“LepideAuditor is straightforward to use and effective right off the bat. Plus, the level of patience, attentiveness and technical knowhow is far beyond most support and sales teams I’ve seen before. ”
“While price was a factor, we ultimately chose Lepide as they were able to offer us threshold alerting, a way of separating out reporting duties to a web console and a site license with extended support and maintenance. ”
“LepideAuditor is a perfect fit for our IT Security and Compliance requirements. It helps us cut out a lot of wasted time and money and now we know we can be compliant with industry standards.”
“All the features that LepideAuditor has are simple to use and give us all the information we need to know that our data is secure and that we can be compliant with industry standards.”
“LepideAuditor is a very helpful means of monitoring the activity around our valuable data and core infrastructure. The audit logs are structured in a presentable format via intelligent reports.”
- Modifications in File Server Any modifications made to the file server, including attempts to access the files/folders or any changes made in their properties will be listen in a single, easy-to-read report. This will enable you to audit file access pro-actively and regularly with minimal effort.
- Read Attempts Whenever a user attempts to read a file, an access event is generated. Our solution reports on both successful events (showing who has read the file) and failed events (showing which unauthorised user is attempting to read the file). The solution produces two dedicated reports for these events.
- File and Folder Creation / Deletion New files and folders are created all the time but you will need to be aware of any user trying to create a file in a restricted area. It is also crucial that you have a method for keeping track of deleted files and folders. Our solution logs every attempt (whether successful or failed) to create or delete both individual and shared files/folders.
- Other Accesses We keep track of whenever a file is renamed or moved. We also keep a record of the files that are being copied in the computer from the network location, changes being made to the file/folder permissions, Audit Settings (SACL) and ownership.