image

Which remote loca­tions are access­ing the company’s file trans­fer servers?

Know­ing where data is being trans­fered into and out of the orga­ni­za­tion is an impor­tant part of man­ag­ing File Trans­fer usage. This infor­ma­tion forms the basis for mod­i­fy­ing File Trans­fer server con­fig­u­ra­tion set­tings and iden­ti­fy­ing unau­tho­rized access.

Sen­try Ana­lyt­ics’ Remote IP Usage view sum­ma­rizes File Trans­fers by the ini­ti­at­ing sys­tem. It shows the num­ber of trans­ac­tions ini­ti­ated by for each node of the remote IP address of the sys­tem. It sum­ma­rizes File Trans­fer activ­ity by secured ver­sus unse­cured access.

Drill Down for File Trans­fer Details

Double-​click an IP address pat­tern entry to see a detailed list of trans­fers ini­ti­ated from that IP address (or pattern).

Next Steps


File Trans­fer Analysis
Typ­i­cal Find­ings





Con­tact us for more infor­ma­tion

Want to know more?