Solved

How to monitor Multiple file downloads

Posted on 2013-01-22
7
257 Views
Last Modified: 2013-05-19
I'm hoping to find an answer, thank you for taking the time to read my question.

Is there a way to monitor users on my network who have the ability to download multiple files (for example: 20 files) at one time. Is there a way to monitor or track what was downloaded and where they download them to?

The reason I'm asking is due to the advent of numerous Cloud based file transfer sites/software (Dropbox, YouSendIt..etc), is there anyway to protect my company's intellectual property from theft? Is there a way to limit the number or prevent large numbers of files being download to external media such as a flash drive?
0
Comment
Question by:arceeprime
  • 3
7 Comments
 
LVL 1

Expert Comment

by:alatechsolutions
Comment Utility
Look into the Untangle Hardware Device. It has numerous features like what you are talking about like bandwidth quota's, policy manager, and Reports/Logs.
0
 
LVL 78

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
Comment Utility
1. Limit access to files.. If the user doesn't specifically require access to the file to perform their job then don't give them access to it, period.  Implent file auditing... perhaps make a few honeypot files on shares that the users don't nomally access and audit the heck out of them.
2. you can block usb drives using group policy, restrict web browsing to trusted sites only,
3. If you still don't trust your employees then fire them.  You have to trust your employees in order for a business to work.  In a retail business, you trust cashiers to process customer transactions, but you still have video monitoring (just the fact that they MAY be monitored acts as a deterrence) and count the contents of the cash drawer and see that it matches the sales receipts.
0
 

Author Comment

by:arceeprime
Comment Utility
I've requested that this question be deleted for the following reason:

The responses were helpful.
0
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
Comment Utility
The responses were helpful.  and you want to delete the question?
0
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
Comment Utility
(c) both are valid solutions to an unsolvable problem. if someone has access to a file it is hard to restrict what they do with the file.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

This is a fairly complicated script that will install the required prerequisites to install SCCM 2012 R2 on a server.  It was designed under the functional model in order to compartmentalize each step required, reducing the overall complexity.  The …
Deploying a Microsoft Access application in a Citrix environment is not difficult but takes a few steps. However, Citrix system people are often of little help, as they typically know next to nothing about Access. The script provided here will take …
Viewers will learn how to maximize accessibility options in an Excel workbook for users with accessibility issues.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now