If you are working in a corporate office or multinational company, you may have your own private network in offices. You have different branches and different types of people working in a same office or corporate network. You will have shared folders, files provided access to individuals or the group of people to keep data and information accordingly. But on other cases some user may have sufficient privilege to access your data or let’s say some IT guy may have privileged to access all the clients computers of your office.
In my experiences, I have heard many complains from users that they faced unknown problems, for example automatically update, modification of data and deletion of file from particular shared folders and files. However, those type of cheat can be find using server level monitoring. If let’s say, If a person has access to all computers of your organization and he/she may access your computer’s D drive and copied some important and classified document then what you do. Seriously?, you might need some software to monitor those type of activities. However, you have to purchase those software etc. etc. But, here I am giving some simple example of Windows 7. Windows 7 has some extra monitoring and triggering facilities which you can use.
If you doubt someone in network copying your files, then you can uses the computer management’s Session option to view. The Season option will let you know who are connected to your computer and which drive they are accessing from how long. To view the Session please follow below steps:
Click on Start Button, Now Click on right mouse button Pointing Manage option.
After clicking on Manage, following windows Computer Management Window will appears.
Now,click on Shared Folder menu to expand it’s options. Here you can see three options. Shares, Sessions and Open Files.
If you click on Sessions option, you will see which users, from which computer using which OS from when it’s connected to your personal computer. On the same time you can close that connection by right clicking on the list and click on Close Session. Remember that if you found this type of activities it’s better to take Screen Shot for your proof. (To take screen shot press Print Screen / SysRq key of window, and paste the screen shot into any image editing, word processing or new email program).
On the same way, if you want to know which files is copying through network then click on Open Files option. Here, you can see which user accessed your file, what operation he is performing like “Read, Modify etc”.
On the same way you can close the file access by right clicking on the list.
How to know somebody modified your files?
There are several ways to know who accessed and modified your file content. Here is simple example of word file. Just open the file which you are suspicious that the file content has been modified, click on File and click on Info menu. You will see many details like Author, Last modified by etc. But you still need more information then click on Show All properties text-link box right-below of the screen. Now, you can see Manager, Author, Last Modified By information.
I hope this tutorial helped you a lot. In next tutorial I will describe how to make a Trigger Email which will notify you if somebody accessed your personal computer’s data.