File Access Auditing

Due to the fact that data is probably the most important asset in any organisation, auditing accesses made to files and folders stored on computers is a necessary task. File Access auditing needs to be undertaken to ensure the safety of critical data and to meet the increasing strictness of regulatory compliances.

Whatever your driver, LepideAuditor provides a simple and effective way of keeping a track of what’s happening to your files and folders. Our File Server audit solution provides detailed tracking, alerting and reporting on file access and permissions. Designed to work on both Windows File Servers and NetApp filers, our solution will report on both successful and failed access attempts along with all types of file modifications. We’re also one of the very few vendors who can accurately show whether a file has been copied.

Over 5,000 Organizations Use LepideAuditor to Protect Their Businesses Against Data Breaches

Modifications in File Server

Any modifications made to the file server, including attempts to access the files/folders or any changes made in their properties will be listen in a single, easy-to-read report. This will enable you to audit file access pro-actively and regularly with minimal effort.

Read Attempts

Whenever a user attempts to read a file, an access event is generated. Our solution reports on both successful events (showing who has read the file) and failed events (showing which unauthorised user is attempting to read the file). The solution produces two dedicated reports for these events.

File and Folder Creation / Deletion

New files and folders are created all the time but you will need to be aware of any user trying to create a file in a restricted area. It is also crucial that you have a method for keeping track of deleted files and folders. Our solution logs every attempt (whether successful or failed) to create or delete both individual and shared files/folders.

Other Accesses

We keep track of whenever a file is renamed or moved. We also keep a record of the files that are being copied in the computer from the network location, changes being made to the file/folder permissions, Audit Settings (SACL) and ownership.

Read all reviews

Read all stories

More from Lepide

Blog
Data Classification Software: 10 Things You Should Consider

Data Classification can help an organization meet both the legal and regulatory requirements that come with the storing, handling or processing of sensitive data.

Learn More ->
Whitepaper
How CISOs Can Win Over the Board on Cybersecurity Strategy

In this whitepaper, we have put together a list of tips and tricks to help CISOs communicate effectively with the board on cybersecurity strategy.

Learn More ->
News
Active Directory Self Service 19.0 now has a New User Interface

The new and improved user interface is just one of many new features in version 19.0 of Lepide Active Directory Self Service.

Learn More ->
  • +1(0)-800-814-0578
  • |