Skip to main content

Account Exclusions Tab

The Account Exclusions tab on an output Properties window is where monitoring scope by account name can be modified. These settings are initially configured when the output is added.

Select an output from the Monitored Hosts tab and click Edit to open the output Properties window. The tab varies based on the type of host selected.

For Exchange Online Hosts

The tab contains the following settings:

Account Exclusions tab for Exchange Online

  • Add Windows Account – Opens the Specify account or group window to add an account for exclusion. See the Specify Account or Group Window topic for additional information.

  • Add Unix Account – Opens the Specify Unix Account window to add an account for exclusion. See the Specify Unix Account Window topic for additional information.

  • Remove – Removes the selected account from exclusion. Confirmation is not requested.

    CAUTION: If an account is removed by accident, use the Cancel button to discard the change.

  • Process group membership when filtering – Indicates if group memberships is processed when filtering accounts

The table lists accounts that are being excluded from monitoring, displaying columns for Account Name and Account Type. By default, no accounts are being excluded.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

For Linux Hosts

The tab contains the following settings:

linux

  • Add Windows Account – Opens the Specify account or group window to add an account for exclusion. See the Specify Account or Group Window topic for additional information.

  • Add Unix Account – Opens the Specify Unix Account window to add an account for exclusion. See the Specify Unix Account Window topic for additional information.

  • Remove – Removes the selected account from exclusion. Confirmation is not requested.

    CAUTION: If an account is removed by accident, use the Cancel button to discard the change.

  • Process group membership when filtering – Indicates if group memberships is processed when filtering accounts

The table lists accounts that are being excluded from monitoring, displaying columns for Account Name and Account Type. By default, no accounts are being excluded.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

For NAS Device Hosts

The tab contains the following settings:

Account Exclusions tab for NAS Hosts

  • Add Windows Account – Opens the Specify account or group window to add an account for exclusion. See the Specify Account or Group Window topic for additional information.

  • Add Unix Account – Opens the Specify Unix Account window to add an account for exclusion. See the Specify Unix Account Window topic for additional information.

  • Remove – Removes the selected account from exclusion. Confirmation is not requested.

    CAUTION: If an account is removed by accident, use the Cancel button to discard the change.

  • Process group membership when filtering – Indicates if group memberships is processed when filtering accounts

The table lists accounts that are being excluded from monitoring, displaying columns for Account Name and Account Type. By default, no accounts are being excluded.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

For SharePoint Hosts

The tab contains the following settings:

Account Exclusions tab for SharePoint hosts

  • Add Windows Account – Opens the Specify account or group window to add an account for exclusion. See the Specify Account or Group Window topic for additional information.

  • Add SharePoint Account – Opens the Specify account window to add an account for exclusion. See the Specify Account Window topic for additional information.

  • Remove – Removes the selected account from exclusion. Confirmation is not requested.

    CAUTION: If an account is removed by accident, use the Cancel button to discard the change.

  • Process group membership when filtering – Indicates if group memberships is processed when filtering accounts

The table lists accounts that are being excluded from monitoring, displaying columns for Account Name and Account Type. By default, no accounts are being excluded.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

For SQL Server Hosts

The tab contains the following settings:

sqlhosts

  • Add Sql User – Opens the Specify Sql User name window to add an account for exclusion. See the Specify Sql User Name Window topic for additional information.

  • Remove – Removes the selected account from exclusion. Confirmation is not requested.

    CAUTION: If an account is removed by accident, use the Cancel button to discard the change.

  • Process group membership when filtering – Indicates if group memberships is processed when filtering accounts

The table lists accounts that are being excluded from monitoring, displaying columns for Account Name and Account Type. By default, no accounts are being excluded.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

For Windows File Server Hosts

The tab contains the following settings:

Account Exlcusions tab for Windows Hosts

  • Add Windows Account – Opens the Specify account or group window to add an account for exclusion. See the Specify Account or Group Window topic for additional information.

  • Remove – Removes the selected account from exclusion. Confirmation is not requested.

    CAUTION: If an account is removed by accident, use the Cancel button to discard the change.

  • Process group membership when filtering – Indicates if group memberships is processed when filtering accounts

The table lists accounts that are being excluded from monitoring, displaying columns for Account Name and Account Type. By default, the Windows File Server monitoring is excluding the following accounts:

  • NT Authority\IUSR
  • NT Authority\SYSTEM
  • NT Authority\LOCAL SERVICE
  • NT Authority\NETWORK SERVICE

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

GID Exclusions Tab

The GID Exclusions tab on an output Properties window is where monitoring scope by group can be modified. These settings are initially configured when the output is added.

