For the best web experience, please use IE11+, Chrome, Firefox, or Safari
Schedule & Events

Schedule & Events

Add series to calendar

Apple Google Office 365 Outlook Outlook.com Yahoo

Change Auditor deep dive: Unlock 5 powerful features you’re overlooking

Date: February 11, 2026
Time: 11:00 am ET
Location: Microsoft Teams Townhall

Think you’ve mastered Change Auditor? This session will challenge that assumption. Whether you’re a seasoned user or just getting started, we’ll highlight powerful features that often go unnoticed. You’ll discover capabilities that enhance security, streamline audits, and simplify daily operations.

This fast-paced, demo-driven walkthrough will cover five underutilized features that will transform how you use Change Auditor:

  1. Object protection: Prevent unauthorized or accidental changes to critical Active Directory objects, such as domain admins, with built-in safeguards that provide peace of mind.
  2. Export/import configuration: Save time and reduce errors by reusing effective configurations across environments or restoring them after upgrades.
  3. Role-based delegation: Assign specific access levels to different teams, ensuring the right people have the right permissions without compromising security.
  4. Audit events based on result: Filter audit data by success or failure to focus on what matters most and cut through investigation noise.
  5. Entra ID auditing: Extend visibility to hybrid environments by integrating on-premises and cloud audit data for stronger compliance and faster incident response.

If you’re ready to unlock the full potential of Change Auditor without sifting through manuals or relying on trial and error, this session is your shortcut. Expect real-world use cases, live demos, and practical tips you can apply immediately.

Speaker: Fouad Hamdi, Principal Strategic Systems Consultant - CISSP

5 Must-know security best practices for Change Auditor

Date: 4/15/2026
Time: 11:00 am ET
Location: Microsoft Teams Townhall

Ready to take your Change Auditor deployment to the next level? In this session, we’ll walk through the top five security configurations every Change Auditor environment should have. You’ll learn how to implement proven best practices from real-world customer engagements and recommendations straight from Quest field engineers and CISSPs. You’ll see how to finetune Change Auditor to detect threats faster, enforce protection across your most critical assets, and align your setup with modern identity security frameworks.

Gain expertise to:

  • Fortify Tier 0 security with Change Auditor and Security Guardian
  • Detect and validate NTDS.DIT access activity in real time
  • Expose Kerberos anomalies to preempt Golden Ticket threats
  • Identify and retire risky legacy protocols like NTLMv1
  • Automate alerting for unauthorized SIDHistory, AdminSDHolder, and SPN changes

Speaker: Jason Morano; Senior Security Solutions Consultant