What is a one sentence summary of your feature request?
An option to enable symbolic link activity tracking on source sytem.
Please describe your idea in detail. What is your problem, why do you feel this idea is the best solution, etc.
Currently Windows agents do not track Symbolic Link activity on the source, however activity is tracked with an agent on the target system. This causes an issue with targets on storage platforms not supported by Netwrix Access Analyzer. A customizable option for the filter would enable more customers to track these activities, where they may believe this activity is currently tracked.
How do you currently solve the challenges you have by not having this feature?
Look to partner supported platforms which support Netwrix Access Analyzer. Currently unable to implement.
1 Like
Hi Ross,
Welcome to the Netwrix Community! We appreciate you taking the time to share this feature request.
Support for symbolic link operations is already in progress. We’ve implemented it for NetApp and Nasuni devices, and plan to expand support further. Many storage platforms don’t expose symlink activity at all, but support for Windows Servers is definitely on our roadmap.
Your suggestion to capture symlink activity on the source system is indeed very valuable. It would provide flexibility in diverse environments where monitoring of the target system isn’t possible for one reason or another. We will definitely consider this use case as we move forward with implementing symlink support for Windows.
Thanks again for joining the conversation and sharing your use case - we truly appreciate the time and insight you’ve contributed.
1 Like