Solved

File Access Monitoring/Logging Options

Posted on 2013-02-02
3
266 Views
Last Modified: 2013-02-07
We have some clients who would like to be able to keep a log of which users access which files on the file server.  Any recommendations on a good software program to log or monitor this information.

Essentially looking for a list or report that we can sort by user or file and see when it was access and (if possible) was the file changed or deleted.

(The file server is a Windows 2003 Standard OS)

Thanks!
0
Comment
Question by:AutomatedIT
3 Comments
 
LVL 1

Expert Comment

by:shawnlo
ID: 38846963
I believe AdAudit from manageengine does this and more.

I have used some of their other software and it has worked well.
0
 
LVL 70

Expert Comment

by:KCTS
ID: 38847354
Windows does of course have auditing built in which can be used for such things, however, while its comprehensive, the built in tools make it difficult to extract the information you need.
Other options such as file audit http://www.softpedia.com/get/System/System-Miscellaneous/File-Audit.shtml
do a reasonable job without the 'noise' and overheads.
0
 
LVL 4

Accepted Solution

by:
JustMy2Cents earned 500 total points
ID: 38849397
FileAudit will do the job, as this software solution allows you to:

- Monitor access (or access attempts) to sensitive files and folders stored on Windows systems
- Automatically archive all file access events occurring on one or several Windows systems for future reference
- Display file and folder access history in a printable report that can be scheduled to run automatically
- Export file and folder access history data to Excel for in-depth analysis and control

Detailed info and free trial:
http://www.isdecisions.com/products/fileaudit

I also noticed there is a new version coming (still in RC though):
http://community.isdecisions.com/knowledgebase/articles/142333-fileaudit-4-beta-testing-program-how-to
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Read-only access for auditors 5 43
Backup DHCP Server 8 73
Trasfering FSMO roles 8 76
Sudden performance loss on a Vista system. 14 114
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now