Solved

Looking for software that will notify me either by log or email that a file from the network has been copied to USB

Posted on 2015-01-16
3
94 Views
Last Modified: 2015-03-06
Due to the sensitivity of certain files on specific network, we recently installed file auditing software that will send an email notifying us when file access was granted or denied on the file server.  Yes you could do this with windows event logs, but this has a nice interface, was inexpensive, and it a lot easier for many reasons.  Now to build on that, I've been tasked with finding a software that will notify us when a file from the corporate network has been copied to USB or other removable storage.  You would think something like this exists, but I can't seem to find anything.  We have a certain OU in Active Directory that are allowed to use USB ports, so they can use thumb drives and different removable storage they need to for their job.  Has anyone used a software that would do this, if so, what was it?  I appreciate any help.  Thanks!
0
Comment
Question by:denver218
  • 2
3 Comments
 
LVL 79

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40554458
no such animal exists, you will need to implement some sort of DRM i.e. Active Directory Rights Management Services.  Isn't notification of a file being copied to a removable device like having a burglar alarm for an unlocked room. Better to just lock the door.
What about copying to onedrive or other cloud storage service?
0
 
LVL 4

Author Comment

by:denver218
ID: 40576119
We found a software called device lock that does log or email us when something been copied to USB.  We are testing it now.
0
 
LVL 4

Author Closing Comment

by:denver218
ID: 40649088
You ended up being right, we found a few softwares, but when testing them, none of them did exactly what I was looking for.  We just locked all USB ports down.  Thanks.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now