Skip to main content

Perform CIFS Auditing

This article applies to: Shared File Services

While policy defines tasks that must be performed on an ongoing basis in relation to storage of confidential data, actual review of the CIFS audit logs is only required if a security incident (ex: Confidential data exposure) is suspected.

 If you suspect confidential data has been exposed contact the Cornell IT Security Office for assistance.

About this Article

Last updated: 

Thursday, December 22, 2016 - 12:54am

Was this page helpful?

Your feedback helps improve the site.