Please enable JavaScript to view this site.

Navigation: Additional Tips and Resources > Miscellaneous

File Monitoring vs. File Access Tracking

Scroll Prev Top Next More

The File Monitoring (System Health) and File Access Tracking (Security & Compliance) features can seem ambiguous since they both monitor file changes. The features are quite different however and attempt to solve different problems. The comparison table below outlines the key differences between these features:

 

Comparison Overview

 

Feature

File Monitoring

File Access Tracking

Can generate alerts, trigger actions

Yes

No

Requires NTFS auditing to be enabled on monitored folder(s)

No

Yes

Captures username who accessed and/or modified file

No

Yes

Can capture calling process who accessed and/or modified file

No

Yes, depending on source

Can capture source computer from which file was accessed and/or modified

No

Yes

Monitors checksums

Yes

Yes

Can monitor read access

No

Yes

 

Detailed Comparison

 

System Health -> File Monitoring

 

This feature monitors files in one or more designated directories either in real-time or in scheduled intervals. File Monitoring was designed with both security (integrity checks) and system automation in mind, and is primarily intended to issue alerts or trigger actions when a file change is detected.

 

From a security standpoint, File Monitoring ensures that selected files (e.g. executables in the SYSTEM32 directory, credit card transaction logs and so forth) are not changed, and that any change that does occur is logged and, optionally, triggers an alert.

 

From a system administrator standpoint, it can help automate many tasks that are triggered based on file changes in a directory. For example, a directory can be monitored and any file added to the directory can be automatically compressed by a process action, or a list of users can be notified that a file has been added. Since file changes can be directly linked to a process action, the abilities of what one can do are only limited by the process/batch file itself.

 

One distinct advantage of the File Monitoring feature is that it does not require any additional configuration steps on the OS. Once File Monitoring is configured and the configuration pushed, it will be effective immediately.

 

 

 

Security & Compliance -> File Access Tracking

 

Security & Compliance intercepts "Object Access" security events which are generated by the Operating System when auditing has been enabled on a file and/or directory. This feature was designed to monitor directories that contain confidential or security-sensitive data, and provide advanced reporting that can be used to satisfy both security and compliance-related demands.

 

While File Access Tracking cannot generate any type of alert or trigger actions, it does include more information about the file changes themselves. The key advantage is that File Access Tracking can often let you know who made changes to a file, and from where.

 

For example, depending on the source of the file change, the tracking information may include the calling process as well as the source computer.

 

Due to some key architectural differences between Pre-Vista operating systems, Vista and Windows Server 2008 are the preferred platforms for this feature, though earlier operating systems are fully supported as well.

 

Keep in mind that File Access Tracking requires that NTFS auditing is enabled on any folder that needs to be monitored, see File Access Tracking Prerequisites for more information.