Recording folder moves with FileSure
Someone has accidentally dragged a folder in Explorer without noticing and now another user thinks that their data has been deleted. Use FileSure to record folder renames and moves.
Find a Moved or Deleted Folder with FileSure
In a previous video, we set up a rule to watch folder moves, renames and deletes. Now see how to use the FileSure forensic console to find out who moved the folder, when, and most importantly where did it go.
Recording file activity in a folder with FileSure
This short video shows setting up FileSure to record file activity in a certain folder.
Protect Intellectual Property with FileSure
You suspect someone of stealing your companies important data. This video will show you how to use FileSure to see who accessed your company's most important files.
How to Identify Intellectual Property Theft
In another video, we set up a rule to record operations on your companies most important files. We'll set up FileSure to identify suspicious activity and then drill into the details of that activity.
Get an email alert when a bulk file delete occurs
In this video, we show FileSure detecting a bulk delete of AutoCAD files and sending an e-mail alert when the threshold is reached.
FileSure detecting a bulk copy.
This video shows FIleSure sending an e-mail alert when a user does a bulk copy to a USB drive.
Protecting AutoCAD files with FileSure
This video shows attempts to steal AutoCAD files on a computer protected by FileSure-Defend.
Protect files from being read by an administrator
Use FileSure to protect files from being read by anyone other than a specified user, including an domain administrator.
Lock down a file with FileSure
Sometimes it's necessary to block all access to a file while further action can be determined. This video shows how to block all access, even to Domain Administrators, with FileSure.
How to view/search captured audit log data
This short video shows the basics of using the "View Data' screen in FileSure to slice and dice recorded auditing data.
A brief description of various filters in deny rules.
This video covers many of the ways you can configure FileSure to allow or deny access to files.
Automatically publishing auditing data with FileSure
This video shows FileSure automatically publishing audit data to an Microsoft Access database on a schedule.
How do you backup FileSure
How do you backup FileSure's audit log? Learn where FileSure stores the auditing data, how the data is used, and how you should back it up.
Extend the Windows Security model with FileSure Defend.
FileSure Defend can provide file protection that's just not possible using Windows ACLs. Learn how to use wildcarding rules to lock down a file type in this video.
HIPAA and FileSure - Auditing access to personal health information
The basic requirement of HIPAA is to record who has accessed electronic personal health information (ePHI). This video shows FileSure meeting the file auditing requirement of HIPAA.
HIPAA and FileSure - Protecting ePHI
HIPAA requires that you protect personal health information from being accessed by unauthorized programs. This video show FileSure meeting this requirement.
HIPAA and FileSure - Protecting the audit log
HIPAA requires that you protect the audit logs safe from tampering. This video shows how FileSure can protect its own audit logs and also records all the policy changes made.
HIPAA and FileSure - Authentication by naming convention
HIPAA requires that you authenticate users accessing ePHI. This video shows how FileSure can support authentication by naming convention, which is many cases is more secure and easier to manage.
HIPAA and FileSure - Protecting ePHI from unauthorized transmission using FileSure
HIPAA requires that you protect personal health information from unauthorized transmission. This video shows how to use FileSure to meet this requirement.
HIPAA and FileSure - 6 years of data
This video covers how FileSure handles the 6 year audit log retention requirement of HIPAA.
FIleSure and PCI
This video shows FileSure (actually FileSure - Defend) handles various PCI requirements. Notably 10.5.5, 11 and 11.5.
Managing FileSure on Workstations
This video show how FileSure is deployed to workstations. It also covers uninstalling and explains the relationship between the workstation and the server.
Research screens in FileSure
This video shows a preview of the new research screens in FileSure 2.5. The research screens can show trends and help detect anomalies in your file usage.
Audit Files being written to CD\DVD drives with FileSure.
This video shows how to create a simple rule to audit files written to CD\DVDs with FileSure.