Where Did My Folder Go?
Overview
The Where Did My Folder Go? feature helps identify folders and files that were moved, renamed, or deleted due to user actions on NAS shares. These actions can cause data to appear missing and commonly result in support requests to locate affected content.
This feature provides audit visibility into file system activity, allowing support teams to quickly determine when a change occurred, who performed the action, and where the data was moved or deleted.
Earlier versions of this feature focused on directory movement tracking. Directory delete events are also tracked, and file rename and delete events are supported, along with additional controls to narrow the search time range.
Role-based access control includes a read-only role that can be assigned to help desk users, enabling them to investigate file and folder activity without requiring administrative privileges.
Limitations
Search result limit
Searches return up to 5,000 results by default.
This limit is intentional and helps improve search performance when working with large datasets.
If the user interface displays Results 5000 (Limit 5000), increase the result limit and run the search again.
To increase the limit:
- Connect to the Eyeglass virtual machine as the admin user.
- Run the following command:
igls easyauditor folderquerylimit set --limit=10000
Copy to clipboard limit
The Copy to Clipboard feature is validated for up to 5,000 entries. When more than 5,000 results are returned, not all rows may be copied.
To ensure complete results are copied:
- Narrow the search time range, or
- Specify a path closer to the expected folder or file location.
Use Cases
This feature is commonly used in the following scenarios:
- A user drags and drops a folder on a share
- A directory is renamed
- A directory is deleted
- A file is renamed
- A file is deleted
This feature does not capture drag-and-drop operations between SMB shares, as these actions are treated as copy events rather than move operations.
Cut-and-paste operations on SMB shares (including between shares) are also not captured, as they generate create and delete events.
To identify these actions, use queries and reports to search for file create and delete activity.