Track File and Folder Changes/Modifications on Windows Server

File and folder auditing is a security feature that tracks and logs user activities—such as access, modifications, and deletions—on files and folders within Windows Server environments, enabling administrators to monitor changes and investigate security incidents.

Quick Answer:

Two Methods to Track File and Folder Changes
  • Native Auditing via Group Policy: Use Windows built-in auditing features to enable object access auditing and review events in the Security Event Log.
  • Lepide File Server Auditor: Deploy a third-party solution for real-time monitoring, centralized reporting, and automated change tracking across multiple servers.

Tracking file and folder modifications in Windows file servers holds significant importance due to several reasons. Firstly, it aids in identifying unauthorized access or alterations made to sensitive data. Secondly, it assists in troubleshooting issues related to file access and permissions. Lastly, it serves as evidence in the occurrence of a security incident.

There are various approaches to audit changes to files and folders in Windows file servers. One commonly used method involves utilizing the built-in auditing features. To implement this, it is necessary to enable auditing for the desired files and folders. Once auditing is enabled, Windows will document all access and modification events in the security event log.

Alternatively, one can opt for a third-party file auditing tool to monitor file and folder changes. These tools offer more detailed auditing information than the built-in features and enable monitoring of file access across multiple servers.

Irrespective of the chosen method, tracking file and folder modifications is vital for safeguarding data and systems. By effectively monitoring such changes, unauthorized access or alterations can be swiftly identified and addressed, problems related to file access or permissions can be troubleshot, and evidence can be provided in the case of a security incident.

In this article we will explore both the native method for tracking modifications/changes to files and folders on File Server, and how Lepide Auditor for File Server can make the process simpler.

Prerequisites

Before configuring file and folder auditing, ensure you have the following:

  • Windows Server version: Windows Server 2016, 2019, or 2022
  • Administrator permissions: Domain Admin or equivalent privileges
  • Group Policy access: Ability to edit Group Policy Objects (GPOs) in your domain
  • GPMC installed: Group Policy Management Console on your domain controller or administrative workstation

How to Track File and Folder Changes using Event Logs

Below is a detailed description of the procedure for tracking activities on files and folders:

  1. Open the ‘Run’ window, type ‘gpmc.msc’, and click OK
run gpmc.msc

Run ‘gpmc.msc’ on DC or workstation where Administration Tools pack installed.

  1. Right-click on a domain policy and select Edit
select Edit
  1. Double-click on ‘Audit object access’
Audit object access

Now expand as Computer Configuration → Windows Settings → Security Settings → Local Policies → Audit Policy and double-click ‘Audit object access’.

  1. Select the check-boxes Success, Failure or both (as per your auditing needs)
security policy setting
  • Audit only successful attempts – Select ‘Success’ check box
  • Audit only failed attempts – Select ‘Failure’ check box
  • To audit both success and failed attempts – Select both check boxes
  1. Right-click the folder and select Properties
select Properties

Now in Windows Explorer:

  • Select the folder on which you want to track/audit activities
  • Right click on the folder
  • Click on properties
  1. In the Properties windows click the Security tab, and then click Advanced
Properties windows
  1. Click the Auditing tab, and click Edit
auditing tab

In the Advanced Security Settings for dialog box, click the Auditing tab, and click Edit.

In the new dialogue box, click Add and add Everyone to the list.

Now, in the Auditing entry for window, select Full control and click OK. Finally, close all open windows by clicking OK buttons

  1. Open ‘Event Viewer’
open event viewer

Go to start menu to open ‘Event Viewer’. Once ‘Event Viewer’ opens:

Expand ‘Windows Logs’ → Select ‘Security’ → Click on ‘Filter Current Log..’

  1. Enter the event ID you want to search. Here, we are entering Event ID 4656 (the event that is generated when ‘a handle to an object was requested’).
Filter Current Log
  1. When all the events having ID are listed, double-click on any event to see its details.
event properties

Search for other relevant event IDs given below.

Event ID Description Common Use Case
4656 A handle to an object was requested Detecting file/folder access attempts
4658 The handle to an object was closed Tracking when users finish accessing files
4659 A handle to an object was requested with intent to delete Identifying deletion attempts before execution
4660 An object was deleted Confirming file or folder deletions
4663 An attempt was made to access an object Monitoring read, write, or delete operations
4664 An attempt was made to create a hard link Detecting hard link creation for forensics
4685 The state of a transaction has changed Tracking transactional file system changes
4691 Indirect access to an object was requested Identifying access through alternate methods
4985 The state of a transaction has changed Monitoring transaction state modifications
5140 A network share object was accessed Auditing remote file share access

Limitations of Native Auditing

Native file server auditing has several specific limitations that can impact its effectiveness:

  • No real-time alerts: Administrators must manually review logs rather than receiving immediate notifications of suspicious activity.
  • No centralized reporting: Audit data is stored locally on each server, making it difficult to monitor multiple file servers from a single location.
  • No automated response actions: Native auditing cannot automatically respond to threats or policy violations.
  • High log volume: Large environments generate excessive events, making it time-consuming to identify relevant changes.
  • Limited context: Event logs provide raw data without user-friendly summaries or trend analysis.

For more effective file server auditing, it is important to be constantly keeping an eye on changes. Fortunately, third-party auditing solutions, like Lepide File Server Auditor, can simplify this process using intuitive UIs and user-friendly features to automate what would otherwise be very time consuming tasks.

How Lepide File Server Auditor can help you better track file and folder changes

Lepide File Server Auditor captures file/folder events in order to monitor each and every activity of users in both Windows File Servers and NetApp filers. The solution generates an “All Modifications Report” in the “Audit Reports” tab that displays detailed information about all changes (in both Grid view and Graph View) that have been made by users in file systems. Below is a screenshot with an example of the “All Modifications Report”.

Lepide File Server Change Audit

Native Auditing vs. Lepide File Server Auditor

Features Native Auditing Lepide File Server Auditor
Real-time Alerts Not available Yes, with customizable thresholds
Centralized Reporting No – logs stored per server Yes – unified dashboard for all servers
Pre-built Reports No – manual log filtering required Yes – over 300 audit reports
Automated Responses Not available Yes – scripts and notifications
Multi-platform Support Windows only Windows File Servers and NetApp filers
Ease of Use Requires technical expertise Intuitive UI with minimal training
Ideal Use Case Small environments with basic needs Enterprise environments requiring compliance

Frequently Asked Questions

What is Event ID 4663 used for?

Event ID 4663 logs when an attempt is made to access an object, including read, write, and delete operations on files and folders. It is one of the most commonly monitored events for tracking file activity.

What are the limitations of native Windows file auditing?

 Native auditing lacks real-time alerts, centralized reporting across multiple servers, and automated response capabilities. It also generates high log volumes that require manual filtering and analysis.

Do I need to enable auditing on each folder individually?

Yes, after enabling the Audit object access policy via Group Policy, you must configure auditing entries on each specific folder you want to monitor through the folder’s Advanced Security Settings.

What is the difference between Event ID 4656 and 4663?

Event ID 4656 records when a handle to an object is requested (the intent to access), while Event ID 4663 records the actual access attempt (the action performed on the file or folder).

Can I audit file changes across multiple Windows servers with native tools?

Native auditing stores logs locally on each server, so you would need to manually collect and correlate logs from each server. Third-party solutions

Audit changes made to files and folders with Lepide File Server Auditor
Fill in the rest of the form to
download the 20-day free trial
x