You can enable auditing of object access and then audit specific
folders/files, however that will only tell you who accessed a file since
copy is a two part operation - read, and then write to somewhere. Auditing
of object access will also generate a tremendous amount of entires in the
security log. --- Steve