{"id":620,"date":"2007-10-19T11:35:39","date_gmt":"2007-10-19T15:35:39","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/2007\/10\/19\/how-to-find-out-who-deleted-a-particular-file\/"},"modified":"2022-06-16T15:17:22","modified_gmt":"2022-06-16T09:47:22","slug":"how-to-find-out-who-deleted-a-particular-file","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2007\/10\/how-to-find-out-who-deleted-a-particular-file\/","title":{"rendered":"How to find out who deleted a particular file"},"content":{"rendered":"<p>If you want to know who deleted a particular file in Windows 2003 all you need to do is enable auditing the folder you want to keep track of. Just right click on the folder, go to &#8220;sharing and security&#8221;, then &#8220;security&#8221; tab, at the bottom click on &#8220;advanced&#8221;.  Select the auditing tab, click add, select the group or users to track, then pick what actions you want to track.  <\/p>\n<p>To track file deletion you would enable:<\/p>\n<p>Create files\/Write data   \t\tSuccess\/Fail<br \/>\nCreate folders \/ append data \t\tSuccess\/Fail<br \/>\nDelete Subfolders\/Files\t\t\tSuccess\/Fail<br \/>\nDelete \t\t\t\t\tSuceess\/Fail<\/p>\n<p>Once thats done Windows will log all the information in the security event log.<\/p>\n<p>&#8211; Suramya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you want to know who deleted a particular file in Windows 2003 all you need to do is enable auditing the folder you want to keep track of. Just right click on the folder, go to &#8220;sharing and security&#8221;, then &#8220;security&#8221; tab, at the bottom click on &#8220;advanced&#8221;. Select the auditing tab, click add, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[19,24,2],"tags":[],"class_list":["post-620","post","type-post","status-publish","format-standard","hentry","category-computer-security","category-knowledgebase","category-techie-stuff"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=620"}],"version-history":[{"count":3,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/620\/revisions"}],"predecessor-version":[{"id":1565,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/620\/revisions\/1565"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}