Go Premium for a chance to win a PS4. Enter to Win


Does Windows 7 log all files every opened?

Posted on 2011-09-02
Medium Priority
Last Modified: 2012-05-12

Im trying to find out whether windows retains a log of all files ever opened and what location is was launched from.

Question by:daiwhyte
LVL 21

Accepted Solution

netcmh earned 501 total points
ID: 36473741
Opening a file is a vague term. Applications and users "open" files differently.

Are you trying to get a log of user actions on a commonly shared file/s or folder/s? If so, then a versioning software might be the answer.

Since, the OS log files can only grow up to a limit, they tend to overwrite the oldest data. Not sure how long back you wanted to go.

Assisted Solution

ChopOMatic earned 501 total points
ID: 36473859
Unfortunately, the answer is no. There is a journal (USNJRNL) that maintains a record of file changes, but no system process that logs every open. Any such log would be prohibitively cumbersome to maintain IMHO. To see what I mean, download and run FILEMON. This will let you view file activity on your system in real time. Watch it for a few minutes, then imagine that a process like that is running 100% of the time and documenting that activity.
LVL 65

Assisted Solution

btan earned 498 total points
ID: 36477141
Windows 7 does not keep the copy of the files ever opened.

Even at audit policy level [1], it goes as far as to just tracking all the files that are accessed by defined groups of (local/domain) users or even to per user audit trail. The event are captured provided the policy are enabled prior to those activities.

Windows has Shadow Copy (Volume Snapshot Service or Volume Shadow Copy Service or VSS) [2] which is a technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of data, even if it has a lock, on a specific volume at a specific point in time over regular intervals. The end result is similar to a versioning file system, allowing any file to be retrieved as it existed at the time any of the snapshots was made. But it is not necessarily triggered when document is opened. E.g. The shadow copy is not created every time a file is changed; backup copies are created automatically once per day, or manually when triggered by the backup utility or installer applications which create a restore point. For program installed, there is always a snapshot capture of the machine state, or they sometime called it restore point created.

There is possibility to track temp files but not necessary the copy of the final file. It is dependent on the application use to open the files. E.g For microsoft office, one of the possible area is stored in the Temp folder and there may be more [3]. The recently open file are also tracked by office [4]. Interesting for outlook attachment, there can be log of it too [5].

Overall, unless using third party product monitoring the file or you are setting up honeypot, it depends mostly on the application as well.
The logging of file is space eater hence probably tracking and logging the event may suffice. Just some thoughts

[1] http://social.technet.microsoft.com/wiki/contents/articles/advanced-security-auditing-in-windows-7-and-windows-server-2008-r2.aspx
[2] http://en.wikipedia.org/wiki/Shadow_Copy
[3] http://support.microsoft.com/kb/211632
[4] http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots#Recently%20Opened%20Office%20Docs
[5] http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots#Temp%20folder%20for%20Outlook%20attachments

Author Closing Comment

ID: 36488458
Thank you.

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question