USB2Log

USB2Log

A powerful tool for monitoring and logging file operations to USB Mass Storage devices. Prevent data leakage and maintain a secure audit trail of USB usage across your Windows systems.

Key Features:

  • Comprehensive logging of USB events
  • Each file operation is attributable to a specific user
  • Real-time collection and stealth mode by default
  • Encrypted log data
  • Built-in integrity checks
  • Export log data to CSV, TSV or JSON
  • Ideal for compliance and internal investigations

Price: €49.00 / month (Business license)

A license may be installed on any number of computers within the organization. Only one license is required per corporate registration number; however, a subsidiary must obtain its own license.

If you want to decrypt your log data by yourself, you will need the Decryption Tool below. Please, read the FAQ before you decide if you need this.

Price: €199.00 / year


Product Details

USB2Log provides essential visibility into USB device usage on your Windows computers. In an era where data security is paramount, controlling and monitoring portable storage devices is crucial. USB2Log silently records all USB insertions and removals, capturing vital information such as device name, serial number, username, file copy operations and timestamps.

This software is indispensable for businesses needing to comply with data protection regulations, prevent unauthorized data transfers and conduct forensic investigations. Its lightweight design ensures minimal impact on system performance, while its robust logging capabilities offer peace of mind. Configure alerts, export logs for detailed analysis, and enhance your organization's security posture with USB2Log.

FAQ

USB2Log is a Microsoft Windows background service that monitors how a USB flash drive or external USB hard drive is used while connected to a computer. A key feature is that it logs which digital files are copied to external USB storage devices.

People leaving their employment and consultants leaving their clients often make copies of information that they have produced together with other "good to keep" information, e.g., financial reports, spreadsheets, customer databases, internal templates, source code/scripts, drawings, copyright protected images, network design, etc. An easy way of making copies is by copying the digital information to a USB storage device. By doing so, the security mechanisms of the computer network will not react.

From experience based on more than 800 digital forensics investigations, we would like to share some important facts concerning a common problem within the field of civil law / labor law / intellectual property law.

As digital forensics specialists, we often see extra activities concerning the use of new USB storage devices just before an individual is leaving. From a digital forensics view, it is very hard (in most cases impossible) to tell exactly how many files that have been copied to a USB device. Especially if a folder including files and other sub-folders are copied. Microsoft Windows does not include this information in any kind of log file. In 90% of all cases, we can only confirm technical proof of file copy activities and NOT tell exactly what have been copied.

By having USB2Log installed, you will get all the digital facts you need.

The software runs as a Windows background service. There are no specific hardware requirements, as it has minimal impact on system performance. Installation must be performed from an account with administrative privileges.

Not at this time. However, feel free to contact us if you're interested—your feedback helps us prioritize future development.

The license includes three export/decryption jobs per month. Then, you send the USB2Log database file to Dingard for decryption. We will return a human-readable report in CSV, TSV, or JSON format. Additional decryptions are billed separately.

If you deside to purchase the Decryption Tool, your organization can perform unlimited decryption jobs internally and export the data to CSV, TSV, or JSON by yourself at no extra cost.

USB2Log includes a built-in integrity check to detect any manipulation of the log data. All logs are protected using strong modern encryption based on asymmetric key technology. By default, only Dingard holds the capability to decrypt the log data. This provides an additional layer of data integrity protection while also safeguarding the individual under investigation, which is a legal requirement in certain countries.

If you buy the Decryption Tool, you'll be able to decrypt the log data yourself.