The complete solution to malicious or accidental destruction of computers; problems with inconsistent interface; installation of unwanted downloads; damage to files and programs; MBR and rootkit attacks.
Now, the ability to select non-restrictive security, lock-down security, or your ideal combination of both is simple and easy.
Audit quality detail of file access by time, user, and application. It's all the data that you don't need, until you need it. And then you need it.
Records all file access attempts for easy file audit reports and event alerts. Things happen on servers that you have never seen or even imagined, until now.