0

it's the funkiest thing. Windows 7 workstation. Peer to peer network. As administrator, I change the file attributes from read only, only to look at it an hour and it has changed back. When I go into properties and look at security, an unidentified user is there and then vanishes. I use Trend Micro Titanium and it hasn't detected any trojan horses. I have data that users are constantly changing in that folder and it is time consuming to repeatedly change attributes just to have them change back.

1 Answers1

0

Set auditing on an object, then see who makes the changes in the "Security" event log.

ivan_pozdeev
  • 1,897
  • 18
  • 34