How to track have been read the file or not?

So the situation is this. The person sitting at the client a secure network, in this app come out which it sorts by folders on the file server. What programs or tools, you can track down the opened files or not?
July 4th 19 at 23:04
6 answers
July 4th 19 at 23:06
On server Windows? If Yes, turn on auditing and you will be in the magazine all to see.
Um, on a specific folder to audit only to configure? - emilio commented on July 4th 19 at 23:09
In my opinion, no. - Lucio commented on July 4th 19 at 23:12
you can even a specific file. only make sense? I won't open saved. I open from the letter :) - Gillian_Trantow commented on July 4th 19 at 23:15 - Gillian_Trantow commented on July 4th 19 at 23:18
July 4th 19 at 23:08
If I was engaged in sorting letters, and I would have to read what's inside, I would:
1) opened directly from your email program, read, laughed (or Vice versa), shut down, and only then saved the file.
2) sent a copy of the emails to personal email, deleted the outgoing and the basket will come home safely read.
p.s. Well, I opened the file, but not read, the computer hung clicked 2-3 times the file was opened, and now I get fired?)))

From all the foregoing, if the task is to hide the attachment from prying eyes - you need to use encryption, the benefit of invented mechanisms. even a simple password on the document to reduce the risks.
The file attributes can be easily exchanged - there is a will...
And so the total surveillance of an employee, with screenshots, video recordings and other possibly save.
July 4th 19 at 23:10
To put the program monitor the system calls. Normal SMP here will not go - monitoring file open operation is too small, the same office opens hundreds of them...
July 4th 19 at 23:12
(?)I correctly understood: the person has access to email. and, in principle, can open (well, for example in the case of Outlook) directly from the letter (in this case, look at the cache). if not browse mechanisms of the same Outlook... (here I don't know... if you deny view attachments)

Well, the most reliable option is a surveillance or systematic removal of screen..., and then view the cache and monitoring the list of recently open files. If the floor wind and the Secretary is not much a hacker.
then Yes, the security audit policy. - Lucio commented on July 4th 19 at 23:18
Man has access not to the letter but to file the letter and the text of the letter saved into a text file. - emilio commented on July 4th 19 at 23:15
the link above, but I will repeat - Gillian_Trantow commented on July 4th 19 at 23:21
July 4th 19 at 23:14
Perhaps it would be possible to do so on a terminal server to configure a limited account, install the "client secure network" and allow to run only it, e.g. explorer, and Notepad if he needs to read the letter to sort it.
But in fact, nichrome not understand what is happening and why.
Why these files cannot sort script?
Why these files cannot be encrypted?
What is the task, not allowed to open files or Vice versa, track, does it open up all the files?
July 4th 19 at 23:16
You can try the program 10-Strike Connection monitor. Put on server and it will log to write what the network file opened
of.the website
Logs writes a good program, but slows down terribly. In the organization of about 120 cars. - emilio commented on July 4th 19 at 23:19
: you can play around with the settings to try to footcloth resolve of all sorts and intervals of twist not to slow down - Lucio commented on July 4th 19 at 23:22

Find more questions by tags System administration