Cyber Security Consultant - APAC at Logon Software
Real User
Top 5
2023-08-22T13:04:40Z
Aug 22, 2023
My company uses FileAudit as an SIEM solution, and it is used for monitoring the file server activity to find out what users did in the file server, which may include modifying the file, deleting it, or just copying the file from the confidential file server. FileAudit is to find out the details of a user's activity in the file server.
One of our customers collects thousands of files containing important data in Windows folders, which he then shares on the network. Over the years, the files have become more and more numerous and the customer has not implemented an aging policy. In addition, many files have to be modified only with double consent.
My company uses FileAudit as an SIEM solution, and it is used for monitoring the file server activity to find out what users did in the file server, which may include modifying the file, deleting it, or just copying the file from the confidential file server. FileAudit is to find out the details of a user's activity in the file server.
One of our customers collects thousands of files containing important data in Windows folders, which he then shares on the network. Over the years, the files have become more and more numerous and the customer has not implemented an aging policy. In addition, many files have to be modified only with double consent.
We implemented FileAudit because our customer was looking for a detailed report on file access details of a server hosted in a data center.