Windows has made the analysis of file audit logs a dashboard. Security logs are taken over the VMI and analyzed. The agent is not established.
1. Who performs the reading, creation, deletion, editing, etc. operations on the file server and when.
2. Permission changes made on Windows can be analyzed.
3. The owner of the folder can be determined who made the change.
4. What are the most deleted, created and read file types in the selected date December?
5. The first 5 reads, deletions, creation, renaming and operations can be analyzed in the selected date December.
6. Failed Deletions and reading attempts can be reported.
7. It can be reported on which path the last reading, deletion, creation, etc. operations were performed.
9. The latest Windows activity can be reported when it was deleted by whom.
Analyze Windows activities:
Reading
Create
Delete
Modified
Rename it
Copy and Paste
Delete My Attempt
Read The Essay
Permission Change
Change of Control Settings
Change of Ownership
Cleat Activity