By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Is there a way for me to set my system up to log or identify who and what time someone is tampering with my system when I'm not around?
You need to set up auditing. Auditing can be configured to record logon success and failure, privilege use, file and object access and more. Events are recorded in the security event log. You will need administrative privileges to do so. Audit for a local computer is configured from the Administrative Tools, Local Security, Policy Security Settings, Local Policy, Audit Policy. Audit for specific files and folder access is configured from the security tab of the specific file or folder. Here is a good reference