Audit share and NTFS permissions on a file server

Audit access rights

If users are given excessive rights and permissions to files, it could result in inappropriate access or unwarranted changes. This would put the entire organization at risk of losing data or incurring compliance-related penalties. DataSecurity Plus addresses this concern by acting as an NTFS and file share permission reporter. With DataSecurity Plus, you can be certain that your employees have all the access they require to do their jobs and nothing more.

By auditing file server permissions and access rights using DataSecurity Plus, users get:

Audit file and folder access permissions

  • Instant, accurate insights on access and share permissions assigned to all files and folders.
  • A custom filter option that enables quick search for files and folders.
  • Reports that are designed to match the requirements of regulatory acts such as HIPAA, PCI-DSS, SOX, FISMA, and GLBA.
  • Reports that can be exported to multiple formats such as PDF, XLS, CSV, and HTML.
  • Reports that can be scheduled to be delivered via email.

The DataSecurity Plus advantage


Audit and analyze file and folder access


Analyze files and disk space

The Access Audit report provides detailed information on the quintessential Four W's—who accessed what, when, and from where. This will help you keep track of all accesses and changes. The Access Analysis report provides a summary view of accesses and changes, which can help you detect access trends. The File Analysis report helps isolate files that are old, unused, unmodified, large, hidden, or non-business; making data cleanup easier. The Disk Analysis report provides visual insight into disk space usage and trends, facilitating optimization of disk space; it also reveals properties of files and folders.

Actively respond to security breaches


Meet PCI DSS, SOX, FISMA, and other regulatory needs

Detect security breaches as and when they occur with alerts that get emailed instantly. Define threshold limits for mass access events such as malware attacks. Comply with regulatory mandates through consistent auditing and reporting of the file server environment.

Minimize incident response times

Become proactive with real-time file and folder access and change auditing. Continuously monitor and get notified about critical activities.  
Email Download Link