?
Solved

Who accessed my files

Posted on 2010-11-26
7
Medium Priority
?
655 Views
Last Modified: 2012-05-10
I have an employee that has a shared folder on his Wndows Xp machine running in a Domain at work. He has shared the folders so that he can access them over the network when he uses a VPN connection to work from home. But now he finds out that some of his files has been accessed during the night and it has not been him. It says "Date accessed: 01:25".

Is there a way to find out which person/computer has accessed the files through some sort of log? Can there be anything else that has changed the access date for the files during the night, so that this is normal? Btw there is no antivirus og backup that has been scheduled to run at this particular insidence.

 
0
Comment
Question by:mintraas
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
7 Comments
 
LVL 4

Accepted Solution

by:
delyan_valchev earned 2000 total points
ID: 34216618
Hello,
You may want to turn on the access auditing on the particular shares or particular files. This way you will have the events logged to the Security event log.
Keep in mind that you need to enable the Audit object access setting in the local security policies (if not already defined through GPO). The setting is located in:
 Security Settings->Local Policies->Audit Policy->Audit object access
After that you can enable the auditing by setting the advanced security->auditing on the folders or individual files. If you are really paranoid, enable both success and failure auditing for Everyone on everything. This will have a hit on the performance and also quite some events will be overflowing the security log.

Hope it helps!
0
 

Author Comment

by:mintraas
ID: 34216792
Ok, so there is no way to see what has already happend to these files when this function is not turned on at the moment?
0
 
LVL 12
ID: 34216984
Bear in mind that AV scanning may affect the date accessed time.

Check to see if any scheduled scans are due to run at that time.
0
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

 
LVL 12
ID: 34216991
Note to self, please read all the way down the question next time!
0
 
LVL 4

Expert Comment

by:delyan_valchev
ID: 34217037
Unfortunately if you have no auditing enabled, you cannot see who or what exactly accessed the particular file. You can however check in the security log the time frame around 01:25 for any authentications from remote computers and/or users. This way you can only suspect someone.
0
 
LVL 4

Expert Comment

by:delyan_valchev
ID: 34217057
By the way another culprit may be a some indexing service like Windows Desktop Search or Google Desktop which indexes the supported files in the background. If there is such software installed it's likely to be the cause.
0
 

Author Closing Comment

by:mintraas
ID: 34217221
Thx. I configured, tested and it works.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses
Course of the Month14 days, 14 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question