Knowledge Base

Under some circumstances Windows will log file names with a path to the device object e.g. \Device\Harddiskvolume3\file.txt instead of the path to a logical drive e.g. E:\file.txt. When adding directories to the list of tracked directories in File Access Tracking simply specify the path using the device object name as shown in Window...

KB-ID 194
Category: File Access Tracking
Applies to:

Yes. There are four components necessary to configure in order to detect CryptoLocker or other Ransomware software and send an alert or cut off access to the network shares to stop the unwanted activity. 1 An action must be configured in EventSentry. You can use a Service action type to stop the LanmanServer service which will cut off acc...

KB-ID 279
Category: File Access Tracking
Applies to: 2.90 and higher