Solved

File Monitoring

Posted on 2014-10-27
3
99 Views
Last Modified: 2014-11-20
Does anyone know of a software package to monitor folder and file modifications on a Windows server?
Would just like something that would log any time a network user changed, moved or deleted something from a network share. Would like to see who did what and when.

Tried security auditing folders, and possibly i'm just an idiot, but the amount of information logged made it difficult to interpret. Every action has dozens of log entries, and are confusing.

A daily report on file changes would be awesome!
0
Comment
Question by:DrPing
3 Comments
 
LVL 16

Assisted Solution

by:choward16980
choward16980 earned 250 total points
ID: 40407034
Shadow copy and file auditing.
0
 
LVL 10

Accepted Solution

by:
Pramod Ubhe earned 250 total points
ID: 40408715
if you have a event log monitoring system like nagios/scom, you can enable auditing and they can send you an alert on specific event logs for move or delete.
for change there would be lot of logs to deal with.
0
 

Author Closing Comment

by:DrPing
ID: 40455641
Neither contributor had an answer.... except auditing, which I specified is too log intensive.

Found a product called  Netwrix File Server Auditor, and from their website it seems to provide the reports I'd like.
No pricing on their web page, but I have requested a quote before I go through the effort of a demo.
If it's reasonably priced, and does what it says... guess I found my own answer.
But I can't give the points to myself, so I split it between the only responders.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question