Use cases of the file analysis tool

  • ROT data analysis
  • File storage analysis
  • Duplicate file management
  • Disk usage reporting
  • File share analysis

ROT data analysis

  • Reduce unnecessary storage expenses by managing redundant, obsolete, and trivial (ROT) files.
  • Locate unnecessary data like media files, orphaned files, empty folders, and more using FileAnalysis.
  • Get a consolidated view of all hidden files in Windows file servers, failover clusters, and workgroup servers.
  • Reclaim primary storage by locating and removing junk files from enterprise storage devices.

File storage analysis

  • Know when to free up space by monitoring storage space in every server and triggering low storage space alerts.
  • Sort enterprise files based on their types and categories to understand your file storage status.
  • View details on the size, location, owner, and other important attributes for every file in your storage environment.
  • Track the annual growth of file volume with information on the volume of junk files created each year.

Duplicate file management

  • Reduce storage redundancy, improve performance, and declutter disk space with the duplicate file finder.
  • Compare file names, sizes, and last modified times to precisely identify duplicated files.
  • List all copies of duplicated files along with information on their locations.
  • Select and remove multiple duplicates at once right from FileAnalysis' user interface.

Disk usage reporting

  • Easily locate old, stale, unmodified, hidden, and other nonessential files in enterprise storage.
  • Enable granular analysis with instant reports on all file shares, active sessions, open files, junction points, and more.
  • Monitor employees' storage patterns, and know who owns which files along with whose files take up what volume of organizational storage.
  • Spot storage policy violations such as employees storing large media files, stale files, or other trivial data with email notifications.

File share analysis

  • Locate every shared file and folder in your organization's file storage environment.
  • Analyze the size of your shares and the number of files and folders within the share.
  • Easily identify duplicates and other junk files within shared folders.
  • Better manage permissions by listing and reviewing the access rights associated with your file shares.

Here's how the file analysis tool works

Locate and manage ROT data to optimize file storage.

  • 01 Understand
    your file storage
  • 02 Identify
    ROT data
  • 03 Manage
    unneeded files
  • 04 Generate
    storage reports
  • Understand your file storage

    Get key insights on file ownership, type, location, last access and modification times, etc.

    Next Step  
    file-analysis-solutions-screenshot1
  • Identify ROT data

    Monitor storage availability, and remove redundant, obsolete, and trivial (ROT) data.

    Next Step  
    file-analysis-solutions-screenshot2
  • Manage unneeded files

    List every copy of junk and duplicated files, and move or delete them to increase storage capacity.

    Next Step  
    file-analysis-solutions-screenshot3
  • Generate storage reports

    Spot old, stale, large, hidden, unmodified, and non-business files using detailed reports.

    Next Step  
    file-analysis-solutions-screenshot4

Use cases of the file analysis tool

  • Security permission analysis
  • Detection of overexposed files
  • Effective permissions reporting
  • Permission hygiene assessment

Security permission analysis

  • Ensure that organizational files are appropriately secured by periodically reviewing their NTFS and share permissions.
  • Identify and list all the privileged users who have access to critical files in your domain.
  • Track the owners of local and shared files in your enterprise storage environment.
  • Analyze file ownership statistics with reports on the number, volume, and location of files owned by each user.

Detection of overexposed files

  • Spot unsecured files that have to be locked down, such as the ones allowing unrestricted access to users.
  • Track the excessive or unwanted permissions assigned to a user based on your organization's internal security policy.
  • Detect open access files, i.e, files that can be accessed by everyone.
  • List the files that allow explicit full control access to a specific employee.

Effective permissions reporting

  • List effective permissions to know the cumulative permissions that a user or group has over a particular file.
  • Ensure that the principle of least privilege is maintained by verifying whether shares have the most restrictive permissions.
  • Achieve compliance with regulatory standards by affirming that only privileged users have access to business-critical files.
  • Reduce your security risks and attack surface by periodically checking effective permissions and making changes where required.

Permission hygiene assessment

  • Perform regular inspections of permissions associated with privileged users to ensure that they align with changing needs and job roles.
  • Locate active files owned by disabled or deleted users to reclaim them easily and ensure their availability to pertinent users.
  • Identify permission inconsistencies such as broken or improperly inherited permissions to enable quicker resolutions.
  • Spot orphaned files, and make quick business decisions on whether to reclaim or purge them.

Here's how the file analysis tool works

Locate permission vulnerabilities quickly to reduce the exposure of organizational files.

  • 01 Analyze
    file permissions
  • 02 Find
    overexposed files
  • 03 Spot permission
    hygiene issues
  • 04 List effective
    permissions
  • Analyze file permissions

    Spot permission inconsistencies, detect unsecured files, analyze file ownership, and more.

    Next Step  
    file-analysis-solutions-screenshot5
  • Find overexposed files

    Locate files allowing unrestricted access, and hold their owners accountable for securing them.

    Next Step  
    file-analysis-solutions-screenshot6
  • Spot permission hygiene issues

    Identify broken inheritances, orphaned files, and files owned by inactive users.

    Next Step  
    file-analysis-solutions-screenshot7
  • List effective permissions

    Verify that the principle of least privilege is maintained by checking effective permissions.

    Next Step  
    file-analysis-solutions-screenshot8

Reduce storage inefficiency and ensure permission hygiene with ManageEngine FileAnalysis

Try for free Schedule a demo  

File analysis software packed with powerful features

 

File storage analysis

Analyze file metadata and receive detailed reports on file types, categories, sizes, and ownership.

Learn More  
 

Disk usage reporting

Track users' file storage volumes, and know where to free up space to ensure storage availability.

Learn More  
 

Duplicate file management

Locate duplicated files, list them, and delete unnecessary copies on the fly.

Learn More  
 

ROT data analysis

Perform periodic ROT data analysis to curb data growth and reduce storage costs.

Learn More  
 

Security permissions analysis

Report on file ownership, list NTFS and share permissions, and analyze effective permissions.

Learn More  
 

Permission hygiene assessment

Find unrestricted files, orphaned files, broken inheritances, and other permission hygiene issues.

Learn More  
Email Download Link