Select an output for a Linux host on the Monitored Hosts tab and click Edit to open the output Properties window.

gidexclusionstab

The tab contains the following settings:

  • Add – Opens the Add or Edit GID window to add a group for exclusion. See the Add or Edit GID Window topic for additional information.

  • Remove – Removes the selected group from exclusion. Confirmation is not requested.

    CAUTION: If an account is removed by group, use the Cancel button to discard the change.

  • Edit – Opens the Add or Edit GID window to edit a selected group for exclusion. See the Add or Edit GID Window topic for additional information.

The table lists groups that are being excluded from monitoring, displayed in the GID column. By default, no groups are being excluded.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

Path Filtering Tab

The Path Filtering tab on an output Properties window is where monitoring scope by file paths can be modified. Specified paths can be included in or excluded. These settings are initially configured when the output is added.

Select an output from the Monitored Hosts tab and click Edit to open the output Properties window. The tab varies based on the type of host selected.

For Linux Hosts

The tab contains the following settings and features:

pathfilteringtab

  • Add – Opens the Add or Edit Path window to add a new path to the list. See the Add or Edit Path Window topic for additional information.

  • Remove – Removes the selected path from the list. Confirmation is not requested.

    CAUTION: If a path is removed by accident, use the Cancel button to discard the change.

  • Move Up / Move Down – Since path filters are evaluated in the order specified by the table, these buttons move the selected path up or down in the list

  • Edit – Opens the Add or Edit Path window to modify the selected path. See the Add or Edit Path Window topic for additional information.

  • Type a path below to test whether it will be included or excluded – Enter a path in the textbox to test whether it will be included/excluded based on the path filtering list

    • Result – Under the text box, a description of whether the indicated path is included or excluded will appear, as well as a reason for why the indicated path is included or excluded. Additionally, the path in the list that is applied to the test will be highlight ed: green highlight for an included path and red highlight for an excluded path.
  • Exclude extensions – Displays a space separated list of file extensions that are excluded

  • Exclude streams – Displays a space separated list of streams that are excluded

The table lists paths that are being filtered, displaying columns for Type, indicating if it is being Included or Excluded, and Pattern. The order of the list determines what paths are included and what paths are excluded.

CAUTION: Exclude takes precedence over the Include. For example, if the C:\OpenShare is excluded, but the C:\OpenShare\Edward is included, the ‘OpenShare’ parent exclusion takes precedence, and the ‘Edward’ child folder will not be monitored.

NOTE: If ‘Include’ is not listed under the Filter Type column (or no Include filter paths are added), then all current and new discovered drives will be monitored.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

For NAS Device Hosts

The tab contains the following settings and features:

Host Properties - Path Filtering Tab

  • Add – Opens the Add or Edit Path window to add a new path to the list. See the Add or Edit Path Window topic for additional information.

  • Remove – Removes the selected path from the list. Confirmation is not requested.

    CAUTION: If a path is removed by accident, use the Cancel button to discard the change.

  • Move Up / Move Down – Since path filters are evaluated in the order specified by the table, these buttons move the selected path up or down in the list

  • Edit – Opens the Add or Edit Path window to modify the selected path. See the Add or Edit Path Window topic for additional information.

  • Type a path below to test whether it will be included or excluded – Enter a path in the textbox to test whether it will be included/excluded based on the path filtering list

    • Result – Under the text box, a description of whether the indicated path is included or excluded will appear, as well as a reason for why the indicated path is included or excluded. Additionally, the path in the list that is applied to the test will be highlight ed: green highlight for an included path and red highlight for an excluded path.
  • Exclude extensions – Displays a space separated list of file extensions that are excluded

  • Exclude streams – Displays a space separated list of streams that are excluded

The table lists paths that are being filtered, displaying columns for Type, indicating if it is being Included or Excluded, and Pattern. The order of the list determines what paths are included and what paths are excluded.

CAUTION: Exclude takes precedence over the Include. For example, if the C:\OpenShare is excluded, but the C:\OpenShare\Edward is included, the ‘OpenShare’ parent exclusion takes precedence, and the ‘Edward’ child folder will not be monitored.

NOTE: If ‘Include’ is not listed under the Filter Type column (or no Include filter paths are added), then all current and new discovered drives will be monitored.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

For SharePoint Hosts

For a SharePoint host, the Path Filtering tab is for including and excluding sites. The tab contains the following settings and features:

Path Filtering Tab for SharePoint Hosts

  • To audit all sites, leave the textbox blank
  • To include a specific site, enter the URL
  • To exclude a specific site, enter the URL but add a minus sign (-) as a prefix to the URL, for example:

-http://sharepoint.local/sites/marketing

Use a semicolon (;) to separate multiple URLs.

