Windows has made the analysis of file audit logs a dashboard. Security logs are taken over the VMI and analyzed. The agent is not established. 



1.  Who performs the reading, creation, deletion, editing, etc. operations on the file server and when.

2.  Permission changes made on Windows can be analyzed.

3.  The owner of the folder can be determined who made the change.

4.  What are the most deleted, created and read file types in the selected date December?

5.  The first 5 reads, deletions, creation, renaming and operations can be analyzed in the selected date December.

6.  Failed Deletions and reading attempts can be reported.

7.  It can be reported on which path the last reading, deletion, creation, etc. operations were performed.

9.  The latest Windows activity can be reported when it was deleted by whom.


Analyze Windows activities: 


Reading

Create

Delete

Modified

Rename it

Copy and Paste

Delete My Attempt

Read The Essay

Permission Change

Change of Control Settings

Change of Ownership

Cleat Activity