Solved

Auditing of Files

Posted on 2014-12-12
1
131 Views
Last Modified: 2015-02-02
Hello,
      I have a need to audit a directory to see how many times files in this directory are accessed. The purpose being that we purchase and download these files and store them in a directory for users to access. We really have no idea what files are actually being viewed. If we knew what files are being viewed and how often we may be able to eliminate purchasing the files that are not be viewed.

Thank you
0
Comment
Question by:daskas27
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 11

Accepted Solution

by:
rharland2009 earned 500 total points
ID: 40496086
If you're a Windows shop, then you can set object access auditing for the server/file/folder you wish and come up with a method to extract the logs or just view them on the server where the folder resides. If you don't want your logs to fill up fast, then you can simply enable object access auditing on the folder in question. This will spit out an eventlog for when a client tries to open a file, etc. Again, this is dependent on you being a Windows shop.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Forwarding with Microsoft DNS 11 43
Unable to enable HWIC 2FE 2 31
Deploying MSI package with GPO 3 27
Network VLAN 3 17
Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question