AVAST Software - New
The official launch is scheduled for the 29th of July 2011. We think you’ll be pleased with the rich features and simplicity of operation that have been built into these solutions. For the first time, a management console has built expressly fmore...
Description
PA File Sight will help you determine who is reading from and writing to important files. It can tell you when a new file or folder is created or renamed. And, when a file or folder gets deleted, PA File Sight can tell you who did it. Plus, you can often find out what program was used to perform the action. |
Besides file access auditing and logging actions, the Ultra Edition helps you further by providing historical reports to help see what happened the earlier, whether you chose to be notified or not. AND it lets you alert on user usage patterns (reading X files in Y time for example) to help detect file copying activity.
File Auditing Features
Monitor:
- All files or just a subset
- File and folder creation, deletion, access (reads), changes (writes)
- File and folder permission changes
- Successful actions and well as failures
- Real-time monitoring that does not require enabling system audit events
Alert Details:
- Date and time of action
- Target file and folder
- User account, including domain
- Activity that was done to the file
Notification Responses:
- Email message
- SMS text message
- SNPP pager, etc.
- Record to a log file
- Run a program
- Write to a database for later reports (Ultra only)
- Reports in text, HTML, .CSV or PDF formats
Remote Monitoring |
|
|
Monitoring remote servers, even across the firewalls and the Internet |
|
|
Safely send data to remote networks using SNAP Tunnels |
|
|
Securely connect to monitored servers with Remote Desktop even through firewalls and across the Internet with PA File Sight |
|
|
Monitors |
|
|
The File Sight monitor watches real time file access by users and programs. You can configure which files it watches, and how you are notified when a particular operation (file read, write, delete, etc) occurs. |
|
|
|
|
|