File ServerAccess Reporting

FileAudit is designed to make file auditing and reporting faster, smarter and more efficient

It provides the important visibility and reporting necessary to thwart insider attacks and other security risk related to file access.

The auditing of all File System access events is also mandatory for adhering to compliance regulations such as PCI-DSS, HIPAA, GLBA, FISMA etc…

Manually collecting file and folder access event logs from multiple Windows Servers can be overwhelming, time consuming and costly. FileAudit is the file auditing tool that does the work for you.

FileAudit provides searchable audit logs with data that can be complied for reports used during auditing and regulatory compliance. It offers details of who accessed a file, what they did, when they did it, and from where.

File Server Access: Viewing audited data

Ensure security to Windows File Systems in real-time with interactive at-a-glance access reports of everything that’s happening with audited data.

FileAudit offers detailed and customizable graphical statistics on file and folder activity over a given date/time range, including breakdowns of access status (granted/denied) and type, Top 5 accessed files, Top 5 users and Top 5 sources.

According to PC Mag, who reviewed FileAudit 4 as ‘excellent’, the handiest feature is these statistics.

The new interface of FileAudit 4 offers a view of everything that’s happening with audited data including the access type, percentage of deletes, writes and any other attempts to change or tamper with file and folder permissions.

FileAudit is reviewed as "excellent" by PC Mag

Samara Lynn Lead Analyst - PC Mag

File Server Access: Scheduled Reporting

Customized reports according to multiple criteria (e.g. path, file type, access type, source of access) can be provided for specified recipients for auditing and regulatory compliance.

The customization include:

Files and Folders
Date/time range
Access types
Users & groups

File Server Access: Access Tracking By IP Address & Machine Name

By identifying the name and IP address of the machine from which the file/folder access has been performed, FileAudit can indicate exactly where the user has accessed the file from. This helps strengthen user identification and accountability by identifying potentially suspicious activities such as if the user accessed the file from a different workstation than normal.

Note when the access is performed directly on the file server hosting the file/folder accessed (local access), FileAudit displays the name of the process from which the user has accessed the file.

A list of every access made from a specific IP address or specific machine, and thus a specific machine, can be made using FileAudit’s filtering capabilities.

It’s also possible to define an IP address or machine name as a selected criteria to trigger specific access alerts of for a scheduled report.

Enhanced Access Security

Automating and scheduling these reports on a regular email delivery helps ensure better security management.

Colleagues across an organization can also receive on email, customized reports according to their specific criteria helping those that have a better understanding of certain files and folders become accountable for monitoring and auditing sensitive data access.

More on delegation to non-IT executives

If there are any security issues within an organization, FileAudit can run reports to see who’s accessed a file or folder and management can quickly address it with that individual.