File and Directory Monitoring, FIM, Ransomware Detection and Permissions Reporting

File and Directory Monitoring Software

Windows and Linux directory size monitoring, FIM, ransomware detection and permissions reporting

with Corner Bowl Server Manager

What is Corner Bowl Directory Monitor?

Corner Bowl Directory Monitor is an extensive enterprise-class software monitoring and management tool for IT professionals that includes disk monitoring, directory monitoring, file integrity monitoring (FIM), ransomware detection, largest files and directories reporting, file access permissions reporting, proactive directory and temporary file cleaner, centralized file collection and more. Directory Monitor will help you fulfill compliance requirements for CJIS, CMMC, JSIG, NIST, GDPR, HIPAA, PCI/DSS and SOX.

Disk Monitoring Video

Directory Size Monitoring and Reporting

  • Monitor directory sizes and change in directory sizes over time.
  • View historical directory size charts.
  • Interactively browse directory sizes and recursive delete sub-directories and files.
  • Real-Time directory size monitor alerts include a list of the top largest files that caused the monitor to trigger.
  • Summarize directory size information from all your servers to a single view.
More Information | Online Documentation

File Integrity Monitor (FIM)

Continuously monitor operating system, application and mission critical data files for user access, changes made to file content, attributes and access permissions on both Windows and Linux servers.

More Information | Online Documentation

Ransomware Detection

Using a combination of FIM, real-time Object Access Auditing, and real-time directory monitoring, get notified the instant a file is modified, deleted, renamed, moved and created in any monitored directory or sub-directory on both Windows and Linux servers.

More Information

Largest Files Reports

  • Run system wide largest files reports to see what files are consuming the most space.
  • Configure the number of files and metadata columns to include in the report.
  • Includes group and sort by options.
Online Documentation

File and Directory Access Permissions Reports

  • Recursively scan and report on all file and directory permissions.
  • Configure search criteria including specific accounts and permissions.
  • Define simple and detailed output rules.
Online Documentation

Duplicate Files Report

  • Run system wide duplicate files reports to see what files can be deleted to free disk space.
  • Define duplicate files using the following match options: Name, Size, Last Modified and Contents Hash.
  • Includes group and sort by options.
Online Documentation

File Activity Reports

  • Run system wide file activity reports to list files by most recently accessed or not accessed since a specific date, for example, receive a report that lists the top ten recently accessed files within a directory structure.
  • Includes group and sort by options.
Online Documentation

Directory Cleaner

  • Automatically delete old database backups and log files on Windows and Linux servers.
  • Schedule system and user temporary files to be deleted once a day.
Online Documentation

File and Directory Change Monitor

  • Real-time monitor files and directories for created, modified, deleted and renamed events.
  • Target results to a specific set of files using inclusion and exclusion search criteria, for example, log all changes to files with a .txt extension while excluding files named *_output.txt.
  • Append results to a CSV file and send email notification alerts.
Online Documentation

File Collection and Retention

  • Continually backup files to a central location, for example, database backups and IIS log files.
  • Deleted previously backed up files after they reach a certain age, for example 2 years.
  • Start and restart services to unlock files.
More Information | Online Documentation

File Count Monitor

  • Monitor the number of files in a directory.
  • Automatically run PowerShell Scripts to perform corrective actions, for example, shut down a service, delete unnecessary files then restart the previously shutdown service.
Online Documentation

How does Corner Bowl do it?

Depending on your requirements, Corner Bowl utilizes several different technologies to scan managed hosts:

  • You can optionally use our Windows client-side Agent to bypass Windows Security and instead use our proprietary FIPS compliant TLS 1.2 application layer protocols to scan and manage machines faster and more reliably than native technologies such as remote WMI. When utilized, our software does not require administrator log on as access credentials nor are logon events generated on domain controllers minimizing our software's footprint on your network.
  • Otherwise, Windows servers are managed using a combination of remote WMI and Windows Shares (SMB).
  • Linux servers are managed using a combination of SSH Shell, SFTP/SSH, FTP/S and SMB (Windows Shares).

Video Tutorials


Reviews and Awards

GetApp Log Management Category Leaders

Log Management

GetApp Log Management Category Leaders

Network Monitoring

GetApp Log Management Category Leaders

Website Monitoring

Last Updated: March 21st, 2024