SearchInform FileAuditor Introduces Temporary File Access Management
12.09.2025

New feature enables employees to request time-limited access to restricted files directly from their workstation – with each request automatically routed to the Information Security team for review and approval.

SearchInform has expanded the functionality of its DCAP (Data-Centric Audit and Protection) system FileAuditor with a new capability for temporary file access management. The update addresses the frequent business need to grant employees short-term access to sensitive documents for specific tasks, without modifying existing security policies. This approach simplifies workflows for both end users and information security teams.

When an employee attempts to open a restricted file and access is blocked, the FileAuditor notification interface on their PC now allows them to create and send a request for temporary access. The request details must include access duration and justification, for example, to complete a manager’s assignment. The information security specialist sees the request in the DCAP console where they can review the details, adjust the requested timeframe, if necessary, and either approve or deny access with one click.

This streamlined process benefits both sides: employees gain the necessary data more quickly, while security teams reduce administrative overhead. At the same time, full security control remains in place. FileAuditor continues to monitor file system activity in real time, detecting any misuse of granted privileges, for example, if an employee makes unauthorized edits or deletes a document. In such cases, the system allows file recovery from shadow copies stored in the FileAuditor storage.

“The main advantage of this solution lies in its flexibility,” said Sergio Bertoni, SearchInform Lead Analyst.

“Rigid, static restrictions can slow down business processes. That’s why we offer time-limited access to a specific file without removing other workplace controls. FileAuditor continues to monitor all operations across all documents. When the security team responds to a user request, rights are granted in a targeted mannerwithout rewriting standard policies. As soon as the access period expires, protection resumes automatically. This controlled, manageable approach delivers real value to business operations,” he explained.

The update enhances FileAuditor toolset for managing access to confidential data. Core security policies are enforced through classification-based access controls, which restrict entire categories of sensitive data (such as personal data, contracts, or trade secrets) across selected applications. In addition, administrators can define fine-grained permissions for specific files and folders within the file system. The combined use of these features allows organizations to strike a balance between broad data protection and flexible, individualized access – including temporary access when required.


ABOUT SEARCHINFORM

SearchInform is an information security and risk management product vendor as well as an MSS provider. The company's clients are more than 4000 companies in 20+ countries. Today, the team has products and services for comprehensive protection against insider threats at all levels of corporate information systems: FileAuditor (the DCAP class solution); DLP system with extended functionality; Risk Monitor (advanced platform for internal threat mitigation); SIEM system, IS outsourcing service.


Letter Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyber incidents.