Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Check user file access in Sharepoint

Posted on 2014-01-12
2
Medium Priority
?
139 Views
Last Modified: 2016-01-10
We have inherited a sharepoint system for a client from another company(who had developed).  Today we faced an issue that a sensitive file was accessed by a sharepoint user, printed and sent out.

i would like to know how and where do i check on which user accessed these documents.

currently i have the file names and the potential dates it was accessed.

any suggestions.
0
Comment
Question by:rayboy28
2 Comments
 
LVL 8

Accepted Solution

by:
piyushranusri earned 2000 total points
ID: 39775854
you need to enable item level auditing and the go with the logs..

http://msdn.microsoft.com/en-us/library/bb397403(v=office.12).aspx
hope this link assit you..


please share the output
0
 
LVL 44

Expert Comment

by:Rainer Jeschor
ID: 39775912
Hi,
which (exact) SharePoint version and edition?
If the audit features (if available from the version side) have not yet been activated, then you have no chance within SharePoint. Then the only chance you have is to analyze the IIS logs of the SharePoint web app (if the logs have been activated) and search for a GET on this file - normally the requesting user id is logged there.
HTH
Rainer
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A while back, I ran into a situation where I was trying to use the calculated columns feature in SharePoint 2013 to do some simple math using values in two lists. Between certain data types not being accessible, and also with trying to make a one to…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question