Curtain LogTrace provides administrators to log user file activities like creation, copying, moving, renaming, deletion, printing, and saving files within specific applications. It can also track the insertion and ejection of USB devices and differentiate between different file copying operations to USB devices. This logging capability provides a detailed record of user actions related to files and USB devices, enhancing understanding of how sensitive information is accessed and shared within the network. It helps identify unauthorized or suspicious activities that may pose a security risk. With Curtain LogTrace, administrators can monitor and manage file-related actions more effectively, ensuring compliance with audit requirements and data security guidelines. It also aids in early detection and mitigation of potential security incidents.
The Policy server maintains a central audit log that records users’ file activities. For events like file copying and moving, the log captures the destination type as well. This detail enables administrators to generate reports focusing on file copying to USB devices. Administrators can configure the logging of specific events for different user groups, customizing the audit log settings to record only the desired events for each user group. This ensures that the log provides relevant and targeted information based on the specific needs of different user groups. more
Comments (2)