An Easy Way To Check If Your Files Have Been Accessed By Someone Else (2024)

An Easy Way To Check If Your Files Have Been Accessed By Someone Else (1)

  • Report this article

Andre G. An Easy Way To Check If Your Files Have Been Accessed By Someone Else (2)

Andre G.

Published Mar 16, 2022

+ Follow

Windows logs a lot of actions on your computer. We normal users just have to enable it first. If you keep very important files, or if you have a business and you keep trade secrets on your computer or server, you may want to have accountability who accesses grandma's original secret recipe that keep your bakery flush with returning customers.

This tutorial will walk you through the process. Take note this machine is Windows 8 but the process is very similar to Windows 10.

Enable enable auditing of the file system.

  1. Click Start -> Administrative Tools -> Windows Security
  2. Expand Local Policy -> Audit Policy -> Audit File System
  3. Enable auditing with both a successful and unsuccessful file access

The next part is to enable auditing of the file (or files) considered secret. There is a video showing the entire process below this outline.

  1. From Explorer or File Manager, find the file you want to monitor.
  2. Right click -> Select Properties
  3. Click the Security tab -> Auditing -> Add
  4. You will want to identify who we need to watch out for, and in this example, it will be everyone.
  5. Enter everyone. Click Check Names. Everyone will be underlined meaning Windows identified an account or a group that matches what you mean.
  6. Select All, or just the successful file access if you wish. Then click OK. This process is done.

The next video will show how it would look from the hacker thief. This example uses a Linux distribution developed primarily for penetration testing. The video starts right before a hacker compromises your Windows machine. The bad guy gets in successfully, logs in an account that exists in your computer and can proceed to look around what you have. Once the malicious actor finds you file he or she can exfiltrate it.

Recommended by LinkedIn

Microsoft Releases 4 Security Updates — Smallest Patch… Nuno Henriques 7 years ago
Microsoft Issues Security Patches for 25 Critical… Nuno Henriques 7 years ago
Viking Wisdom: Using Cron to Keep Your Linux System… Kylo P. 1 year ago

In this example, the bad guy found a file named plans-TOP-SECRET-ONLY-atomic-diarrhea.pdf and proceeded to download a copy of it.

The second part of the next video will show how enabling file system auditing on windows will show these actions on Event Viewer. The quickest way to find Event Viewer is to search for it on your Windows Search bar.

  1. Click Windows Logs -> Security -> Look for Event 4663.

According to Microsoft, Event 4663 is their code every time a user or a group accesses an object (a file is an object.) These entries will provide with more details such as when it happened, which user did it, and other information.

An Easy Way To Check If Your Files Have Been Accessed By Someone Else (6)

If you have a remote server or machine, Windows can also forward these events or logs. There are scripts available or you can create one so you'll get real-time alert while this is happening.

To view or add a comment, sign in

More articles by this author

No more previous content

  • Network Forensics of NIDS Testing Jan 8, 2024
  • Novice Malware Analysis Sep 10, 2023
  • Hackthebox Walkthrough: Heist Nov 15, 2022
  • Hackthebox Walkthrough: Under Construction Oct 16, 2022
  • Hackthebox Walkthrough: Persistence Oct 10, 2022
  • Hackthebox Walkthrough: Lure Oct 8, 2022
  • Tryhackme Walkthrough: Vulnerability Capstone Hacking Tutorial Jan 1, 2022
  • Tryhackme Walkthrough: Phishing Emails 1 Dec 24, 2021
  • TryHackMe Walkthrough: HackPark Nov 15, 2021

No more next content

See all

Sign in

Stay updated on your professional world

Sign in

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

Insights from the community

  • Operating Systems How do you monitor and audit file system activity and security events on your OS?
  • System Administration What steps can you take to recover a system after a crash?
  • System Administration How can you optimize Windows Group Policy for security?
  • Operating Systems How can you create a system image backup?
  • Business Operations What are the implications of setting the SUID, SGID, and Sticky bits in Linux?
  • Operating Systems What are the best tools and methods for auditing Linux security?
  • Computer Engineering How do you update your system for security?
  • Operating Systems How can you debug security issues in a Linux system?
  • IT Services How can you customize your operating system to handle growth and expansion?
  • Technical Support How can you secure software on a Linux machine?

