Solved

Is there a software that can track what was downloaded onto a flash drive by a user before he was terminated.

Posted on 2011-09-16
5
256 Views
Last Modified: 2012-05-12
I wanted to know if there is a way to see if a user downloaded confidential information onto his flash drive before he left the firm. Is there such a software or a way to find out.
0
Comment
Question by:ssuser1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 62

Expert Comment

by:☠ MASQ ☠
ID: 36553783
Yes but most of it needs installing before the event.  There are some system tools that Windows uses that may help but not give you the detail but these are only available on Vista or later, not XP.
0
 
LVL 62

Accepted Solution

by:
☠ MASQ ☠ earned 500 total points
ID: 36553799
This is the best you're likely to be able to get after the event
Not the files but the fact a USB device was connected and when
http://www.nirsoft.net/utils/usb_devices_view.html
0
 
LVL 4

Expert Comment

by:hassanwarraich
ID: 36554128
no such software is avialable
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 36554516
0
 
LVL 64

Expert Comment

by:btan
ID: 36561367
It is kind of device control and data loss prevention technology. Can check out Devicelock which you can centrally control, log, shadow-copy, and analyze end-user access to and data transfers through all types of peripheral devices and ports, as well as network communications on corporate computers.

http://www.devicelock.com/
0

Featured Post

Is your NGFW recommended by NSS Labs?

Ours is! NSS Labs Next Generation Firewall Test gives the WatchGuard Firebox M4600 a "Recommended" rating! Curious where your NGFW landed on the  Security Value Map? See the map and download the full report today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question