+1-800-492-3951 or +3220.127.116.11.20 (GMT+1)
Secure Active Directory user logins with two factor authentication, contextual access controls and real-time monitoring and reporting.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems and in the cloud.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
See all insights
Two-Factor Authentication Solution for Windows & RDP Logons
Under a Cloud of Suspicion
Auditing File Access in the Cloud
Information Security Advice for SMB (Infographic)
The Role of File Auditing in Compliance
Key Indicators of Compromise to Prevent a Breach
Manual event log analysis using Windows native features is a tedious and time consuming task. FileAudit instantly provides comprehensive and accurate information about access to sensitive files and folders through its schedulable, automated and multi-criteria reporting.
Hi everyone, welcome to the FileAudit Tutorial. We will see on this video how to receive scheduled reports by mail.
You can set a scheduled report in two ways. The first is by clicking on the “Scheduled reports” tile in the FileAudit hub to create a new report. Alternatively, this feature can be enabled by personalizing the Access Reporting and clicking on the “Schedule” button. You will be redirected to the same Scheduled report configuration section and in addition all previously-defined filter settings will also be imported in the first three tab settings.
Let’s start from an empty form. In the “Main tab”, type the name of the report. The status filter determines if the access attempts were successfull, denied or both. Select the access type on the monitored file/folder. You can filter by a “User” and when available a “Source” file for the access event report. If desired, switch the “Raw data” to enable the generation of this report in CSV format.
The 'Monitored paths' tab displays the list of files and folders contained in a given report. To add a path, click on “Add a file/folder” button. Type directly the path of the folder or click the magnifying glass to browse and validate.
The ‘Time’ tab is an important setting for large database, as it allows you to reduce the period concerned and so obtain a pertinent and readable report. Define the date and time range of the events you want to report on. The FileAudit scheduler interprets the time period and dynamically generates the report for the same period. For example, if we choose here to monitor the previous day, the report will always contain events from the day preceding the report execution day.
The ‘Recipients’ tab lists the e-mail recipients for this scheduled report. Click the “Add a recipient” tile and enter the recipient name and the email address. You should be able to select this recipient on next reports or alerts configuration thanks to the pickup feature.
In the “Mail message” tab, type the subject and the content of the mail which will be sent.
Via the “Schedule” tab, you can define the scheduling of the report. You can choose to receive this report in two ways: “Weekly” and choose the days, Or “Monthly” and choose by days of month or week of month.
Once finished, click on the test button to validate your report definition. It will save your settings and generate the report as a scheduled task. You can check that the result corresponds to your expectations. If everything is ok, click on the back arrow. Or modify any required setting and click on “Save”.
On the next video we’ll see how to configure alerts.
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.