Under some circumstances Windows will log file names with a path to the device object e.g. \Device\Harddiskvolume3\file.txt instead of the path to a logical drive e.g. E:\file.txt. When adding directories to the list of tracked directories in File Access Tracking simply specify the path using the device object name as shown in Window...
Yes. There are four components necessary to configure in order to detect CryptoLocker or other Ransomware software and send an alert or cut off access to the network shares to stop the unwanted activity. 1 An action must be configured in EventSentry. You can use a Service action type to stop the LanmanServer service which will cut off acc...
There are several scenarios where you may want to monitor when files are added or deleted from a directory and when this happens trigger a particular action. In this specific example a backup folder will be monitored for file deletions since files will regularly be added but not deleted and an alert will be triggered to send a text message t...