Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question