Check Who accessed a Shared Folder and Made File Changes (2024)

Auditing shared folder access and changes is crucial for several reasons. Firstly, it helps ensure data security and protect sensitive information. By monitoring who has accessed shared folders and tracking changes made, organizations can detect unauthorized access or suspicious activities, helping prevent data breaches and unauthorized disclosures.

Secondly, auditing shared folder access and changes promotes accountability and transparency. It allows organizations to hold individuals accountable for their actions, as each access and modification is recorded and attributed to a specific user. This can deter employees or other users from engaging in inappropriate or malicious activities, fostering a culture of responsibility.

Thirdly, auditing facilitates compliance with regulatory requirements and industry standards. Many regulations, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA), mandate organizations to implement controls and audit trails for data access and changes. By conducting audits, organizations can demonstrate compliance and avoid legal and financial repercussions.

In this article, we will discuss two methods by which you can audit shared folder access and changes. One is using the native method, and the other is using Lepide File Server Auditor.

Steps to Track Changes Made to Files in a Shared Folder with Native Auditing

Below are the steps to enable auditing and track events in event logs

Step 1: Configuring the policies

  1. Type “GPMC.msc” in the “Command Prompt” or “Run” dialogue box to open “Group Policy Management” console.
  2. Navigate to “Forest” ➔ “Domains” ➔ “www.domain.com”
  3. Right-click default domain policy or customized policy under “Domain Controllers” node

    Note: We recommend you to create a new Group Policy Object (GPO), link it to the domain and then edit.

  4. To access “Group Policy Management Editor”, click “Edit” in the context menu.
  5. Go to “Computer Configuration” ➔ “Policies” ➔ “Windows Settings” ➔ “Security Settings” ➔ “Local policies” ➔ “Audit policy” ➔ “Audit object access” policy
    Check Who accessed a Shared Folder and Made File Changes (1)
  6. Double-click “Audit object access” policy to open “Properties” window.
    Check Who accessed a Shared Folder and Made File Changes (2)
  7. Click “Define these policy settings”.
  8. Select “Success” and “Failure” checkboxes. Click “Apply” and “Ok”.
  9. Navigate to “Advanced Audit Policy Configuration” ➔ “Audit Policies” ➔ “Object access”.
    Check Who accessed a Shared Folder and Made File Changes (3)
  10. Configure “Audit File System” policy and “Audit Handle Manipulation” policy.
  11. Open their respective “Properties” window and define the settings for both “Success” and “Failure” events.
  12. Click “Apply” and “Ok” after enabling both audit policies.
  13. To apply policy on the domain, execute the following command in “Command Prompt”:
    gpupdate /force

Step 2: Configure auditing on the file/folder you want to track

You have to perform the following steps at the file or folder. If you perform them on a folder, these settings can be selected to be applied to its sub-folders and files.

  1. Open “Windows Explorer” and navigate to file share that you want to audit.
  2. Right-click the file and click “Properties” in the context menu.
  3. Switch to “Security” tab and click “Advanced” button to open “Advanced Security Settings”
  4. Switch to “Auditing” tab which displays already existing auditing entries.
    Check Who accessed a Shared Folder and Made File Changes (4)
  5. Click “Add” to create a new auditing entry. The “Auditing Entry” window opens up on the screen.
  6. Now click “Select a Principal” to choose the users whose activities you want to track. For tracking the activities of all the users, enter “Everyone” in “Enter the object name” box.
  7. Click “Ok” after finalizing your selection.
  8. Select “All” option from “Type” drop-down menu.
    Check Who accessed a Shared Folder and Made File Changes (5)
  9. In the Permissions section, click “Show advanced permission” and select the following:
    • Create files/ write data
    • Create folders/ append data
    • Write attributes
    • Write extended attributes
  10. Click “Ok” to close the “Auditing entry” window. It takes you back to “Auditing” tab of “Advanced Security settings” window.
    Check Who accessed a Shared Folder and Made File Changes (6)
  11. Click “Apply” and “Ok” and close file “Properties”.

