Network monitoring tools

Posted on 2012-09-06
Last Modified: 2012-10-15
Hello Experts,

I have a Windows network, I have setup network shared drives that users access. I'm looking for the best solution to monitor the use of the resorses on the shared drives, I would like to see which user opens the folders and files in them, know who modified, copied, deleted them.
What is the best solution to acomplish that?

Thakn you,

Question by:Sergey_Nesterenko
    LVL 25

    Assisted Solution

    We use a program called File System Auditor from Scriptlogic.
    LVL 38

    Expert Comment

    If they are based off the NTFS file system, you can audit each share by going into advanced properties of the file folder that hosts the share and select the audit tab. Once done, event logs will be created and you can then create a custom event subscription to audit the share.

    So, step 1:  Set up Auditing on the share
    Step 2: Set up custom/filtered event subscriptions on that audit for a custom event log view.
    LVL 6

    Expert Comment

    like the above, enable auditing on the network folders.

    Then search for SIEM tools, alot of them offer free editions to monitor 1 server,

    then using the SEIM tools create threads based on EventID's

    i.e. file access, file delete, printing, copying etc

    You can even create email alerts based on if an event is generated and so on........
    LVL 4

    Accepted Solution

    FileAudit will do the job. This software solution will allow you to:

    - Monitor access (or access attempts) to sensitive files and folders stored on Windows systems
    - Automatically archive all file access events occurring on one or several Windows systems for future reference
    - Display file and folder access history in a printable report that can be scheduled to run automatically
    - Export file and folder access history data to Excel for in-depth analysis and control

    Detailed features and trial download:

    Hope it'll help!

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    Join & Write a Comment

    Suggested Solutions

    Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    23 Experts available now in Live!

    Get 1:1 Help Now