Completely agree with Aidar. You really need to consider:
1) The goal(s) of your auditing - for example, data owner identification and/or noting inappropriate access attempts
2) What are your most important folders and files.
Failure to think about the above will result in you collecting far more data than you can glean any meaningful intelligence from.
Completely agree with Aidar. You really need to consider:
1) The goal(s) of your auditing - for example, data owner identification and/or noting inappropriate access attempts
2) What are your most important folders and files.
Failure to think about the above will result in you collecting far more data than you can glean any meaningful intelligence from.