Step 3: Tracking events in the “Event Viewer”

  1. Let us have a look at the steps to track events:
    • Open “Event Viewer”.
    • Expand “Windows Logs” and select “Security”.
    • Click “Filter current log”.
  2. Event ID 4656 is generated whenever an application attempts to access an object (as per the set audit policy) but does not necessarily mean that any permissions were exercised.
    Check Who accessed a Shared Folder and Made File Changes (7)
  3. Event ID 4658 determines the duration for which an object was open.
    Check Who accessed a Shared Folder and Made File Changes (8)
  4. Event ID 4663 indicates if permissions like read, write, delete or rename have been exercised.
    Check Who accessed a Shared Folder and Made File Changes (9)
    Check Who accessed a Shared Folder and Made File Changes (10)
  5. The type of permission accessed is indicated by “Accesses” in the event details.
    Check Who accessed a Shared Folder and Made File Changes (11)

How Lepide File Server Auditor Audits Shared Folder Access and Changes

Lepide File Server Auditor empowers you with the ability to detect critical changes in your business enterprise without having to put in any manual effort. Granular reporting and real time alerts are just a few of the features that help you automate otherwise time-consuming tasks.

Lepide File Server Auditor has the ability to report on all user behavior related to File Server, including whether shared folders are being accessed, or whether changes are being made to shared folders. Lepide presents this data in clear, easy-to-read reports that condense noisy event logs into a single pane of glass. Lepide can also report on user behavior related to individual files and folders in the same way, including who is copying, moving, modifying and deleting data.

Below is an example of one report from Lepide in which we are looking at all modifications in shared files and folders. You can see the critical who, what, where and when information is displayed front and center.

Check Who accessed a Shared Folder and Made File Changes (12)

You can see here how easy it is to dive into all changes being made to shared files and folders. Why don’t you download the free trial of Lepide’s File Server auditing solution today and try it out for yourself?

Check Who accessed a Shared Folder and Made File Changes (2024)
Top Articles
How do I enable offline payment methods?
Angular Custom Form Validators
R Statistical Software
Metro By T Mobile Sign In
What do they mean as Pathway on the Record of Completion?
Academic calendar 2023 - 2024 - student.uva.nl
Ky Smartgov
Www.fresno.courts.ca.gov
Ups Cc Center
Black Adam Showtimes Near Amc Brazos Mall 14
伊南 娜
Black Men Have Issues
Cerner Pwx
Maybe Meant To Be Chapter 81
Panter Belico Net Worth
How to Find the Subdomains of a Domain | Geekflare
Tamilyogi Cc
Terrorist Usually Avoid Tourist Locations
Printable Coupon $3 Off Pull-Ups
Katmoie
Breading For Tonkatsu Crossword Clue Crossword Clue | Hilltop Soccer Complex
Wedding Dr Amy Hutcheson Married
Digoxin Ati Medication Template
Docent Edelsteenkunde & Studieloopbaan begeleider | Schoonhoven | Stichting voor Educatie en Beroepsonderwijs Zadkine
Nikon in 2022: What happened, why, and where next for the Big N?
Fatal Car Accident Indiana 2022
Sams Gas Price San Bernardino
Tamilyogi Movies Download 2022 Free Download
Caprijeans ARIZONA Ultra Stretch Gr. 36, N-Gr, rosa Damen Jeans High Waist mit seitlichem Streifen
Artmusekitsmikash Rtic Divider/Cutting Board For 65 Gallon Rtic Coolers
Kind Farms Reserve Medical And Recreational Cannabis Photos
Free Inter Tv Live
Atlas Gradebook Uiuc
Beacon Schneider Gibson County
Wv Mugshots 2023
Restored Republic January 20 2023
Central Nj Craiglist
Aabb Investorshub
M3Gan Showtimes Near Century Arden 14 And Xd
Chris Medlin: Credits, Bio, News & More | Broadway World
28 Box St
City Demands Pastor Take Down 'Jesus' Sign in Front of Church, Gets Epic Response from Him During Sermon
Maragough28
Who Gives The Best Pedicures Near Me
2003 Chevrolet Corvette Z06 Coupe On for sale - Portland, OR - craigslist
Nuefliks.com
Retail Jobs For Teens Near Me
Navigating Washington, DC with Metro | Washington DC
Walmart Pto Payout 2023
Craigslist Cars Lima Ohio
Wednesday Morning Gifs
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6319

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.