• Products
    • View all products
    • Free trials
    • Buy online
  • Solutions
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Services
    • Consulting Services
      • Overview
      • Microsoft Platform Services
      • Data Protection Services
      • Unified Endpoint Management
      • Performance Monitoring Services
      • Database Management Services
    • Educational Services
    • Support Services
  • Support
    • Support Home
    • By Product
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Consulting Services
      • Microsoft Platform Management
      • Data Protection
      • Unified Endpoint Management
      • Performance Monitoring
      • Database Management
    • Technical Documentation
    • Educational Services
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Technology Partners
    • Partner Community
    • Deal Alert
  • Blogs
    • IT Industry Insights
    • Quest Solution Blogs
      • Data Protection
      • Database Management
      • ITNinja
      • Microsoft Platform Management
      • Performance Monitoring
      • Toad World Blog
      • Unified Endpoint Management
  • Forums
  • 製品情報
    • すべての製品情報%E3%82%92見る
    • Change Auditor
    • Foglight
    • KACE
    • Metalogix
    • Migration Manager
    • Migrator for Notes to SharePoint
    • NetVault Backup
    • On Demand Migration for Email
    • QoreStor
    • Rapid Recovery
    • Recovery Manager
    • SharePlex
    • Spotlight
    • Toad
  • ソリューション
    • すべてのプラットフォームを見る
    • クラウド管理
    • GDPRコンプライアンス
    • データ保護
      • 概要
      • クラウド管理
      • ディザスタリカバリ
      • バックアップとリカバリ
      • Office 365 データ保護
      • 仮想化管理
      • 重複除外と複製
    • データベース管理
      • 概要
      • DevOps
      • データの準備と分析
      • データベースのクラウド移行
      • データベースパフォーマンス監視
      • データベース管理
      • データベース複製ソフトウェアツール
    • 統合エンドポイント管理
      • 概要
      • エンドポイントコンプライアンス
      • エンドポイントセキュリティ
      • エンドポイントの可視化
    • Microsoftプラットフォーム管理
      • 概要
      • ハイブリッドActive Directoryのセキュリティとガバナンス
      • Microsoftプラットフォームの移行計画と統合
      • セキュリティとコンプライアンス
      • 情報アーカイブおよびストレージ管理ソリューション
      • Windowsのバックアップとリカバリ
      • Microsoft Serverのパフォーマンスと可用性
      • レポート作成機能
      • グループポリシーと権限
    • パフォーマンス監視
  • サービス
    • コンサルティングサービス
      • 概要
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • トレーニングと認定資格
    • サポートサービス
  • サポート
    • サポートホーム
    • 製品で検索
      • All Products
      • AppAssure
      • Archive Manager
      • Change Auditor
      • Desktop Authority
      • DR Series
      • Foglight
      • KACE
      • Migration Manager
      • NetVault
      • Rapid Recovery
      • SharePlex
      • Toad
      • vRanger
    • お問い合わせ
      • すべて
      • カスタマサービス
      • ライセンス アシスタンス
      • 更新のアシス%E3%82%BFンス
      • 技術サポート
    • コミュ%E3%83%8Bティフォーラム
    • ソフトウェアのダウン%E3%83%ADード
    • ナ%E3%83%AC%E3%83%83ジ%E3%83%99ース
    • マイアカウント
      • マイ プロダクト
      • Myサービスリクエスト
      • マイ ライセンス
      • マイ グループ
      • マイ プ%E3%83%ADフ%E3%82%A1イル
    • ポリ%E3%82%B7ーおよび手順
    • コンサル%E3%83%86ィングサー%E3%83%93ス
      • Microsoftプラットフォーム管理
      • データ保護
      • 統合エンドポイント管理
      • パフォーマンス監視
      • データベース管理
    • リリースノートおよびガイド
    • 教育サービス
    • ビデオチュートリアル
  • トライアル
  • パートナー
    • 概要
    • Partner Circleへのログイン
    • パートナーになる
    • Find a Partner
    • パートナーコミュニティ
    • Deal Alert
  • コミュニティ
Quest Community
Quest Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • Data Protection
  • Database Management
  • Microsoft Platform Management
  • Performance Monitoring
  • Unified Endpoint Management
  • Quest
  • More
  • Cancel
  • New
  • All tags
  • Change Auditor
  • Active Directory
  • Active Roles
  • audit
  • auditing
  • ChangeAuditor
  • Compliance
  • compliance audits security
  • Compliance/Audits/Security
  • cyber security
  • cybersecurity
  • Enterprise Reporter
  • hipaa
  • InTrust
  • Microsoft Platform Management
  • Modernization
  • NIST cybersecurity framework
  • PCI
  • Performance Monitoring
  • quest on demand
  • Recovery Manager for Active Directory
  • Security
  • Technical
  • Thought Leadership
  • Troubleshoot
  • Windows
  • Pellegrini Finds Functionality and Ease of Use with Quest Solutions

