fileaudit presentation | windows file system auditing
DESCRIPTION
With a simple, agentless deployment, IT Managers can quickly install FileAudit and instantly protect all file servers in their Windows environment. FileAudit makes monitoring, auditing and securing files and folders intuitive and easy. Protect your most sensitive files and confidential information stored on Windows servers.TRANSCRIPT
![Page 1: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/1.jpg)
FileAudit® Windows® File System Auditing. The Easy Way.
![Page 2: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/2.jpg)
FILEAUDIT MAKES
INTUITIVE AND EASY
monitoring
CONFIDENTIAL
auditing securing
FILES AND FOLDERS
![Page 3: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/3.jpg)
OVER WHO HAS KEEPING TRACK
critical ACCESS TO DATA
IS
![Page 4: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/4.jpg)
YOU NEED TO
PROTECT sensitive data
CONFIDENTIAL INFORMATION &
![Page 5: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/5.jpg)
YOU NEED TO ENSURE compliance
TO INDUSTRY REGULATIONS (SOX, FISMA,HIPAA...)
![Page 6: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/6.jpg)
YOU NEED TO
THWART insider
threats BY REACTING QUICKLY TO USERS
accessing or sharing files
![Page 7: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/7.jpg)
time
NATIVE MONITORING & AUDITING ACCESS
overwhelming consuming
IS
![Page 8: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/8.jpg)
FILEAUDIT MAKES IT easy! It makes auditing faster, smarter and more efficient.
![Page 9: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/9.jpg)
SIMPLE & QUICK
AGENTLESS
NO intrusion
NO installation cost
3 minutes to install
![Page 10: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/10.jpg)
INTUITIVE EASY TO USE &
Easy to see what’s happening with company data
![Page 11: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/11.jpg)
real-time ACTIVITY MONITORING
read / write / delete access
file ownership changes
permission modifications
![Page 12: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/12.jpg)
alerts TO FILE AND
ACTIVITY
Immediately address any appropriate accesses
FOLDER
![Page 13: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/13.jpg)
server CUSTOMIZED
INTELLIGENCE
file
See at a glance what’s happening across multiple Windows servers.
![Page 14: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/14.jpg)
Searchable and secure audit trail to perform accurate IT forensics
CENTRALIZATION ARCHIVING &
![Page 15: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/15.jpg)
management USER-SPECIFIC RIGHTS
External auditors can easily run reports Non-IT executives can easily monitor their own sensitive data
![Page 16: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/16.jpg)
ENTERPRISE VALUE
more...
![Page 17: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/17.jpg)
POWERFUL FILTERING CAPABILITIES Sort the files you want to monitor.
![Page 18: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/18.jpg)
SCAN OPTIONS Exclude irrelevant data and focus only on insightful information. (e.g. file accesses generated by backup software, antivirus, etc.)
![Page 19: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/19.jpg)
PERFORMANCE & SCALABILITY FileAudit optimizes the NTFS audit to keep only relevant access events for monitoring.
![Page 20: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/20.jpg)
AUTOMATED AUDIT CONFIGURATION Automatically configure the auditing of selected files and folders.
![Page 21: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/21.jpg)
MICROSOFT CERTIFIED for compliance and support with Windows Server 2012 and Windows 8.
![Page 22: FileAudit Presentation | Windows File System Auditing](https://reader033.vdocument.in/reader033/viewer/2022051609/547ea99b5906b5d8718b46ec/html5/thumbnails/22.jpg)
ALL FILE SERVERS protect
Reduce the workload related to monitoring access Respond instantly to emergency situations Perform accurate IT forensics