The File Sharing & Audit Tool in iShield allows you to configure scanning parameters to monitor and audit file sharing activity within your network.
Select Add Scanning Configuration
Config Name: The name of the scanning config
Scan Networks: Select whether to scan the configured local network or a defined network range.
Local home networks: Scan configured local networks such as 192.168.1.0/24
Defined network ranges: Scan the defined network ranges
Add Network range: The network range in CIDR that will be scanned such as 192.168.20.0/24
Authentication Method: Select whether to scan the network as a Guest or with Defined credentials
Guest: Scan the network as a guest
Defined credentials: Scan the network with credentials
Auth Username: The username of the account
Auth Domain: The domain i.e. domain.local
Auth Password: The account password
Schedule run day: Select the day of week for the scan to run
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday
Alert on new shares discovered: Triggers an alert when new shared folders are detected on the networkÂ
Alert on shared executable files: Triggers an alert when executable files are found in shared locations
Alert on writable shared executable files: Triggers an alert when executable files in shares have write permissions (high risk)
Alert on new shared executable files: Triggers an alert when new executable files are added to shares
Alert on files exceeding: Enter size of file in MB
Alert when 'X' files have been modified: Useful for detecting abnormal bulk changes (possible ransomware activity)
Alert when 'X' files have been removed: Helps detect suspicious deletion activity
Alert when 'X' new files have been found: Detects large file uploads or unexpected data dumps
Alert Exclusions:
Define patterns or paths to ignore.
Example use cases:
Exclude backup directories
Ignore software deployment shares
Exclude known safe executables
Select Add Alert Exclusion to create a new exclusion rule.
Alert on custom file name matching:
Example use cases:
Compliance monitoring
Sensitive document tracking
Data leak detection
Select Add Custom File Alert to create a new file alert.
Notify email address:
Enter one or more email addresses to receive scan alerts by selecting Add Email Address.