Solved

How to monitor Multiple file downloads

Posted on 2013-01-22
7
259 Views
Last Modified: 2013-05-19
I'm hoping to find an answer, thank you for taking the time to read my question.

Is there a way to monitor users on my network who have the ability to download multiple files (for example: 20 files) at one time. Is there a way to monitor or track what was downloaded and where they download them to?

The reason I'm asking is due to the advent of numerous Cloud based file transfer sites/software (Dropbox, YouSendIt..etc), is there anyway to protect my company's intellectual property from theft? Is there a way to limit the number or prevent large numbers of files being download to external media such as a flash drive?
0
Comment
Question by:arceeprime
  • 3
7 Comments
 
LVL 1

Expert Comment

by:alatechsolutions
ID: 38808488
Look into the Untangle Hardware Device. It has numerous features like what you are talking about like bandwidth quota's, policy manager, and Reports/Logs.
0
 
LVL 79

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 38808509
1. Limit access to files.. If the user doesn't specifically require access to the file to perform their job then don't give them access to it, period.  Implent file auditing... perhaps make a few honeypot files on shares that the users don't nomally access and audit the heck out of them.
2. you can block usb drives using group policy, restrict web browsing to trusted sites only,
3. If you still don't trust your employees then fire them.  You have to trust your employees in order for a business to work.  In a retail business, you trust cashiers to process customer transactions, but you still have video monitoring (just the fact that they MAY be monitored acts as a deterrence) and count the contents of the cash drawer and see that it matches the sales receipts.
0
 

Author Comment

by:arceeprime
ID: 39170341
I've requested that this question be deleted for the following reason:

The responses were helpful.
0
 
LVL 79

Expert Comment

by:David Johnson, CD, MVP
ID: 39170342
The responses were helpful.  and you want to delete the question?
0
 
LVL 79

Expert Comment

by:David Johnson, CD, MVP
ID: 39177746
(c) both are valid solutions to an unsolvable problem. if someone has access to a file it is hard to restrict what they do with the file.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We were having a lot of "Heartbeat Alerts" in our SCOM environment, now "Heartbeat" in a SCOM environment for those of you who might not be familiar with SCOM is a packet of data sent from the agent to the management server on a regular basis, basic…
Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
The viewer will learn how to simulate a series of coin tosses with the rand() function and learn how to make these “tosses” depend on a predetermined probability. Flipping Coins in Excel: Enter =RAND() into cell A2: Recalculate the random variable…
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question