File Access Log

After activating file control and the related object controls, the File Access Table will be populated. This table is separate from the standard machine access logs.
From Log > File Access Log, a window will be displayed containing the file access logs, with the same features available for normal accesses, such as filtering, sorting, grouping, and exporting.
Additionally, in the configuration settings, you can define different retention criteria for these logs compared to standard access logs.
​
AI ANALYSIS
The new AI Analysis button in the log grids is available (subject to a dedicated license).
This feature allows you to send up to 100 displayed events to the AI. The system then analyzes them and automatically highlights critical or suspicious logs, providing a contextual and readable assessment, even for less experienced users.
The purpose is to provide advanced interpretative support, improving the understanding of security logs and accelerating the identification of potentially risky actions.
If more than 100 logs are selected, the system displays a warning and processes only the first 100.
The generated report can be printed and exported.