Auditing your employee’s USB file transfers

Auditing your employee’s USB file transfers

With the File Operation Report in AccessPatrol you can easily display the file sizes of each file transfer.

This easily allows you to see if the end users are copying/renaming/etc large, medium or small files.

To run the File Operations Report:

  1. Open the web console
  2. Choose AccessPatrol from the left-hand menu.
  3. Choose the “Device Reports” option. 
  4. Select the report “File Operations History” and choose the Computers/Users you want to check.
  5. This will open the report where you can see all the file movements and size of files of your monitored users.


    • Related Articles

    • Release Notes

      Version 9.0.2 Jan 25, 2024 Live Capture – Remotely view employee screens and take real-time screenshots on-demand; combine with trigger-based and interval-based screenshots for complete coverage. (BrowseReporter) Timeline View – Get immediate ...
    • How do I audit my operator’s activities on the Web Console?

      Audit logs help you answer “who did what, where, and when?” when it comes to configuration changes and data access within the CurrentWare Console. It documents every change made to your CurrentWare security policies, console settings and ...
    • Can I block specific file types from being transferred?

      AccessPatrol gives you the ability to prevent your end-users from copying specific file extensions to their storage devices. Using Block File Extensions to Restrict File Type Transfers Choose the AccessPatrol solution from the left-hand side. Select ...
    • Best practices to block mouse mover software

      Employers have a common concern with productivity when employees are working remotely A common occurrence with remote working is having employees fake mouse and keyboard movements to avoid getting an “idle” or “away” status with related work apps. ...
    • Block unauthorized Human Interface Devices

      What does this do? Allows specific Human Interface Devices (HID), such as company-authorized keyboards and mice, and blocks all other keyboards and mice. This allows control of keyboards and other input devices that may pose a security risk. What ...