Track Changes to Your Most Sensitive Data
Through an intuitive dashboard, you will be able to easily track changes occurring across the whole of your File Server environment. Get an overview of the total number of changes made to File Server; broken down per administrator, source and trend. This should help you not only understand the causes of a single change, but help you spot overall anomalies in events. The LiveFeed shows you all File Server changes made as they are happening so that you can react to them quicker.
Granular Audit Reports for File Server Changes
Our File Server auditing tool displays a single log for a single change that gives you the answers to the “who, what, when and where” auditing questions. This data is collected and presented through predefined audit reports aimed at helping you solve all manner of security, compliance and IT operations challenges. Every change made is displayed with before and after values to provide you with helpful context. You can customize these reports with auditing functions and create dedicated reports to track a specific file, folder, user or operation.
Audit NetApp Filer Changes
Through our software integration with the Fpolicy framework and the assigned file policy, we’re able to capture events to audit and monitor file and folder activity on your NetApp through CIFS. We treat NetApp Filers the same as we would any traditional Windows File Server; auditing all changes to files and folders, share, permissions, and more. Read more
Track Files and Folders Created, Modified and More
Our file server auditor is a simple way of keeping track of all changes as they happen. The predefined audit reports contain details regarding all attempts of file or folder creation, deletion, copy, move, rename, and other modifications. We also detail the time, drive, folder, file name, process and event. You can track what has happened to a file or folder since its creation, see who has accessed or modified it, and ultimately who has deleted it. Read more
Analyze the Current Effective Permissions of Shared Files/Folders
Current Permission analysis of file servers shows the effective permissions applied on the Shared Folders. Our software compares the applied NTFS with the Share Permissions to analyze the currently effective permission on a selected file or folder. It also displays the scope of the applied permission by showing the folder level where permission inheritance gets broken and whether the effective permission is direct, indirect or inherited. Reports can be filtered, sorted, saved and investigated for all 13 possible permissions. Read more
Analyze Historical Permission Changes of Your Files/Folders
Our File Server change auditing software analyzes Historical File Server permissions for Windows File System. You can view the list of all historical permissions for a selected file and folder. The administrator can also compare the permissions for the selected file or folder between two specified time intervals. You can save separate reports for both "Permission History" and "Compare Permission" in PDF, MHT or CSV formats on the disk. It also displays the scope of the permission changes. Read more
File Access Auditing
All access attempts made to files and folders are audited by our File Server Auditor. The solution creates dedicated, in-depth file access auditing reports for different access types; such as read successful, read failed, creation failed and more. You can also configure the tool to send real-time alerts for these access attempts. Read more
Audit File Shares
With our File Server auditing software, you can audit all changes to shared files and folders including their permission changes. The dedicated file share audit reports help keep you aware of every change being made. You can customize these reports with auditing functions and create dedicated reports to track specific files, folders, users or permissions. Read more
See the Original Value Before the Change Was Made
Naturally – you want to know if any of your files have been modified but the real value comes from the context. We think it’s important to show you what it was changed from. The before values allow you to truly understand the purpose of the event and enable IT teams to identify issues faster.
We Let You Use Wildcards to Audit Potentially Sensitive Data
Our intelligent filters let you use “*” (asterisk) and “?” (question mark) to drill-down the audit reports and focus on the changes made to files and folders containing these characters in names, paths, usernames or other audit details. A common use case may be to search for all files where the filename contains the word ‘confidential’. You can then easily save this search in a PDF, CSV or MHT file. You can also use these wildcards to send the real-time alerts for changes made to for sensitive data.
Detect Suspicious Changes and Prepare Quick Incident Response
Lepide File Server Auditor lets you prepare a quick Incident Response by allowing you to run your own custom script with the alerting of selected critical changes. You can perform automated tasks defined in your script; including disable a user account, delete a user account, revoke the permission granted to a user or shut down a computer. For an example, you can set the solution to delete a user who has deleted multiple files. Yes, you can set to get notifications for both critical changes and script execution.