Solved

Security Check - Log the files accessed by specific Novell users or IP Addresses?

Posted on 2011-09-20
5
256 Views
Last Modified: 2012-08-13
How can you see a log of which files were accessed by specific Novell users or IP Addresses?
0
Comment
Question by:IT_Clinton
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 19

Accepted Solution

by:
deroode earned 125 total points
ID: 36572021
You will have to install the Nsure audit pack. Download the audit starter pack here:

http://download.novell.com/Download?buildid=DC7JtDaQB5M~

Install and configure with this appnote:

http://www.novell.com/coolsolutions/appnote/19530.html

Use this cool tool to analyze the results:

http://www.novell.com/coolsolutions/tools/19534.html
0
 

Author Comment

by:IT_Clinton
ID: 36584271
From the App Note on how to install and configure, it looks like this would start logging.  There are no existing logs to check if I want to go backwards 1 week from today  to check times and who accessed certain files on Novell servers???
0
 
LVL 19

Assisted Solution

by:deroode
deroode earned 125 total points
ID: 36585347
Yes, indeed.

Logging all access is an intensive process. If logging everything was a default operation the logs would fill all available space in a couple of months.
However, if you want to know who last changed a file you can check the owner. Usually (e.g. when editing a Word document) the new document is automatically owned by the editor.
0
 
LVL 60

Expert Comment

by:Kevin Cross
ID: 37439540
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
Today’s effective marketing is about coming down to the customers’ level and engaging in a whole new way. A text message is one of the most effective and influential ways that you can engage your customers. Here are eight ways that you can utilize t…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question