For Windows File Server Hosts

The tab contains the following settings and features:

  • Add – Opens the Add or Edit Path window to add a new path to the list. See the Add or Edit Path Window topic for additional information.

  • Remove – Removes the selected path from the list. Confirmation is not requested.

    CAUTION: If a path is removed by accident, use the Cancel button to discard the change.

  • Move Up / Move Down – Since path filters are evaluated in the order specified by the table, these buttons move the selected path up or down in the list

  • Edit – Opens the Add or Edit Path window to modify the selected path. See the Add or Edit Path Window topic for additional information.

  • Add all local drives – Retrieves and adds all local drives to the bottom of the list with a type of Include

  • Type a path below to test whether it will be included or excluded – Enter a path in the textbox to test whether it will be included/excluded based on the path filtering list

    • Result – Under the text box, a description of whether the indicated path is included or excluded will appear, as well as a reason for why the indicated path is included or excluded. Additionally, the path in the list that is applied to the test will be highlight ed: green highlight for an included path and red highlight for an excluded path.
  • Exclude extensions – Displays a space separated list of file extensions that are excluded

  • Exclude streams – Displays a space separated list of streams that are excluded

The table lists paths that are being filtered, displaying columns for Type, indicating if it is being Included or Excluded, and Pattern. The order of the list determines what paths are included and what paths are excluded.

CAUTION: Exclude takes precedence over the Include. For example, if the C:\OpenShare is excluded, but the C:\OpenShare\Edward is included, the ‘OpenShare’ parent exclusion takes precedence, and the ‘Edward’ child folder will not be monitored.

NOTE: If ‘Include’ is not listed under the Filter Type column (or no Include filter paths are added), then all current and new discovered drives will be monitored.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

Process Exclusions Tab

The Process Exclusions tab on an output Properties window is where monitoring scope by Windows processes can be modified. These settings are initially configured when the output is added.

NOTE: Netwrix product processes are excluded by default from activity monitoring.

Select an output for a Windows file server host on the Monitored Hosts tab and click Edit to open the output Properties window.

Process Exclusions Tab

The tab contains the following settings and features:

  • Add – Opens the Add or Edit Process window to add a new process to the list. See the Add or Edit Process Window topic for additional information.

  • Remove – Removes the selected path from the list. Confirmation is not requested.

    CAUTION: If a process is removed by accident, use the Cancel button to discard the change.

  • Edit – Opens the Add or Edit Process window to modify the selected process. See the Add or Edit Process Window topic for additional information.

The table lists process that will be excluded, displaying columns for Process Name and Events.

Click OK to commit the modifications. Click Cancel to discard the modifications. The output Properties window closes.

Suppress Windows Explorer Activity

Not all file operations are deliberate. Operating systems and third-party software have the capability to execute operations on files without explicit user action. While this functionality can improve user experience, it also presents a challenge to IT teams as it generates a record of actions that have not been explicitly triggered by users.

One of the most prominent examples is the Windows File Explorer - the standard application for file system browsing on the Windows family of operating systems. Over the years, File Explorer has had a number of improvements and new features. File Explorer displays various information about files to provide a better user experience. This allows users to view file content without having to open them.

File Explorer displays icons for certain file types like executable (.exe) files. Depending on the View mode, it can display thumbnails of various file formats and meta-data with things like author, number of pages, image dimensions, etc. Hovering a mouse cursor over a file also provides detailed information about a file in a tool tip. When working with sub-folders, File Explorer may display a thumbnail of the files contained within the sub-folder on top of the sub-folder icon. This additional functionality is executed automatically, mostly without the user's explicit action or intention.

As an example, a user may wish to open the MySampleReport.docx document located in the MyTestDepartment folder. The user opens the folder, locates the file and double-clicks to open it. From the user's perspective, only two actions were performed:

  1. Open MyTestMyDepartment folder.
  2. Open MySampleReport.docx.

However, File Explorer performs a number of additional operations on behalf of the user:

  • It reads and displays icons for certain files types in MyTestMyDepartment folder.
  • It reads the meta-data of the files or sub-folders under the mouse cursor while the user is locating the document.
  • It reads the meta-data and preview if the user accidentally selects an incorrect file.
  • It lists the content of all sub-folders and generates thumbnails to be displayed on top of the sub-folder icon.
  • It may create or update Thumbs.db file - a cache of thumbnail images.

None of these additional file operations, which can be called Preview Reads, are explicitly initiated by the user. However, the audit log records all of them as originating from the user.

