department or user can manage the privileges of the folder in their own sharing
can grant periodical folder permissions. For example; full rights was given Mr.
İsmail for 2 hours on \\ fileserver \
finance folder. The rights are automatically removed at the end of the period.
The periodical rights report is sent by an e-mail.
all rights of one user to another user.
1.5. Move all rights of one user to another user.
notified by automatic e-mail if the Everyone group is defined in a folder.
can see and manage who has what rights in a folder in the sharing field.
(Authorization of folder rights, add authority, remove authority, change
and manage in which folders a user is entitled. Delete or change all rights in
the change in folder rights (Who, When, To, What rights are granted in which
1.10. You can undo folder rights changes from FolSec
Panel. (For example, in the \\ fileserver \ Finance folder, İsmail's Full
Rights have been changed to Read). Restore with restore feature.
1.11. You can be notified by e-mail if there is a
change of authority in a specified folder. (For example, full rights are given
to ismail user in finance folder)
1.12. Your users can make folder claims from the FolSec panel. The system can authorize admission claims. Who has made the claim for which folder is registered who has authorized
2. File access control perspective
2.1. You can report file accesses in sharing fields. (Who, When, Which file has been deleted - created or read.)
2.2. Which file types have been deleted these days and when deleted!
2.3. Which file types were created these days who created when.
2.4. What kind of authority changes were made in which folders through Windows? You can analyze security logs.
2.5. The owner of which folder has been changed. Who changed it when?
2.6. Windows events when deleted by whom!
2.7. Who tried to delete the finance folder when? Find failed deletion and read attempts.
3.1. You can analyze and report the types of folders and files in the share fields.
3.2. What types of files are there on the sharing server?
3.3. What types of files does the user have on the sharing server and where?
3.4. You can report on file sharing server by file type, size, creation date (Oldest file - Most recent file).
3.5. You can create folder in file sharing area, copy, move, delete and correct name.
3.6. What is the largest folder size in the share area? Who is the owner? What types of files are in the folder?
Hardware: 16GB Ram 4Core CPU 50GB Free Disk space. (SSD Disk infrastructure is
recommended for performance)
requirement: Windows 2008 (64bit), Windows 2012 (64bit), Windows 2016, Windows
Requirement: Mysql DB . Folsec automatically installs the database.
Browser: Google Chrome, Firefox, Yandex.
1.5. Access Ports: The default web port is 5000. It is replaceable. (https:
// localhost: 5000
5003 and SMB port 445 must be open to access server for sharing fields where
FolSec is installed.
1.1. Download the FolSec Setup file from www.folsec.com
Run the setup file and complete the installation as shown
Dashboard; the number of Servers, the number of shared folders, the number of users in shares, the number of permissions detected and changed in folders, the panel showing how many folders everyone has rights to, the panel showing the number of folder permissions requests, and the fields where the information about the server is displayed here.
Menu: Server Perspective
The server perspective does the job of adding, deleting, and editing folder permissions.
Add User: You can add new permissions from this field. Permission type and user must be selected, then annotation can be added.
Period: If a certain period is allowed to be defined in a folder, timed addition parameters should be selected. Thus, authorization is defined for the specified time. Authorization is automatically removed at the end of the period.
The "Inherit override" scans the folders which “inherit” is not opened and permission is added.
If period is defined, it sends an e-mail when the period is over.
Send Email: E-mail the permission list in the selected folder.
Bulk Save: Saves all multiple operations in the selected folder at the same time.
Export: Exports all permissions in the selected folder to an excel file.
Inherit Report: Lists all folders that inherit is closed by scanning all folders under the selected folder.
Change Owner: Changes the fowner of the folder.
Enable Inheritance: Turns on if inherit is off in the selected folder.
Disable Inheritance: Turns off inherit on in the selected folder.
User Perspective: It allows us to list and manage in which folders a user has permissions on a server.
Clone Permission: Copies all folder permissions of the selected user to another user.
Move Permission: Moves all folder permissions of the selected user to another user.
E-mail the selected user's permission list.
Saves all of the selected user's multiple operations at the same time.
Exports all permissions of the selected user to an excel file.
events between the two selected dates.
folder permission changes made by the user.
Lists all permissions detected by the system after scanning.
It lists all the permissions changes made on the basis of user and undoes the process when you click the restore button.
requests of a non-authorized user are listed here.
After the necessary action is seen and done by the administrator, if it is not approved, it is rejected
User-based folder and authorization report. It reports how many rights a user has in each folder, what type (Read, Write, etc.).
The list of scheduled permissions is kept here. To whom, when, how long, in what folder what is allowed are reported.
Program users are managed in this section. You can add,
delete, or edit new users. You can perform batch processing with Batch
Authorization. “FETCH ALL ACTIVE DIRECTORY USERS” you can list all users in the
“Add User” you can add a new user.
You can choose which folders can be managed by which user here.
SMTP settings are set here.
Active Everyone Alers: if activeted this options, you will receive every everyone changes on server
In case of a change of permission in the defined folders, you will be notified by e-mail.
Adding, deleting and updating Server can be done here.
"Scan Folders" scan for the permissions of the new folders.
This field is used for scheduled permission scans. Weekly or daily scans can be defined.
This field is used for scheduled file audit scans. Time-based scans can be defined, such as scan every 1 hours.
This field is used for scheduled file scans. Weekly or daily scans can be defined.
Used for Archive operations. When a backup is taken, the
current database is deleted and restarted from scratch
"Switch" is used to return to the old database
Dashbord: A summary of folder and file access is shown. The change of the rights of “read”, “delete”, “create” are listed as successful or failed.
The audit logs are kept. The data in the two date ranges is listed. With “Scan Events”, new events are scanned. Audit events are withdrawn from the system event viewer. Logs such as read, write, delete, change ownership are analyzed here.
All activities of the program are kept here. Successful or unsuccessful entries in the program, Scan results, export operations, server add or remove operations records are kept in the list.
Dashbord: This is where the file types in the share fields are categorized and reported by server and user.
This is the field where all file types in the share fields are listed by size, by name, by date, by category.
You can manage share folders in real time. You can create new folders, delete, move, copy, or rename the folders. You can export the list to excel with Export button.
You can see the total size of the shared folders and how many subfolders and files they have.
Folsec File Audit Setting