Detect and alert on common Kerberos authentication vulnerabilities used during Golden Ticket / Pass-the-ticket attacks.
Detect applications that are still using less secure NTLM authentications.
Audit Active Directory account logons, from logon to logoff and all actions in between (when combined with other Change Auditor modules).
View all AD logons/logoffs, Azure AD sign-ins and Office 365 activity together in On Demand Audit with flexible search and rich visualization.
From upfront vulnerability assessment, to intrusion detection and monitoring of compromised accounts, Change Auditor has you covered at every step.
Integrate with SIEM solutions to forward Change Auditor events to Sentinel, Splunk, ArcSight, QRadar or any platform supporting Syslog.
Generate comprehensive reports to support regulatory compliance mandates for GDPR, PCI DSS, HIPAA, SOX, FISMA / NIST, GLBA and more.
Send critical Active Directory user login report alerts to email and mobile devices to prompt immediate action, even while you're not on site.
Get comprehensive Active Directory user login reports that make it easy to comply with best practices, such as reports on access, successful logons and failed logons; authorization comparison reports; and reports grouped by users.
Report on AD user logons and logoffs, and correlate with Azure AD sign-ins to help identify suspicious activity across your hybrid cloud environment. Information captured includes the type of logon, the IP address and geographical origin, the application being authenticated to, and whether the attempt was successful.
Provide instant, one-click access to all information on the change you're viewing and all related events, including all other changes that were made by the specific user, eliminating additional guesswork and unknown security concerns.
Enables viewing, highlighting and filtering of logon activity and related change events over time for better forensic analysis of events and trends.
Identify Tier Zero assets and the attack paths to them using BloodHound Enterprise and monitor and secure those attack paths to avoid exploits with Change Auditor.
Generate comprehensive reports to support regulatory compliance mandates for GDPR, PCI DSS, HIPAA, SOX, FISMA / NIST, GLBA and more.
There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.
The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.
Quad core Intel® Core™ i7 equivalent or better
Minimum: 8 GB RAM or better
Recommended: 32 GB RAM or better
SQL databases supported up to the following versions:
NOTE: Performance may vary depending on network configuration, topology, and Azure SQL Managed Instance configuration.
NOTE: Change Auditor supports SQL AlwaysOn Availability Groups, SQL Clusters, and databases that have row and page compression applied.
Installation platforms (x64) supported up to the following versions:
NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)
For the best performance, Quest strongly recommends:
NOTE: Microsoft ODBC Driver 17 for SQL Server is required when the Change Auditor database resides on Azure SQL Managed Instance and Azure Active Directory authentication is selected.
NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.
In addition, the following software/configuration is required:
Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .
The Change Auditor for Logon Activity 7.1 update allows for auditing of Kerberos and NTLM authentications to promote better security and compliance. Learn more.
In the third and final part of this Active Directory security issues series, we take a look at the problems with Groups and Operating Systems (OSs). Learn more.
Discover the different models of AD security, including the Red Forest and Orange Forest models, Greenfield migrations and Blue Team.
Learn how ITDR encompasses threat intelligence, its best practices and which tools to use for protecting identity systems.
Learn about the new capabilities and key Conditional Access best practices to overcome the most common challenges with Conditional Access.
Learn what’s needed in a robust identity threat detection and response strategy and how to prevent the common attacks targeting identities.