Solved

Does Windows 7 log all files every opened?

Posted on 2011-09-02
4
333 Views
Last Modified: 2012-05-12
Hi

Im trying to find out whether windows retains a log of all files ever opened and what location is was launched from.

Thanks
D
0
Comment
Question by:daiwhyte
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 20

Accepted Solution

by:
netcmh earned 167 total points
ID: 36473741
Opening a file is a vague term. Applications and users "open" files differently.

Are you trying to get a log of user actions on a commonly shared file/s or folder/s? If so, then a versioning software might be the answer.

Since, the OS log files can only grow up to a limit, they tend to overwrite the oldest data. Not sure how long back you wanted to go.
0
 
LVL 5

Assisted Solution

by:ChopOMatic
ChopOMatic earned 167 total points
ID: 36473859
Unfortunately, the answer is no. There is a journal (USNJRNL) that maintains a record of file changes, but no system process that logs every open. Any such log would be prohibitively cumbersome to maintain IMHO. To see what I mean, download and run FILEMON. This will let you view file activity on your system in real time. Watch it for a few minutes, then imagine that a process like that is running 100% of the time and documenting that activity.
0
 
LVL 64

Assisted Solution

by:btan
btan earned 166 total points
ID: 36477141
Windows 7 does not keep the copy of the files ever opened.

Even at audit policy level [1], it goes as far as to just tracking all the files that are accessed by defined groups of (local/domain) users or even to per user audit trail. The event are captured provided the policy are enabled prior to those activities.

Windows has Shadow Copy (Volume Snapshot Service or Volume Shadow Copy Service or VSS) [2] which is a technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of data, even if it has a lock, on a specific volume at a specific point in time over regular intervals. The end result is similar to a versioning file system, allowing any file to be retrieved as it existed at the time any of the snapshots was made. But it is not necessarily triggered when document is opened. E.g. The shadow copy is not created every time a file is changed; backup copies are created automatically once per day, or manually when triggered by the backup utility or installer applications which create a restore point. For program installed, there is always a snapshot capture of the machine state, or they sometime called it restore point created.

There is possibility to track temp files but not necessary the copy of the final file. It is dependent on the application use to open the files. E.g For microsoft office, one of the possible area is stored in the Temp folder and there may be more [3]. The recently open file are also tracked by office [4]. Interesting for outlook attachment, there can be log of it too [5].

Overall, unless using third party product monitoring the file or you are setting up honeypot, it depends mostly on the application as well.
The logging of file is space eater hence probably tracking and logging the event may suffice. Just some thoughts


[1] http://social.technet.microsoft.com/wiki/contents/articles/advanced-security-auditing-in-windows-7-and-windows-server-2008-r2.aspx
[2] http://en.wikipedia.org/wiki/Shadow_Copy
[3] http://support.microsoft.com/kb/211632
[4] http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots#Recently%20Opened%20Office%20Docs
[5] http://www.irongeek.com/i.php?page=security/windows-forensics-registry-and-file-system-spots#Temp%20folder%20for%20Outlook%20attachments
0
 

Author Closing Comment

by:daiwhyte
ID: 36488458
Thank you.
0

Featured Post

Are You Headed to Black Hat USA 2017?

Getting ready for Black Hat next week? Kick things off with the WatchGuard Badge Challenge and test your puzzle and cipher skills. Do you have what it takes to earn our limited edition Firebox Badge? Get started today - https://crimsonthorn.net

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question