An effective access monitoring tool will enable you to audit all the user sessions and check for anomalies. This is often referred to as "double checking". Observation can be performed in several ways, including text-based auditing, video recording, and data collection. This type of activity is useful in reactive and proactive use cases. The following are some examples of how you can use an access monitor: [*] Protect data: Observation includes the double-checking of access controls.
Logging: An access monitor log records every single access to files or folders on your computer. It shows the size and type of files accessed, and allows you to filter out users and processes. You can also filter the logged information by time and date. The tree structure on the left side of the user interface lets you see the number of times a particular file was accessed. You can also use the Chronological feature to manually locate and search for files.
Configuration: You can set up monitoring rules by using the FileVault interface. Once you have configured your profile, you can see total changes and who accessed the file. You can also apply a custom filter to see only certain changes. The monitor's statistics can be useful in monitoring office networks or servers. A user can customize the preferences in the settings panel to see how many files have been changed. When analyzing a large data set, you can compare the changes and choose the best-suited solution.