?
Solved

Program to monitor activities of another application

Posted on 2011-03-24
16
Medium Priority
?
383 Views
Last Modified: 2012-05-11
We need to check a certain application and make sure its not going to unauthorized folders.  

Is there an application that we can run, have in memory, and see what X application is accessing what folder?

We need something like SQL Profiler but for application to monitor the folder it visits.
0
Comment
Question by:rayluvs
  • 7
  • 3
  • 3
  • +2
16 Comments
 
LVL 10

Accepted Solution

by:
abbright earned 1000 total points
ID: 35211132
You can use diskmon to monitor disk accesses of a program: http://msdn.microsoft.com/en-us/library/bb896646.aspx
0
 
LVL 3

Expert Comment

by:Josef Al-Chacar
ID: 35211247
Get COMODO fire wall free edition it monitors all programs that try to to anything . If you set it to paranoid protection level. If you set the level to lower it will monitor less programs

It will ask you if you want to let the program do what it wants to.
0
 

Author Comment

by:rayluvs
ID: 35211263
Two things:

   1.  It seems that it doesn't monitor a specific program, it looks that it monitors all read/access.  

         Can we configure to monitor one apps?

    2.  Can we configure to display the path & files is accessing?
          (it seems it uses sectors)
0
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

 
LVL 3

Expert Comment

by:Josef Al-Chacar
ID: 35211607
You can mark files as unrecognized so it monitors those files. Also you can sandbox files which means you can run programs in a virtual environment and if they cause problems you can remove them with no damage to your computer.
0
 

Author Comment

by:rayluvs
ID: 35211871
josefah:

  I have used COMODO as a firewall for long time.   I checked the software but where do I tell to monitor
  a specific program?
0
 
LVL 3

Expert Comment

by:Josef Al-Chacar
ID: 35212036
Yeah i only know how to restrict certain programs. I recommend setting defense plus to paranoid mode then run your program and it will then show what it is trying to access. Yes it will show other stuff too but the end result will be the same.

Something else you could use but would be kind of overkill would be dependency walker. You can select certain files and it tells you exactly what other files it depends on to run. That may point you in the right direction.  
0
 

Author Comment

by:rayluvs
ID: 35212116
Ok... let me say that what we need is to monitor only one application.  Can I do this with Comodo?

Also, what is "dependency walker"?
0
 
LVL 2

Expert Comment

by:Hapexamendios
ID: 35214181
Dependancy walker is a development tool which would show you all dependencies for a particular binary - e.g. all the DLL files a program uses.

Might or might not be useful here.

Try this instead:

Download Sysinternals Suite from http://technet.microsoft.com/en-us/sysinternals/bb842062
Unzip the contents to any folder you like
Locate and run Process Monitor
(When I launch mine, it launches the "Filter" editor by default - you may need to start teh Filter editor manually byu going to the Filter menu, and selecting "Filter..."
In the left drop-down, select "Path", then leave the operator at "is", and enter the path you want to monitor

"Simples", as they say :)

HTH - ping back if not...
0
 

Author Comment

by:rayluvs
ID: 35215154
True, Dependancy walker is not useful; I need to see what folders or files the application hits.  I'll download your link and give it a try.
0
 
LVL 57

Expert Comment

by:McKnife
ID: 35245117
You could use NTFS auditing to see if anyone (or any process) accesses that folder. However, auditing will not prevent processes from doing so.
0
 

Author Comment

by:rayluvs
ID: 35245434
Yes, ok interestimg... where do I find this?
0
 
LVL 57

Assisted Solution

by:McKnife
McKnife earned 1000 total points
ID: 35245473
Right where you set the NTFS permissions. Rightclick the folder - properties - security - advanced - auditing ->setup auditing there. That's only the first half. The second half is here: open secpol.msc - loc. policies - audit policy - audit object access. Done.

Now any sort of access you configured to audit on that folder will be logged to the security event log (open eventvwr).
0
 

Author Comment

by:rayluvs
ID: 35312927
Thanx
0
 

Author Closing Comment

by:rayluvs
ID: 35312950
Thanx
0
 
LVL 57

Expert Comment

by:McKnife
ID: 35317451
I really wonder how diskmon has helped you with that task. It does not show processes nor folder activity - or how do we use it right, abbright?
0
 
LVL 10

Expert Comment

by:abbright
ID: 35317877
Looks like I had something wrong here, sorry. The tool I meant was "filemon" rather than "diskmon": http://en.wikipedia.org/wiki/FileMon. This has been incorporated into sysinternal's process monitor: http://technet.microsoft.com/en-us/sysinternals/bb896645.
I'm really sorry for the confusion.
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question