No element in a company is subject to as much access traffic as the file server. A large number of employees can make changes to any given system. This applies to assignment of access rights (permissions) and activities involving specific files. Not having comprehensive monitoring results in security risks and inconsistencies in the permissions process.
Security risks arise when temporary permissions of unauthorised employees provide access to confidential documents. The latter can be viewed, deleted or copied. Even if the permissions are removed, any security incident that occured can remain undetected. There is no longer any way to verify who has copied what.
Unclear permission processes
Unclear permission processes cannot be improved if the current processes cannot be analysed. Who assigns rights (permissions) to whom and why? Where do problems arise and where are agreements necessary? The analysis of errors allows for creation of an individual authorisation concept.
8MAN clearly displays the permissions structure on file servers. FS Logga extends this transparency to the entire access and change history in the system. Thereby, activities performed outside of 8MAN are also recorded. Security-related temporary permissions and modifications to monitored directories can be immediately verified.
Permission modifications can be detected by means of configurable reports. Access to and modifications of sensitive data such as deleting, copying, moving and writing is recorded by the FS Logga.