Start a Conversation

Unsolved

This post is more than 5 years old

H

2843

April 28th, 2016 21:00

Dell Server HIPAA Audit Report - looking for Third-Party Software is necessary

suestion for the Forum. Is there an easy way to generate user and application logs of all PCs accessed in the network, time, data, etc to log when client PCS or laptops login our EMR server?

Any ideas on good third-party auditing software? We know if we select too many variables, instead of access times and unique users the server will generate hundreds of unusable log files. We want a simple and easy to read report we can provide to our client monthly.

Thanks in advance.

Dave Willis   

Note: HIPAA audits require access logs to be readily available.

Dave Willis

Select Tech MD.
www.selecttechmd.com

156 Posts

May 15th, 2016 15:00

Dave, 

Thank you very much for being the first user to post on our forums! Monitoring various access points and pulling data is a pretty common request that we see come through Dell. There are various options available to identify when a specific resource is accessed from another PC. We can leverage Microsoft's built-in access controls for Windows-based PCs to determine when another system is accessed, and then trigger specific events based on the resulting group policy objects. These are described further here:

technet.microsoft.com/.../bb457115.aspx

Dell does have an application that can be managed through SCCM, or our own Open Manage Essentials suite, called Dell Command | Monitor. The Dell Command suite contains multiple tools to help understand what client machines are accessing and the health of the client devices. This may be what you are looking for to help understand the interactions between your client PCs/Laptops and your EMR software. 

en.community.dell.com/.../7431.dell-client-command-suite

As you mentioned, there is quite a bit of a dance involved. Hopefully these, along with other systems management applications, like SolarWinds, may help you find the perfect balance of what is needed to understand the nature of what is accessed, and understand who is gaining access to this information and why. I hope this helps!

-Dale

No Events found!

Top