Learn about Change Auditor for Active Directory
Change Auditor for Active Directory helps ensure the security, compliance and control of AD and Azure AD. The solution proactively protects objects and tracks all changes in real time with complete visibility. Easily detect insider attacks and accidental changes with reports, alerts and visibility into events and actions without the complexity of native tools.
Audit Active Directory and Azure AD environments. Change Auditor provides a single, correlated view of activity across hybrid AD environments, ensuring visibility of all changes taking place in your environment whether on-premises or in the cloud.
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Track user and administrator activity with detailed information including who, what, when, where, which workstation and why for change events, plus original and current values for all changes.
Send critical change and pattern alerts to email and mobile devices to prompt immediate action, enabling you to respond faster to threats even while you're not on site.
Capture the originating IP address/workstation name for account lockout events to simplify troubleshooting.
Protect against changes to the most critical Active Directory objects, such as accidentally deleted OUs and modified GPO settings.
Remove auditing limitations and captures change information without the need for native audit logs, resulting in faster results and significant savings of storage resources.
Generate comprehensive reports for best practices and regulatory compliance mandates for SOX, PCI-DSS, HIPAA, FISMA, GLBA and more.
Configure access so auditors can run searches and reports without making any configuration changes to the application, and without requiring the assistance and time of the administrator.
View, highlight and filter change events and discover their relation to other security events in chronological order across your AD and Azure AD environment for better forensic analysis and security incident response.
Provide instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.
Restore previous values on unauthorized, mistaken or improper changes with the click of a button, directly in the Change Auditor console, honoring the rights and privileges of the user requesting the rollback.
Search from anywhere using a web browser and creates targeted dashboard reports to provide upper management and auditors with access to the information they need without having to understand architecture or administration.
For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.
The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.
Quad core Intel® Core™ i7 equivalent or better
Minimum:8 GB RAM or better
Recommended: 32 GB RAM or better
SQL databases supported up to the following versions:
NOTE:Change Auditor does not support SQL high availability technology other than clusters.
Installation platforms (x64) supported up to the following versions:
NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)
For the best performance, we strongly recommend:
NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.
In addition, the following software/configuration is required:
Whether accidental or malicious, insider threats are pernicious by nature. Organizations will continue balancing the need to let their system administrators perform tasks with some autonomy against the need to grant only the privileges required for those
On-demand Webcast: Anatomy of an Insider Threat — Protecting Active Directory Is Key; Recorded on 9/03/2015
You have to plan for breaches and misuse as well as ways to limit the impact of external and internal threats when privileged accounts are concerned. There are many different ways privileged authority can be obtained, so it’s critical to always be vigilan
Explore key provisions of the European General Data Protection Regulation and best practices for ensuring compliance before the mandate takes effect.
In this insightful e-book, you’ll get a survival guide for tackling the processes involved in planning, migrating to and managing your new Office 365 environment.
In this white paper, discover why an Active Directory and Exchange migration following a healthcare merger or acquisition can be easier than ever with the right planning, strategy and tools in place.
Read this white paper to learn about the Windows Server 2016 new features, key considerations for optimizing your Active Directory, and how Quest can help you prepare for the move, migrate efficiently and manage your new environment effectively.
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.
Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.