Name |
Description |
After-hours activity |
This "detail" report shows file activity that occurs after hours and on weekends; nice for knowing who is doing what when everyone else is gone. The report is grouped by user. |
Number of deleted files |
This "at a glance" report sorted by user name allows you to quickly find how many files a certain user has deleted. This report is more useful for trend analysis than it is for abnormal behavior detection. |
Number of files opened for read access |
This "at a glance" report sorted by user name allows you to quickly find how many files a certain user has opened for reading. This report is more useful for trend analysis than it is for abnormal behavior detection. |
Number of files opened for write access |
This "at a glance" report sorted by user name allows you to quickly find how many files a certain user has opened for writing. This report is more useful for trend analysis than it is for abnormal behavior detection. |
Delete access denied |
This "detail" report shows all the attempts to delete a file that were denied either by FileSure Defend OR native-Windows security; it is useful for detecting users attempting to delete files that they shouldn't be. |
Files copied |
This "detail" report shows all the files that have been copied by common means (Windows Explorer, XCopy or the Copy command). The report is not limited to a certain device and will report all file copies. Since this report uses a process name, it is most useful when reporting on workstation file activity. |
Files created |
This "detail" report shows all the files that have been created by each user. This report is useful for see what sort of information users are storing on the server. The report is grouped by user. |
Files deleted |
This "detail" report shows all the files that each user has deleted. Monitoring file deletion is useful for detecting inappropriate activity by a user. This report is perfect for sending to department managers. |
Files renamed |
This "detail" report shows all the files that each user has renamed. Monitoring file renames is useful for detecting inappropriate activity by a user. This report is perfect for sending to department managers. |
Files possibly sent with web mail |
This "detail" report shows all the files that have been read by Internet Explorer and FireFox. The reading of a file by an internet browser often indicates that the file is being sent via web mail. Since this report uses a process name, it is most useful when reporting on workstation file access activity. |
Potential File theft |
This "detail" report shows all the files that have been read by Internet Explorer and FireFox and all files written to a removable drive. The reading of a file in an internet browser often indicates that the file is being sent via web mail. Since this report uses a process name, it is most useful when reporting on workstation file access activity. |
Files written to a removable drive |
This "detail" report shows all the files that have been written to a removable drive. Writing files to a removable drive often indicates that someone is taking some work home which is moving it outside the security measures that are in place in the office. Additionally, this is one of the more methods for data loss/theft. |
Folders deleted |
This "detail" report shows all the folders that have been deleted by each user. This report is useful for monitoring the folder deletions of a suspect employee. |
Folders renamed |
This "detail" report shows all the folders that have been renamed by each user. This report is useful for monitoring the folder renames of a suspect employee. |
Folders moved |
This "detail" report shows all the folders that have been moved by each user. This report is useful with the "accidental dragger" problem, which is when someone drags a folder to another location by accident. |
Read access denied |
This "detail" report shows all the attempts to read a file that were denied either by FileSure Defend OR native-Windows security; it is useful for detecting users attempting to read files that they shouldn't be accessing. |
Root folders moves |
This "detail" report shows the root folders that have been moved. Moving root folder should rarely occur and can cause great pain when they do. This report identifies what user moved the folder and when. |
File security changed |
This "detail" report shows all the security changes that have occurred. Changing file security can open a security breach and allow unintended users access to otherwise secure data; it's important to be aware of these changes and who made them. |
Touched files |
This "detail" report shows all files that have been read, written to, deleted, moved or had its security changed. It can be a very large report and is only useful to make auditors happy. |
Write access denied |
This "detail" report shows all the attempts to write to a file that were denied either by FileSure Defend OR native-Windows security; it is useful for detecting users attempting to write to files that they shouldn't be accessing. |