Change Auditor for FluidFS helps ensure the security, compliance and control of files and folders by tracking, auditing, reporting and alerting on all changes in real time. With Change Auditor, administrators can report on and analyze events and changes without the complexity and time required by native auditing or concerns over system performance.
Change Auditor for FluidFS tracks all events related to shares, including access to folders and folder/file deletions and changes, helping administrators ensure access to shared directories is secure and
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Track all events related to shares, including deletions, helping administrators ensure access to shared directories is secure and maintained.
Display the color-coded severity of streamed events from FluidFS servers in one centralized viewer. This saves administrators time as they can see all events in one location.
Specify and filter searches by event type, server, user, etc. This enables administrators to quickly pinpoint the source of the problem, providing faster time to resolution and eliminates noise from routine safe events.
Discover the six Ws for every event (who, what, where, when, workstation and why) in simple terms with before and after values. You’ll save administrators time normally spent digging for more details.
Dispatch alerts in real time for events that meet predefined criteria. Change Auditor notifies administrators via email so that they can address problems immediately.
Deliver preconfigured and customizable reports to satisfy auditor and management requests so administrators can get back to their regular jobs fast.
Configure and deploy auditing templates from one console for all servers in the organization saving administrators time.
Control access so auditors can run searches and reports without the ability to make any configuration changes to the application. This enables auditors to obtain the information they need without requiring the assistance and time of the administrator.