Others also viewed

  • Microsoft warns of new PrintNightmare vulnerability affecting Windows 10 Aparna Agarwal, CISM 1y
  • Resolved | TiWorker.exe consuming all resources of Server 2016 Syed Sabih Haider 6y
  • This is how to delete the #Microsoft #Windows 10 Paging File on every shut down John Felix Odhiambo 5y
  • Abusing fodhelper.exe to bypass UAC Prompt and elevate privileges (PoC). Abhishek sharma 1mo
  • Microsoft Shows Uncertainty of Rules with the Release of Patches Pallavi Godse 9y
  • Patch time again: Microsoft closes numerous zero-day vulnerabilities in IE and Windows. Eddy Willems 3y
  • Windows 2003 Server Going Out of Support - What it means to you. Jhovanny Rodriguez 9y
  • 5 Things You Should Do Since Server 2003 Support Ended Todd Rosales 9y
  • 14th July deadline! Is Your Business Prepared for the end of Windows Server 2003 Support? Stephen Cobham (CEng) 9y
  • Security Patch updates by Microsoft for Un-Supported OS ( Windows Server 2003, Win XP ). Is using un-supported operating systems justified ? Pranay Prajapati 6y

Explore topics

  • Sales
  • Marketing
  • IT Services
  • Business Administration
  • HR Management
  • Engineering
  • Soft Skills
  • See All
An Easy Way To Check If Your Files Have Been Accessed By Someone Else (2024)
Top Articles
How to Stake Your ADA via Pool.pm with Nami Wallet - Learn Cardano
Media Relations | Fox News
Durr Burger Inflatable
Bashas Elearning
Skamania Lodge Groupon
Seething Storm 5E
CKS is only available in the UK | NICE
No Credit Check Apartments In West Palm Beach Fl
My.doculivery.com/Crowncork
Nioh 2: Divine Gear [Hands-on Experience]
Leeks — A Dirty Little Secret (Ingredient)
finaint.com
Dallas Cowboys On Sirius Xm Radio
Craiglist Tulsa Ok
Violent Night Showtimes Near Amc Fashion Valley 18
Marvon McCray Update: Did He Pass Away Or Is He Still Alive?
Saritaprivate
Uconn Health Outlook
The Old Way Showtimes Near Regency Theatres Granada Hills
Slim Thug’s Wealth and Wellness: A Journey Beyond Music
Regal Amc Near Me
Mandy Rose - WWE News, Rumors, & Updates
Prep Spotlight Tv Mn
Cognitive Science Cornell
Jackass Golf Cart Gif
Rgb Bird Flop
What Is Opm1 Treas 310 Deposit
Fastpitch Softball Pitching Tips for Beginners Part 1 | STACK
Swgoh Boba Fett Counter
Gideon Nicole Riddley Read Online Free
What Time Does Walmart Auto Center Open
Tamilyogi Ponniyin Selvan
Cross-Border Share Swaps Made Easier Through Amendments to India’s Foreign Exchange Regulations - Transatlantic Law International
October 31St Weather
Marie Peppers Chronic Care Management
Chilangos Hillsborough Nj
Flashscore.com Live Football Scores Livescore
Pitchfork's Top 200 of the 2010s: 50-1 (clips)
Registrar Lls
Ukraine-Krieg - Militärexperte: "Momentum bei den Russen"
Newsweek Wordle
Umd Men's Basketball Duluth
13 Fun & Best Things to Do in Hurricane, Utah
Sour OG is a chill recreational strain -- just have healthy snacks nearby (cannabis review)
Grand Park Baseball Tournaments
Blippi Park Carlsbad
25100 N 104Th Way
Julies Freebies Instant Win
Helpers Needed At Once Bug Fables
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Leslie's Pool Supply Redding California
Latest Posts
Article information

Author: Horacio Brakus JD

Last Updated:

Views: 5578

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Horacio Brakus JD

Birthday: 1999-08-21

Address: Apt. 524 43384 Minnie Prairie, South Edda, MA 62804

Phone: +5931039998219

Job: Sales Strategist

Hobby: Sculling, Kitesurfing, Orienteering, Painting, Computer programming, Creative writing, Scuba diving

Introduction: My name is Horacio Brakus JD, I am a lively, splendid, jolly, vivacious, vast, cheerful, agreeable person who loves writing and wants to share my knowledge and understanding with you.