Solved

How to audit and report file and folder access

Posted on 2011-03-07
2
728 Views
Last Modified: 2012-05-11
So, I've searched the knowledgebase and came up with a few ideas, but what I'm really looking for is a "best in class" way to BOTH audit and report on user access to files and folders.  

--Have 2003 & 2008 servers
--In a HIPAA environment
--Servers have auditing turned on
--Could use eventdump to export the event logs

BUT, that process produces massive amounts of data - not information.

Sure, I could charge the client by the hour to convert the mass of data to info, but that wouldn't last beyond the first invoice.

I'm looking for:
--who accessed what
--when
--some degree of what they did with whatever they accessed

There's got to be a better way that doesn't break the bank.

Ideas?
0
Comment
Question by:jgutman
2 Comments
 
LVL 5

Accepted Solution

by:
alreadyinuse earned 500 total points
ID: 35063389
Scriptlogic File System Auditor, resonable in cost and does pretty much what you are asking.
0
 
LVL 1

Author Closing Comment

by:jgutman
ID: 35111942
Good answer, good tool, but expensive!
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I had a question today where the user wanted to know how to delete an SSL Certificate, so I thought that I would quickly add this How to! Article for your reference. WHY WOULD YOU WANT TO DELETE A CERTIFICATE? 1. If an incorrect certificate was …
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question