Documentation forAccess Rights Manager

Enable alerts for suspected data theft (file server)

Background / Value

To efficiently capture security incidents, ARM focuses on user-initiated file server events. If these occur in unusually high numbers and additionally in a short period of time, ARM proactively informs all those responsible.

Data theft: A user account reads an unusually large number of files in a short period of time.


Related features

Enable alerts for file server directories

Enable alerts for data deletion (file server)

Enable alerts for suspected cases on ransomware (file server)

Manage alerts


Step-by-step process

  1. Choose Resources.
  2. Expand File server.
  3. Already configured alerts are displayed with a bell symbol.
  4. Right-click on a resource and select Create alert in the context menu to create a new alert.
  5. Right-click a resource and select Manage alerts in the context menu to customize or delete existing alerts.


  1. Give the alert configuration a name.
  2. Click Event.
  3. Define which events trigger an alert. In case of suspected data theft typical: File read.
  4. Optional: Click Blacklist user.


Optional: Use the blacklist to define which users do not trigger an alert.

Each alert configuration has its own blacklist configuration.

You can only add users, not groups.

  1. Use the search function to find the users you want.
  2. Use double-click or drag-and-drop to add users to the blacklist.
  3. Use the DEL key to remove users from the blacklist.
  4. Click Apply to save the changes.


Optional: Select Blacklist directories.


Optional: Use the blacklist to define which directories are not monitored.

  1. Use the filter function to find the desired directories. When you filter, the tree view changes to a result list of the directory paths.
  2. Use double-click or drag-and-drop to add directories to the blacklist.
  3. Use the DEL key to remove directories from the blacklist.
  4. Enable or disable monitoring of subdirectories.
  5. Click Apply to save the changes.


C015-02 EN Alarm für Veradcht auf Datendiebstahl

  1. Select Threshold.
  2. Enable threshold.
  3. Activate the option. If data theft is suspected, typically all events are triggered by a single user.
  4. Define how many events within a period trigger the alert.


  1. Choose Actions. Here you specify which actions are executed when an alert is triggered. You must activate at least one action (arrows).
  2. Activate the option if an email should be sent in case of an alert.

The content of the emails can be customized. This is analogous to the recertification emails.

  1. The alert is written to the Windows Event Log. The categorization is used.
  2. Enable the execution of a script. To activate this option, a script configuration  for alerts must be stored.


Choose a category. This is used when writing to the Windows Event Log and for the email subject.

This option is especially useful if you are using a SIEM system.


  1. You must specify a reason for the alert configuration in order to save it.
  2. Click Apply.