Solved

Tools to track/audit  1 Windows user access on server

Posted on 2014-11-17
1
151 Views
Last Modified: 2014-12-30
Anyone know of an effective, cost effective solution to monitor a single users file manipulations on a server.

User is remoting into office, RDPing to a desktop manipulating files on server from machine in office, Pres of Co wants a history of where she goes/what she does on Win2k8 Server.
Cost is a factor, and really dont want to add overhead to server. Any solutions that run on a desktop?
Thoughts/ideas?

Thanks!!
0
Comment
Question by:LICOMPGUY
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 82

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40472807
you want to know everything but want no impact or low impact on the server. This is cross purposes, since to get the information you have to audit everything auditing is not granular enough to limit itself to a single user. So you are going to get large audit logs that you have to filter onto the user in question. this will put a strain on the disk subsystem and have possible hard drive space implications .. If you don't trust the user then restrict their access severely by putting them into their own OU and ntfs/share permissions  and then you will be limiting the total amount of damage that the user is capable of.thjis will also limit the area that you need to audit
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question