Solved

Auto Notify when file is opened.

Posted on 2011-09-11
3
231 Views
Last Modified: 2012-05-12
The scenario is I would like to be alerted by email if a file is ever opened. I'm not sure where to begin. The file would contain network system admin information for an organization, more then likely would be stored on CD/DVD media or thumb drive and stored in a vault unless needed.

Any ideas?
0
Comment
Question by:rpdsupport
3 Comments
 
LVL 37

Accepted Solution

by:
Neil Russell earned 250 total points
ID: 36519417
Often Physical Security is far far better than any computer solution.

Encrypt the CD.
Store it in firesafe A that NO IT personel have free access to. Have to ask, for example HR for the CD.
Now there is the matter of the Encrption password? That should be obtainable from somebody else, normally the directors.

So NO ONE person can get access to it. Needs HR to physically give you the disk and A Director to unlock with a password BEFORE you as an IT person can access the files with sensetive data in.
0
 

Author Comment

by:rpdsupport
ID: 36519590
Let me explain a little more. I am the sole person with admin level access to anything and everything. The companies position (understandable) is what would happen if I got hit by a bus? I tried this several years ago (same company) with turning information over which was supposely to remain secure. I think I learned that lesson.
0
 

Assisted Solution

by:qv1
qv1 earned 250 total points
ID: 36532960
Encrypt the document using 7-zip. Don't tell anyone the password. Name the file "Only send email to hit.by.bus.today@gmail.com for password in emergency".

Create a gmail account named hit.by.bus.today@gmail.com. Forward all of its emails to you. Never use the account.

Then, setup a filter in gmail that looks for an email from your company that auto-replies with an email that includes the password and your epitaph.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

From Coral's  "So You Want To Play With Computers" Series Preface: What follows is a tweaked reprint from 2005/06. This is a True Story. The names have been changed to protect the guilty. While this deals with a fairly simple, text file recovery…
VM backups can be lost due to a number of reasons: accidental backup deletion, backup file corruption, disk failure, lost or stolen hardware, malicious attack, or due to some other undesired and unpredicted event. Thus, having more than one copy of …
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now