Solved

Windows 2003 Terminal Server - Need Folder Monitoring

Posted on 2009-07-03
4
246 Views
Last Modified: 2012-05-07
I have an accounting folder that I am wanting to monitor.

I have it shared out to a select few.

I need to know successful and failed attempts on this folder.

I am not running AD.
0
Comment
Question by:j4piper
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 84

Expert Comment

by:oBdA
ID: 24773868
Works just the same way as described here for XP:
How to audit user access of files, folders, and printers in Windows XP
http://support.microsoft.com/kb/310399
0
 
LVL 84

Expert Comment

by:oBdA
ID: 24773873
Oh, just in case: what that article doesn't tell you is that you'll find the results of the auditing in the security event log.
0
 

Author Comment

by:j4piper
ID: 24773968
I've done that but it shows WAY too many entries in the Event Viewer.

I have filtered on Event ID 560 --- shows what I am looking for but seems to be logging every second or so.

I've had this running for 3 days now and I have 15000 entries.  With only 10 people accessing this one folder.

Is there a better way?
0
 
LVL 84

Accepted Solution

by:
oBdA earned 500 total points
ID: 24774004
Not really. When the system is told to log, it logs, and then it's up to the application how often it accesses the folder or file in question. You can try to reduce what you're logging, and who you're logging (for example only deletion).
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question