Help Center

File Audit Endpoint Security File Analysis Risk Analysis Release Notes

Setting up File Audit

Dashboard

Reports

Alerts

Incidents

Advanced configurations

Setting up Endpoint Security

Reports

Advanced configurations

Setting up File Analysis

Dashboard

Reports

Incidents

Configuration

Setting up Data Risk Assessment

Dashboard

Reports

Advanced configuration

Quick Start File Audit Endpoint Security Risk Analysis File Analysis About DataSecurity Plus Release notes Contact us

2018

2017

2016

2015

Account Logon » Default Port Configuration

Access Analysis reports

Follow the steps below to obtain a summary of all access events within your environment:

  • Click the File Audit tab. Go to Access Audit > Aggregate Reports.
  • Choose a Server Name to view access analytics for that particular server.
  • Select the desired time range using the Period drop-down.
  • Choose any of the default reports under Audit reports and view relevant data.
    • Most Accessed File
    • Most Modified File
    • Most Accesses by Process
    • Most Accesses by User
    • File Accessed After N Days
    • Files Modified After N Days
  • Note:You can change the value of N from within any of these reports.

  • Use User-Based Reports to analyze success events, failure events, or all events based on the user who performed the actions.
  • Use Host-Based Reports to analyze success events, failure events, or all events based on the host from which the action was made.
  • Use Share-Based Reports to analyze success events, failure events, or all events based on the share where the action was made.
  • Use Location-Based Reports to analyze the location of success events, failure events, or all events.
×

Thanks for your interest in DataSecurity Plus' Private Beta!

Please let us know your mail ID so we can send the beta download link.

Thanks! Kindly check your mailbox for the link.
  • Please enter a valid Business Email
    Please enter your Business Email
  • By clicking 'Send me the link', you agree to processing of personal data according to the Privacy Policy.