Support
 
Phone Live Chat
 
Support
 
US Sales: +1 888 720 9500
US Support: +1 844 245 1101
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680
 
 
 
 

Audit and analyze file and folder access

Auditing Windows file servers

Windows file servers contain critical information that requires protection. That's why file server auditing is imperative for any organization. By auditing all file and folder-related events, you can ensure file server security while meeting compliance requirements.

While native auditing can provide information regarding who accessed what, when, and from where, sifting through volumes of event logs is cumbersome. Circumvent this time-consuming process with the use of a real-time Windows file server auditing tool like FileAudit Plus.

5 elements that make FileAudit Plus a comprehensive Windows file server auditing and analysis tool

track-every-single-access-and-change-thumb

  1. Track every single access and change occurring in the file server with the Access Audit report. The reports included under the Access Audit report are:
    • Content and location change events: Track all file and folder events such as create, modify, overwrite, move, restore, rename, and delete events.
    • Security permission change events: Monitor file and folder permissions, owner and SACL changes, and identify unauthorized changes.
    • All failed attempts: Monitor failed attempts to read, write, or delete a file or folder.
    • Read-only events: Track events where a file or folder was accessed but not changed.
  2. Get complete visibility into everything happening in the file server with an extensive list of event details, including: server name, accessed by, time modified, location, share path, process name, last write time, creation time, and last access time.
  3. Drill down into specific events occurring in the file server using built-in filters based on identifiers such as: server, share, user, business or non-business hours, and more. Create customized reports by saving applied filters.
  4. Quickly understand what's going on in the file server by viewing the graphical representation of all events. Events are grouped by: top 5 users, top 5 processes, and access type.
  5. detect-access-trends-thumb

    Detect access trends with the Access Analysis report. Get a summary view of what's happening in the file server with the following sub-reports: most accessed files, most modified files, most accesses by process, most accesses by user, files accessed after N days, and files modified after N days (where N is defined by the user).

You can also utilize the following features:

  • Automate email delivery of reports at specified time intervals.
  • Export reports to multiple formats, such as CSV, XLS, PDF, or HTML.
  • Quick search by inputting any attribute value related to a specific event under reports.
  • Define an open-ended time range for reports.

The FileAudit Plus advantage

icon-identify-files-that-are-stale-non-business

Analyze files and disk space

  icon-manage-disk-space

Actively respond to security breaches

The File Analysis report helps isolate files that are old, unused, unmodified, large, hidden, or non-business; making data cleanup easier. The Disk Analysis report provides visual insight into disk space usage and trends, facilitating optimization of disk space; it also reveals properties of files and folders. The Disk Analysis report provides graphical insight into disk space usage and history, facilitating optimization of invaluable disk space across file servers.
icon-minimize-incident-response-times

Audit access rights

  icon-actively-respond-to-security-breaches

Meet PCI DSS, SOX, FISMA, and other regulatory needs

Examine share and security permissions of files and folders and prevent access exploitation. Comply with regulatory mandates through consistent auditing and reporting of the file server environment.
icon-meet-pci-dss-sox-and-fisma-needs

Minimize incident response times

   
Become proactive with real-time file and folder access and change auditing. Continuously monitor and get notified about critical activities.