Monitoring and blocking user actions

Audits user operations with the file system. The IT security department is always aware of up-to-date information about the “life” of a file (creation, editing, transfer, deletion, etc.). Blocks access to the file and its transfer in any application.