Detect Accesses made to Shared Files and Folders
The comprehensive auditing offered by our solution provides a summarized view of accesses to the shared files and folders. You can effortlessly examine access trends across your server using our consolidated reports; containing who, what, where and when details for every single change.
Track Changes made to Shared Files and Folders
Analyze changes made to the shared files and folders across your whole File Server environment using Lepide File Server Auditor. Detect malicious access or alteration of data using our granular reports with insightful and actionable details. This automated solution lets you spot anomalous event trends which helps to minimize access at unexpected or unusual times. The inbuilt filters allow you to extract in-depth information about operations like read, write or modify performed on your shared files and folders.
Audit Permission Changes of Shared Files and Folders
It is crucial that you recognize unauthorized modifications made to the shared files and folders in your server environment to prevent data leakages or destruction of confidential information. Lepide File Server Auditor offers consolidated reports for permission changes. Our solution enables you to spot actions that might compromise the data assets of your organization. As these reports are created for all the folders, you will have to extract the details of permission changes for shared files and folders separately.
View Historical Permissions of Shared Files and Folders
With Lepide File Server Auditor, you can analyze the historical permissions changes of shared files and folders. You can view what permission has been applied to the selected shared file or folder and when. You can also compare the permissions of any file or folder between two specific time intervals using this report. These reports saved in PDF, MHT or CSV files.
Current Permission Analysis of Shared Files and Folders
Lepide File Server Auditor allows you to analyze the effective permissions applied on the shared files and folders with a dedicated set of reports. These reports can be easily sorted, filtered and saved for future reference. Our audit reports display the folder level where permission inheritance is broken. You can easily identify whether the effective permissions on various folders are direct, indirect or inherited.