Solved

Tools to track/audit  1 Windows user access on server

Posted on 2014-11-17
1
148 Views
Last Modified: 2014-12-30
Anyone know of an effective, cost effective solution to monitor a single users file manipulations on a server.

User is remoting into office, RDPing to a desktop manipulating files on server from machine in office, Pres of Co wants a history of where she goes/what she does on Win2k8 Server.
Cost is a factor, and really dont want to add overhead to server. Any solutions that run on a desktop?
Thoughts/ideas?

Thanks!!
0
Comment
Question by:LICOMPGUY
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 81

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40472807
you want to know everything but want no impact or low impact on the server. This is cross purposes, since to get the information you have to audit everything auditing is not granular enough to limit itself to a single user. So you are going to get large audit logs that you have to filter onto the user in question. this will put a strain on the disk subsystem and have possible hard drive space implications .. If you don't trust the user then restrict their access severely by putting them into their own OU and ntfs/share permissions  and then you will be limiting the total amount of damage that the user is capable of.thjis will also limit the area that you need to audit
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction People like FTP.  It's a solid, stable, robust protocol for quickly transferring files between two hosts using TCP/IP.  In most cases it's much faster than SMB or CIFS, and certainly much easier to set up between organizations.  This…
Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question