Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

Get Quote

 
  

SFTP (SSH File Transfer Protocol, also known as Secure FTP) is a widely used method for securely transferring files over remote systems. Unlike the traditional FTP protocol, SFTP encrypts the data till it reaches your server, making it indecipherable during the process. SFTP transfers the file using the connection established between the client and the server by SSH protocol. SFTP has replaced FTP, a traditional file transfer protocol due to the security it provides.

How is SFTP secure?

Authentication is required to view the files, and this safeguards it from unauthorized access. Although SFTP doesn't require a multi-factor authentication, you have the option to enable the requirement of having both, a username and password, and SSH keys, for a highly secure connection.

The two ways an SFTP connection can be authenticated:
  • Basic authentication to connect to the SFTP server requires a username and password from the SFTP client user.
  • Then, for SSH authentication, SSH keys are used to authenticate SFTP connections in place of, or along with, a username and password. A pair of SSH private key and public key are necessary in this case.
  • Generate a public and private key pair on the SFTP client computer. Copy the public key onto the SFPT server.
  • With the help of your private key, PuTTY generates a signature when the server authenticates your connection to it.
  • The corresponding public key in the server can validate this signature and authenticate your connection.

Any attempt to hack the SFTP server proves to be futile since the hacker can get only one signature, which cannot be reused. They cannot get access to your private key or password, and hence they fail in the attack.

SFTP operates over SSH, making it essentially secure. The encryption cannot be triggered or turned off using AUTH commands like in FTPS and FTP protocols.

File server auditing with ADAudit Plus

File server auditing with ADAudit Plus

ADAudit Plus file server monitoring and auditing capabilities provides real-time activity reports. Administrators can centrally audit, monitor and view pre-configured reports and schedule reports on file servers, including SFTP.

To obtain File Server Reports,
  • Log in to the ADAudit Plus web console.
  • Click File Audit tab → File audit reports.
  • Select the report of your choice, and see information about file and folder creations, modifications, permission changes, and more.
In this report, you can obtain information such as:
  • What file or folder was modified?
  • When was it modified?
  • Who modified it?
  • Where (what server and which location) was the file modified?

About ADAudit Plus

ADAudit Plus is a real-time Active Directory auditing tool, that offers 200+ reports and email alerts. It is a useful tool to understand employee behavior with regards to IT, and thwart insider and outsider attacks. It is also a valuable solution for companies that need to adhere to compliance mandates.

Auditing files in a file server need not be complicated at all. Try ADAudit Plus for auditing all your files and folders

More related links

     

Native auditing becoming a little too much?

Try ADAudit Plus login monitoring tool to audit, track, and respond to malicious login and logoff actions instantaneously.

Try ADAudit Plus for free

 

ADAudit Plus Trusted By