FileAudit Technical Resources


Video presentation

PDF Presentation


Customer references


What's new in FileAudit 5

Case studies


How Wong Fong Engineering can monitor file access to prevent suspicious activity.


US primary healthcare system CommuniCare, chooses FileAudit for HIPAA and PCI DSS compliance


Visibility and insight into all file activity on the company network


Meeting HIPAA compliance to track and recover lost files

DP World

Reduce the risk of security breaches that stem from unauthorized network and file access


A leading US Biotechnology company monitors and secures file access with FileAudit

Car plates

A leading Automotive manufacturer protects sensitive files from deletion or falsification

Law Enforcement Division

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Product Briefs

FileAudit vs. Windows Native Features


File Monitoring Software Update. Much more than a file access log
Version 4.5 of the file monitoring software FileAudit, continues to help IT professionals monitor access to company-sensitive files stored on Windows systems in real time.

Monitor & Audit File Deletion & Falsification across Windows Servers
How to better protect important or sensitive files from deletion or falsification with FileAudit's access monitoring and auditing.

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court
With the risk of tampered files being unsuitable for use in court, the organization deployed FileAudit to monitor shared folder access and recover lost work.

Secure Network Access & Avoid Security Breaches from your Employees
How automated safeguards and real-time visibility can stop unauthorized network access, restrict bad user behavior and underpin security awareness training.

Monitor File Access on Windows Servers the easy way
FileAudit, used by hundreds of security-conscious organizations across the world, is the easiest way to audit & monitor file access and determine who did what, when and from where.

Nine Steps to better File Auditing
File auditing need not be time-consuming or overwhelming. Read how IT pros can monitor, audit and secure files and folders intuitively and more easily.

An Insider Threat Program. From paranoia to protection
The need for organizations to build an insider threat program. Expertise shared from CERT, HoMER, academia & industry on moving from paranoia to protection.

A Third of Ex-Employees accessing company data
How ex-employees at US and UK organizations are being left with open access to confidential data long after departing. A report from IS Decisions.

Video tutorials

How to quickly install your file system auditing software

Basic Settings for file access auditing

Begin monitoring and auditing all access events on your files and folders

How to display and track file access events monitored by FileAudit

How to schedule file access reporting to enhance security and regulatory compliance

Set alerts to file access or access attempts

Improve your file access auditing performance through advanced settings

How to clean the file access events history in your database

How to delegate file and folder auditing to external auditors or non-IT users