    Pellegrini Finds Functionality and Ease of Use with Quest Solutions

    Laureen.Smith
    Laureen.Smith

    Pellegrini is an Italian contact catering company that provides vending machines, cleaning and integrated services, food supplies, and welfare services such as meal vouchers. They serve 45 million meals a year at various companies, religious communities…

    • over 4 years ago
    • Blogs
    • Microsoft Platform Management
  • Change Auditor 7.1: What’s New

    Change Auditor 7.1: What’s New

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    Change Auditor’s much anticipated 7.1 release is here – and we’re excited. Change Auditor’s capabilities give customers the peace of mind they deserve, and the latest release further expands on these capabilities with new features added to Change Auditor…

    • over 5 years ago
    • Blogs
    • Microsoft Platform Management
  • Six Quest Microsoft Platform Management Solutions Win Stevie Awards

    Six Quest Microsoft Platform Management Solutions Win Stevie Awards

    Steven.Phillips
    Steven.Phillips

               

    Six Quest Microsoft Platform Management solutions just won honors in the 2018 Annual American Business Awards!

    One of the seven Stevie Awards competitions, the American Business Awards are the nation’s premier business awards program. Over 200 professionals…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • Quest Wins the 2018 People’s Choice Stevie Awards, with Microsoft Platform Management Solutions Taking Top Honors in Three Categories

    Quest Wins the 2018 People’s Choice Stevie Awards, with Microsoft Platform Management Solutions Taking Top Honors in Three Categories

    Steven.Phillips
    Steven.Phillips

    I’m excited to announce that Quest Software has been named the top winner in the 2018 People's Choice Stevie Awards for Favorite New Products! This category is a feature of The American Business Awards, the U.S.A.’s top business awards program…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • Using Change Auditor to Enforce Your Privileged Account Management Strategy

    Steve.Toole
    Steve.Toole

    Accounts with excess privileges is a common issue for today’s organizations. Scaling back these permissions is often a challenge. You need data to back up why a certain account is over privileged for its purpose within the organization. Change …

    • over 8 years ago
    • Blogs
    • Microsoft Platform Management
  • Find out Why Customers Love Change Auditor — Named Winner of a 2018 People’s Choice Stevie Award

    Austin Collins
    Austin Collins

    Established over 13 years ago, with more than 5,000 customers and 149 million users audited.

    So it comes as no surprise that Quest® Change Auditor is a People’s Choice Stevie® Award winner.

    The People’s Choice Stevie® Awards for Favorite…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • Change Auditor 7. 0 is now available - What's New - Integration with SIEM solutions

    Austin Collins
    Austin Collins

    Change Auditor 7.0 is now available for download as of May 23rd.

