
File Server Auditing Tool
Lepide File Server Auditing software enables you to audit when files and folders are created, accessed, modified, copied or deleted in file server. We also help organizations track and compare permissions across their file servers. Our File auditing software addresses the challenges of the rise of the insider-threat and the data reporting requirements associated with common regulatory compliance mandates. We give IT teams the power to see more, faster.

Get visibility over the content of your sensitive files. It automatically scans and classifies data related to PII, PHI and other regulated data.

Real time alerts, threshold alerts and pre-defined reports for all security and compliance needs.

Get information on both successful and failed read attempts across your Windows File Servers.

Monitor when your users are copying your files to help maintain security and integrity of data.

Track changes to your shared files and folders with granular who, what, when and where information.

Determine who has access to which files and folders to help spot over-privileged users and at-risk data.

Use eDiscovery to locate PII in files so that you can easily and quickly respond to privacy and data subject access requests.

Quickly see all the stale data that you have in your Windows File Server, and allows you to easily filter to see your largest stale datasets.
How to Use Lepide to Audit File Server Changes
for Better Data Security and Compliance
Persistent discovery and data classification of files in File Server allows you to see what sensitive data you have and where data is located.
With the widest range of file types for data classification, you can scan, tag, categorize and score your data to ensure you are compliant with industry standards.

Analyze user behavior and spot anomalies in user interactions with data, including single point anomalies, to speed up threat response.
Real time alerts, threshold alerts and pre-defined reports for all your file server security and compliance requirements.
Unlike other file server auditing tools, we allow you to audit file copy events to better understand when your users are copying files with sensitive data.

Our combination of data classification and permissions analysis software enables you to determine who has access to files that contain sensitive data and see what changes they are making to them.
Our file server auditing solution can identify users with excessive permissions and enables you to reverse unwanted file server permission changes to implement a zero trust policy.

Lepide Auditor addresses the ever-increasing demand to prove to auditors that adequate steps are being taken to ensure data is being responsibly monitored. It provides a wide range of detailed reports that directly map to the common requirements of compliance standards ; such as PCI, SOX, HIPAA, GLBA, FISMA, CCPA and GDPR.

Our graphical dashboard will enable you to easily track changes occurring across the whole of your File Server environment. It provides you with an easy-to-understand overview of the total number of changes made to File Server; broken down per administrator, source and trend. This should help you not only understand the causes of a single change, but help you spot overall anomalies in events. The performance of your File Server is also tracked and reported on to help you decrease downtime. The LiveFeed shows you all File Server changes made as they are happening so that you can react to them quicker.

Our File Server Auditing software lets you prepare a quick Incident Response by allowing you to run your own custom script with the alerting of selected critical changes. You can perform automated tasks defined in your script; including disable a user account, delete a user account, revoke the permission granted to a user or shut down a computer. For an example, you can set the solution to delete a user who has deleted multiple files. Yes, you can set to get notifications for both critical changes and script execution.

What We Audit in File Server
Our File Server auditing tool displays a single log for a single change that gives you the answers to the “who, what, when and where” auditing questions. This data is collected and presented through predefined audit reports aimed at helping you solve all manner of security, compliance and IT operations challenges. Every change made is displayed with before and after values to provide you with helpful context. You can customize these reports with auditing functions and create dedicated reports to track a specific file, folder, user or operation.

Through our software integration with the Fpolicy framework and the assigned file policy, we’re able to capture events to audit and monitor file and folder activity on your NetApp through CIFS. We treat NetApp Filers the same as we would any traditional Windows File Server; auditing all changes to files and folders, share, permissions, and more.

Our file auditing tool is a simple way of keeping track of all changes as they happen. The predefined audit reports contain details regarding all attempts of file or folder creation, deletion, copy, move, rename, and other modifications. We also detail the time, drive, folder, file name, process and event. You can track what has happened to a file or folder since its creation, see who has accessed or modified it, and ultimately who has deleted it.

Current Permission analysis of file servers shows the effective permissions applied on the Shared Folders. Our software compares the applied NTFS with the Share Permissions to analyze the currently effective permission on a selected file or folder. It also displays the scope of the applied permission by showing the folder level where permission inheritance gets broken and whether the effective permission is direct, indirect or inherited. Reports can be filtered, sorted, saved and investigated for all 13 possible permissions.

Our File Server auditing software analyzes Historical File Server permissions for Windows File System. You can view the list of all historical permissions for a selected file and folder. The administrator can also compare the permissions for the selected file or folder between two specified time intervals. You can save separate reports for both "Permission History" and "Compare Permission" in PDF, MHT or CSV formats on the disk. It also displays the scope of the permission changes.

Our intelligent filters let you use “*” (asterisk) and “?” (question mark) to drill-down the audit reports and focus on the changes made to files and folders containing these characters in names, paths, usernames or other audit details. A common use case may be to search for all files where the filename contains the word ‘confidential’. You can then easily save this search in a PDF, CSV or MHT file. You can also use these wildcards to send the real-time alerts for changes made to for sensitive data.
