Solved

Security Check - Log the files accessed by specific Novell users or IP Addresses?

Posted on 2011-09-20
5
238 Views
Last Modified: 2012-08-13
How can you see a log of which files were accessed by specific Novell users or IP Addresses?
0
Comment
Question by:IT_Clinton
  • 2
5 Comments
 
LVL 19

Accepted Solution

by:
deroode earned 125 total points
ID: 36572021
You will have to install the Nsure audit pack. Download the audit starter pack here:

http://download.novell.com/Download?buildid=DC7JtDaQB5M~

Install and configure with this appnote:

http://www.novell.com/coolsolutions/appnote/19530.html

Use this cool tool to analyze the results:

http://www.novell.com/coolsolutions/tools/19534.html
0
 

Author Comment

by:IT_Clinton
ID: 36584271
From the App Note on how to install and configure, it looks like this would start logging.  There are no existing logs to check if I want to go backwards 1 week from today  to check times and who accessed certain files on Novell servers???
0
 
LVL 19

Assisted Solution

by:deroode
deroode earned 125 total points
ID: 36585347
Yes, indeed.

Logging all access is an intensive process. If logging everything was a default operation the logs would fill all available space in a couple of months.
However, if you want to know who last changed a file you can check the owner. Usually (e.g. when editing a Word document) the new document is automatically owned by the editor.
0
 
LVL 59

Expert Comment

by:Kevin Cross
ID: 37439540
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
GroupWise attachment 9 524
hp laserjet 9050 printer control 8 557
How to automate Flash upgrades without Administrative rights on the local workstation? 10 283
Novell Login Scripts 3 689
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Knowledge base software has turned out to be a quite reliable method for storing information, promoting collaborative work and for sharing valuable input and solutions.However, some organizations are trying to develop a knowledge base that works wit…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now