    Look what's new:

    • Event forwarding to Splunk

    • Event forwarding to HP ArcSight, IBM QRadar (preview)

    • High availability of the Change Auditor database with SQL AlwaysOn

    • Support for…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • The Often Overlooked Functionality of Change Auditor

    Steve.Toole
    Steve.Toole

    For those who are unfamiliar with Change Auditor, it is the auditing solution offered by Quest.  The solution offers a wide range of auditing capabilities to help provide a view into what changes are occurring within your environment.  Unfortunately, the…

    • over 8 years ago
    • Blogs
    • Microsoft Platform Management
  • Bad Rabbit Ransomware: What You Need To Know About the Latest Cyber Attack

    Bad Rabbit Ransomware: What You Need To Know About the Latest Cyber Attack

    Sergey.Goncharenko
    Sergey.Goncharenko

    The Bad Rabbit ransomware cyber attack hit last week in Russia and Eastern Europe, targeting news media companies and some transportation companies such as Airport of Odessa in Ukraine. In a nutshell the tactic that bad guys are using is as old as WannaCry…

    • over 7 years ago
    • Blogs
    • Unified Endpoint Management
  • How to Secure Active Directory Using the NIST Cybersecurity Framework

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    Currently 30% of companies in the United States are using the NIST Cybersecurity Framework to manage risks with projections of 50% by the year 2020 (https://iapp.org/news/a/the-future-of-the-nist-cybersecurity-framework/). 

    Quest has a broad portfolio…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • Quest product mapping to NIST Cybersecurity Framework and DFS Cybersecurity regulation

    Quest product mapping to NIST Cybersecurity Framework and DFS Cybersecurity regulation

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    In reviewing the DFS Cybersecurity regulation Section 500.02, I immediately began thinking of the NIST Framework. Section B has several subsections that map to NIST:

    Identify Risks Identify
    Defensive Infrastructure Protect
    Detect Cybersecurity…
    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • Advantages of an Active Directory Auditing Agents

    Advantages of an Active Directory Auditing Agents

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    Understanding the architecture of a product is vital for a customer in deciding if it is a good fit for their organization.  Over the years, we've seen debates on whether agent-based or agent-less solutions are a better fit for organizations.  A decision…

    • over 7 years ago
    • Blogs
    • Microsoft Platform Management
  • I installed a trial key for a certain CA module in my production environment and my database has doubled in size

    Robert.Tovar
    Robert.Tovar

    First and foremost, we always recommend testing our products in a lab environment. Test in production at your own risk. We understand you want to get real data and it makes sense but testing in production comes with risks. Am I saying you should never…

    • over 8 years ago
    • Blogs
    • Database Management
  • Why is my Change Auditor database so "YUGE" (huge)?

    Why is my Change Auditor database so "YUGE" (huge)?

    Robert.Tovar
    Robert.Tovar

    Here are some of the questions I get about the Change Auditor database when visiting customers:

    1. Should the size of the database be relative to the size of the environment?
    2. Should the size of the database be relative to the amount of activity in my environment…
    • over 8 years ago
    • Blogs
    • Microsoft Platform Management
  • Investigating Account Lockouts with IT Security Search

    Investigating Account Lockouts with IT Security Search

    Matthew Vinton
    Matthew Vinton

    One of the tools that Active Directory administrators have to help mitigate brute force hacking attempts is the account lockout. Typically configured in a Group Policy, the account lockout policy tallies the number of failed authentication attempts for…

    • over 8 years ago
    • Blogs
    • Microsoft Platform Management
  • Securing your Active Directory Environment from the Inside Out. (Part 2)

    Securing your Active Directory Environment from the Inside Out. (Part 2)

    Joey Heaton
    Joey Heaton

    In my previous post, I touched on how you can identify users in AD with elevated rights. Now we need to determine if they're really necessary.

    Step 2: Identifying what rights are needed for the job.

    I can't begin to tell you how many companies that…

    • over 8 years ago
    • Blogs
    • Microsoft Platform Management
  • When is everything not enough?

    When is everything not enough?

