Windows File Server Monitoring

Manually monitoring file access (and access attempts) across Windows Servers can be time consuming and over-whelming. FileAudit makes it easy to see what’s happening to sensitive data.

FileAudit provides a comprehensive, centralized and sortable list of access events (or access attempts) to paths you have selected:

  • Read, write, delete, rename accesses
  • File ownership changes
  • Permission modifications
  • File attributes changes

Each record details:

  • File path
  • Access type (read, write, delete, rename, execute, ownership, permissions, write attributes)
  • Object type (file, folder)
  • Status (granted/denied)
  • Date and time of access
  • User
  • Domain
  • Source IP address
  • Machine name

For a:

  • File
  • Selection of files
  • Folder and subfolder
  • Selection of folders and subfolders

Exact File Access Tracking
by IP Address and Machine Name

Monitor exactly where in the network, the user has accessed (or attempted to access) a file or folder from. For each access event, FileAudit displays both the specific machine (client) name and IP address to pinpoint the placement.

Detail by IP Address and Machine Name - FileAudit

If an access is performed directly on the machine hosting the file/folder, the name of the process generating the access attempt is displayed.

Any specific IP address or machine name can also be filtered on, used as a reporting criteria, or chosen to trigger an alert.

This granular detail helps strengthen user identification and hold users accountable for their actions. Potentially suspicious file access events, such as if a user accessed a sensitive file from a different computer than normal, can now be easily identified.

Quickly get Key Insights
into File Activity

When monitoring file activity, simply click on any user, or particular file or folder, to view all events from the previous 4 weeks, alongside statistics on usage, file deletions and any denied access.

Save Time with Powerful
Filtering Capabilities

Filtering Capabilities

Filter file access events by different criteria to focus only on the insightful and actionable information you need. FileAudit finds the answers you need with far less effort.

Filter Options


Granted and/or denied access event

Access type

Select one or
many access events

Object type

File and/or folder


Filter by a specific
domain name


Filter by a specific user or Active Directory Group


By IP address, machine name or executable file name


From the first event available or a specific date


To the last event available or a specific date

You can also choose to print or export your filtered view.
All filter configurations can be saved as XML files for reuse in future audits.

Cloud Data
Storage Monitoring

With FileAudit, file monitoring can be extended to track major cloud-based file storage providers. Get visibility into the access to and usage of files stored on Microsoft OneDrive for Business, SharePoint Online, Google Drive, Dropbox Business and Box.

OneDrive SharePoint Online Google Drive Dropbox Business Box

See the full list of access types audited for cloud storage providers :

Cloud Access Types

Improve the Security
of your Hybrid IT Environment

Access Reporting

FileAudit offers a single view of all file activity to tie on-premises and cloud-based actions together. One tool and one consolidated dashboard to get the complete picture.


Request a personalized demo now

Discover how FileAudit can help you meet your needs.

Real Time Monitoring
that makes it Easy!

Real-time monitoring places no unnecessary overhead on the server.

Unlike native auditing or other agent-less tools which consume significant resources on the file servers; real time monitoring means that FileAudit does not impose any additional storage requirements on the file server, avoiding any potential performance problems.

Once a path is set to audit, all access events are detected, displayed and saved into a database in real time.

Compfair Case Study

« FileAudit simply does the job. It’s a solution that works and it’s so easy to use, a drunk person could use it at 2:00am and not get confused by it. »

Richard Marnau - Compfair CEO
(IS Decisions editor: we don't recommend trying this)

Learn how

Go further with FileAudit

Set up alerts and a triggered response to certain access events, including the copy, deletion or movement of bulk files.