Preview Reads and similar unintentional automatic operations pose a significant challenge for IT teams and IT auditing software. At the file system level, preview reads are perceived as normal read operations, like file copying or opening a file in an application. There exists no distinguishing factor between explicit user activity and implicit actions by File Explorer. Whether it is a preview read, opening the file in Notepad, or copying the file, all these operations are perceived as the same Read operation at the file system level. Therefore, it is not possible to reliably filter unintentional activity without the risk of suppressing genuine user actions.

The Activity Monitor employs various techniques to minimize noise. These methods all rely on identifying patterns in the sequence of events. However, their effectiveness is severely limited, as research has shown that clear patterns of preview reads activity in File Explorer are lacking. For the Windows Server, the effectiveness is slightly higher since theActivity Monitor's file system driver can observe all the low-level details about operations.

The product provides the following filtering options to reduce File Explorer preview reads:

  • Suppress reporting of File Explorer’s excessive directory traversal activity - This option aims to identify and suppress preview reads of sub-folders that occur immediately after the parent folder is opened.
  • Suppress reporting of File Explorer’s excessive file read activity - This option attempts to identify and suppress preview reads of files that occur immediately after the parent folder is opened.

Both filtering options prioritize the accuracy of audit data over noise reduction. In other words, they will report a noise event rather than suppress a genuine user action.

Add or Edit GID Window

The Add or Edit GID window is opened from a field where a Linux group is needed.

addoreditgidwindow

Type the GID for the desired group in the textbox. Then click OK. The Add or Edit GID window closes, and the group is added to the field where the window was opened.

Add or Edit Path Window

The Add or Edit Path window is opened from the Path Filtering tab of a monitored host's output Properties window.

addoreditpath

  • Specify a path to filter during collection – Enter a file path in the textbox or use the ellipsis (…) to browse for a folder
  • Filter Type – Indicates if the filter will be Included or Excluded

Then click OK. The Add or Edit Path window closes, and the path is added to the filtering list for the monitored host.

Special Consideration for NAS Device Hosts

For NAS devices, the activity agent can configured to add ‘C:\’ to the beginning of the path, which is a requirement for the output that is designated for StealthAUDIT.exe or being read by a Netwrix Threat Prevention agent. That configuration is on the Log Files Tab. If the option is enabled for this monitored device, start your paths with C:.

Wildcard

Wildcard filtering can be configured using the following wildcard characters:

WildcardDefinition
*matches zero or more characters (except for "" or "/")
?matches any single character (except for "" or "/")
**matches zero or more characters (useful for directory trees)

Add or Edit Process Window

The Add or Edit Process window is opened from the Process Exclusions tab of a monitored host's output Properties window.

Add or Edit Process popup window

  • Process name – Displays the name of the process to be excluded. You can enter a process name in the textbox or select a process from the Running processes list.
  • Filter – Indicates if the filter will be for All events or only Read events
  • Running Processes – Lists all processes currently running on the host

Then click OK. The Add or Edit Path window closes, and the path is added to the filtering list for the monitored host.

Specify Account Window

The Specify account window is opened from a field where a SharePoint account is needed.

Specify Account popup window

There are two options for specifying an account:

  • SharePoint System Accounts – Check the boxes for the desired system accounts: SHAREPOINT\system, -1, S-1-0-0 (Null SID)

  • Custom – Enter the account in the textbox. Multiple accounts can be added using a semicolon (;).

    • For System Service Accounts – Enter the SID for system service accounts
    • For Local User Accounts – Enter either the user name or SID for the local account

Click OK. The Specify account window closes, and the account is added to the field where the window was opened.

Specify Sql User Name Window

The Specify Sql User name window is opened from a field where a SQL Server account is needed.

specifysqlusernamewindow

Enter the SQL Server user name into the text box. Multiple user names can be added using a semicolon (;), a comma (,), or a space. Then click OK. The Specify Sql User name window closes, and the account is added to the field where the window was opened.

Specify Unix Account Window

The Specify Unix Account or group window is opened from a field where a Unix account is needed.

Specify Unix Account popup window

Type the UID for the desired account in the textbox. Multiple UIDs can be added using a semicolon (;), a comma (,), or a space. Then click OK. The Specify Unix Account window closes, and the account is added to the field where the window was opened.

Specify Account or Group Window

The Specify account or group window is opened from a field where a Windows account is needed.

Specify Account or Group popup window

Follow the steps to use this window.

Step 1 – Select the Domain from the drop-down menu.

Step 2 – Enter the Account in the textbox.

  • Accounts can be entered in NTAccount format, UPN format, or SID format.
  • Use the ellipsis (…) button to open the Select Users, Computers, Service Accounts, or Groups window to browse for an account.

Step 3 – Then click Resolve. A message displays indicating whether or not the account could be resolved.

Step 4 – If successful, click OK.

The Specify account or group window closes, and the account is added to the field where the window was opened.