    Jeff Currier
    Jeff Currier

    Modern security information and event management (SIEM) solutions can collected logs from every type of device including Active Directory (AD) so that companies can search through and analyze “everything”.   The question we are often asked is…

    • over 8 years ago
    • Blogs
    • Blog
  • Getting Started with Least Privileged Access

    Bryan Patton, CISSP
    Bryan Patton, CISSP

    Organizations exist either to generate revenue or to perform a service.  The mere thought of securing an environment doesn’t exist until there is something of value to secure.  Once you have gotten to that stage of an organizational lifecycle, people…

    • over 8 years ago
    • Blogs
    • Microsoft Platform Management
  • Video Tutorial: How to Monitor File Servers with Change Auditor

    Thom Brainard
    Thom Brainard

    Are you maximizing your investment of Change Auditor for Windows File Servers? This award-winning solution helps you control and audit changes to Microsoft Windows file servers efficiently and cost-effectively. Change Auditor can also audit and secure…

    • over 9 years ago
    • Blogs
    • Blog
  • Why is it necessary to add the t1906 startup flag to each SQL server instance for SQL Event auditing in Change Auditor?

    Wendell Seaton
    Wendell Seaton

    Change Auditor leverages Event Tracing for Windows (ETW) for recording SQL events, the SQL startup flag t1906 instructs SQL Server to read the tracing templates stored in the “..\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Binn\…

    • over 9 years ago
    • Blogs
    • Blog
  • Shark Week: Are You Tracking the Behavior of the Sharks in Your Network? #Securonix

    Thom Brainard
    Thom Brainard

    Dell Teams with Securonix to Provide Advanced Security Analytics for Active Directory and Enterprise Applications


    There are a lot of sharks swimming around your network. Most are friendly, but some are not. Can you tell the difference?

    Fortunately, you…

    • over 9 years ago
    • Blogs
    • Blog
  • What’s New for Change Auditor 6.8 - September 2016?

    What’s New for Change Auditor 6.8 - September 2016?

    Wendell Seaton
    Wendell Seaton
    This monthly publication will provide new and updated information regarding the products that we offer and organized in the following categories: product notifications, new knowledgebase articles, product life cycle, services, training, trending videos…
    • over 8 years ago
    • Blogs
    • Blog
  • Don't Let Anyone Bully Your AD Environment

    Don't Let Anyone Bully Your AD Environment

    Alon.Tzeiri
    Alon.Tzeiri

    Co-Authored by Matt Nelson

    Picture by Trev Grant, covered by CC 2.0

    Image Credit: Trev Grant | CC 2.0

    YES! It’s October, and while most of you are using your in-laws’ wardrobe to decorate the front yard for Halloween and scare off (youth) intruders, we thought we’d let you know it is also National…

    • over 8 years ago
    • Blogs
    • Blog
  • What’s New for Change Auditor 6.8 - August 2016?

    Wendell Seaton
    Wendell Seaton

    This monthly publication will provide new and updated information regarding the products that we offer and organized in the following categories: product notifications, new knowledgebase articles, product life cycle, services, training, trending videos…

    • over 8 years ago
    • Blogs
    • Blog
  • Change Auditor Application User Interface

    Change Auditor Application User Interface

    Wendell Seaton
    Wendell Seaton

    The Application User Interface is simply Role Based Access control to the Function and Features of the Change Auditor when using client, it restricts access to the client interface based on permission, it is also known as User Interface Authorization.

    …
    • over 8 years ago
    • Blogs
    • Performance Monitoring
  • View related content from anywhere
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Contact Us
    • Careers
    • News
  • Resources
    • Industry Insights Blog
    • Communities
    • Customer Stories
    • Documents
    • Events
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • Training & Certification
    • Support Services
  • Social Networks
    • Facebook
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center
  • 会社名
    • 会社情報
    • 購入
    • お問い合わせ
    • 採用情報
    • ニュース
  • リソース
    • ブログ
    • お客様の事例
    • ドキュメント
    • イベント
    • ビデオ
  • サポート
    • プロフェッショナルサービス
    • サポートの更新
    • テクニカルサポート
    • トレーニングと認定資格
    • サポートサービス
  • ソーシャルネットワーク
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 Quest Software Inc. ALL RIGHTS RESERVED.
  • 「法務」
  • ご利用規約
  • 個人情報保護方針
  • コミュニティのフィードバックとサポート