S
S
Stan Marsh2016-09-20 09:25:09
System administration
Stan Marsh, 2016-09-20 09:25:09

How to track whether a file was read or not?

So the situation is this. A person sits at a secure network client, various letters come to this program, which he sorts into folders on a file server. What programs or tools can be used to track whether a person opened the downloaded files or not?

Answer the question

In order to leave comments, you need to log in

5 answer(s)
R
res2001, 2016-09-20
@res2001

On a Windows server? If so, turn on the audit and you will see everything in the log.

A
Andrey Mikhalev, 2016-09-20
@Endru9

If I were sorting letters and I needed to read what's inside, I would:
1) open directly from the mail program, read, laugh (or vice versa), close, and only after that save the file.
2) I sent myself a copy of the letter to my personal mail, deleted it in the outbox and in the trash, I’ll come home and read it calmly.
ps Well, I opened the file, but did not read it, the computer hung clicked 2-3 times - the file opened, and now they will fire me?)))
As if from all of the above, if the task is to hide the attachment from prying eyes, then you need to use Encryption, the benefit came up with mechanisms. even a banal password for a document will already reduce the risks.
File attributes can be easily changed - there would be a desire ...
And so - total surveillance of the employee, with screenshots, video recordings and other things, they may be saved.

C
CityCat4, 2016-09-20
@CityCat4

Install a program that monitors system calls. The usual SMP will not work here - monitoring the opening of a file is too small an operation, the same office opens hundreds of them ...

A
arkitekt, 2016-09-20
@acyp

(?) I understood correctly: a person has access to a letter. and, in principle, it can open (well, for example, in the case of Outlook) directly from the letter (in this case, we look at the cache). or even look through the mechanisms of the same Outlook ... (I don’t even know here ... only if you forbid viewing attachments)
Well, the most reliable option is video surveillance or systematic screen capture ..., then viewing the cache and monitoring the list of recently opened files. This is if Windows and the secretary are not much of a hacker.

T
tartarelin, 2016-09-20
@tartarelin

Probably, it would be possible to do this, set up a limited account on the terminal server, install the "secure network client" there and allow only it, explorer and, for example, notepad to be launched if it needs to read the letter in order to sort it.
But in fact, it is not clear what is happening and why this is necessary.
Why can't the script sort these files?
Why can't these files be encrypted?
What is the task, to prohibit opening files or vice versa, to track whether he opens all files?

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question