Audit all security changes across your AD and Azure AD environments, including user and group changes, as well as exploits such as DCSync and DCShadow attacks, AD database exfiltration, and SIDHistory use.
Detect threats early – including unauthorized domain replication, offline extraction of your AD database, and domain-level GPO linking – to mitigate and avoid costly ransomware attacks.
Block attackers from making changes to critical groups, GPO settings and linking or exfiltrating your AD database to steal credentials – regardless of the privileges they’ve hijacked.
Track Active Directory changes with a detailed audit trail of every change made to AD and Azure AD, including who made them, without the blind spots of built-in auditing functions.
Experience comprehensive Active Directory auditing tools offering everything from upfront vulnerability assessment to intrusion detection and monitoring of compromised accounts. Change Auditor has you covered at every step.
Translate cryptic system-provided logs into a simple, normalized format highlighting the who, what, when, where and workstation details, and before and after values.
Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.
Capture the originating IP address/workstation name for account lockout events to simplify troubleshooting.
Detect attack attempts, lateral movement through your network, and post-attack damage done to your critical workloads like Exchange and file systems with this comprehensive set of Active Directory auditing tools.
View, highlight and filter change events and discover their relation to other threat events in chronological order across your AD and Azure AD environment for better forensic analysis and security incident response.
Use this comprehensive set of Active Directory auditing tools for instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating guesswork.
Track Active Directory changes without the need for system-provided audit logs, eliminating blind spots, and resulting in increased visibility of suspicious user activity.
Restore previous values on unauthorized, mistaken or improper changes with the click of a button, directly from the Change Auditor console.
Identify Tier Zero assets and the attack paths to them using BloodHound Enterprise and monitor and secure those attack paths to avoid exploits with Change Auditor.
Enrich SIEM solutions including Sentinel, Splunk, ArcSight, QRadar or any platform supporting Syslog by integrating Change Auditor’s detailed activity logs.
Generate comprehensive reports to support regulatory compliance mandates for GDPR, PCI DSS, HIPAA, SOX, FISMA / NIST, GLBA and more.
There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.
The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.
Quad core Intel® Core™ i7 equivalent or better
Minimum: 8 GB RAM or better
Recommended: 32 GB RAM or better
SQL databases supported up to the following versions:
NOTE: Performance may vary depending on network configuration, topology, and Azure SQL Managed Instance configuration.
NOTE: Change Auditor supports SQL AlwaysOn Availability Groups, SQL Clusters, and databases that have row and page compression applied.
Installation platforms (x64) supported up to the following versions:
NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)
For the best performance, Quest strongly recommends:
NOTE: Microsoft ODBC Driver 17 for SQL Server is required when the Change Auditor database resides on Azure SQL Managed Instance and Azure Active Directory authentication is selected.
NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.
In addition, the following software/configuration is required:
Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .
Learn why IAM and security leaders must prioritize identity threat detection and response (ITDR) in 2024 and what that they should be focused on.
Discover key considerations and the essential steps to take before, during, and after a cyberattack to minimize its impact.
Learn the three misconfigurations in Active Directory that impact the security of Entra ID and how to best reduce those risks.
Check out our top cybersecurity predictions for 2025 to better prepare your organization for the year ahead.
ITDR is essential for protecting identity infrastructure. Learn what's most important in the response phase of ITDR.
Learn how ITDR encompasses threat intelligence, its best practices and which tools to use for protecting identity systems.