For the best web experience, please use IE10+, Chrome, Firefox, or Safari

Change Auditor for Active Directory Queries

Solve migration and performance issues by analyzing Active Directory queries

Determining what applications and users are accessing Active Directory (AD) is nearly impossible using native tools, fraught with risk and can cripple AD environments to a halt if not monitored correctly.

Change Auditor for Active Directory Queries provides real-time tracking, analysis and reporting on all Active Directory-based and LDAP queries. By detecting queries in real time, you can eliminate the time required for auditing and easily determine the source of queries prior to a directory migration or consolidation. You can also measure domain controller performance and translate query data into the simple terms of who, what, when, where and originating machine.

Key Benefits

Detail AD queries

Identify the who, what, where, when and originating machine for each query in simple terms, saving the administrator time normally spent digging for more details.

Secure and signed

Identify queries against Active Directory (AD) that do not conform to your internal security policy because they are not secure or signed.

Domain controller performance

Show which workstations and servers are performing LDAP queries that can affect domain controller performance.

Migration discovery process

Learn what machines need connectivity to LDAP during and after a migration.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

Auditor-ready reporting

Generate best practice reports for regulatory compliance mandates such as GDPR, SOX, PCI-DSS, HIPAA, FISMA, GLBA and more.

Features

Integrated event forwarding

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.

Superior auditing engine

Remove auditing limitations and captures change information without the need for native audit logs, resulting in faster results and significant savings of storage resources.

Security timelines

View, highlight and filter change events and discover their relation to other security events in chronological order across your Microsoft environment for better forensic analysis and security incident response.
Stevie Awards 2018 People’s Choice winner

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018.

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017
  • NOTE: Change Auditor supports SQL AlwaysOn Availability Groups and SQL Clusters.

    Operating system

    Installation platforms (x64) supported up to the following versions:

    • Windows Server 2012
    • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

    Coordinator software and configuration

    For the best performance, Quest strongly recommends:

    • Install the Change Auditor coordinator on a dedicated member server.
    • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

    NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

    In addition, the following software/configuration is required:

    • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
    • x64 version of Microsoft’s .NET 4.7.1
    • x64 version of Microsoft XML Parser (MSXML) 6.0
    • x64 version of Microsoft SQLXML 4.0
    Coordinator footprint
    • Estimated hard disk space used: 1 GB.
    • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
    • Estimated database size will vary depending on the number of agents deployed and audited events captured.

    Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

    Resources

    Change Auditor for Active Directory Queries
    Datasheet
    Change Auditor for Active Directory Queries
    Change Auditor for Active Directory Queries
    Solve migration and performance issues by analyzing Active Directory queries.
    Read Datasheet
    Change Auditor for Active Directory Queries
    Change Auditor for Active Directory Queries

    01:58

    Video
    Change Auditor for Active Directory Queries
    Learn how Change Auditor for Active Directory Queries tracks, analyzes and reports on all LDAP queries in real time, eliminating directory performance problems.
    Watch Video
    Nine Best Practices to Reduce Active Directory Security Breaches and Insider Threats
    E-book
    Nine Best Practices to Reduce Active Directory Security Breaches and Insider Threats
    Nine Best Practices to Reduce Active Directory Security Breaches and Insider Threats
    This ebook explores the anatomy of an AD insider threat and details the best defense strategies against it.
    Read E-book
    Manufacturer ensures security and GDPR compliance
    Case Study
    Manufacturer ensures security and GDPR compliance
    Manufacturer ensures security and GDPR compliance

    To continue to thrive in its competitive market, Beltrame Group had modernized its IT environment, with help from Que

    Read Case Study
    Three ways a privileged user can hose your Active Directory
    E-book
    Three ways a privileged user can hose your Active Directory
    Three ways a privileged user can hose your Active Directory
    This eBook reviews insider threats and eight AD security best practices to reduce risk and recovery time.
    Read E-book
    Active Directory and Azure AD Security Best Practices
    E-book
    Active Directory and Azure AD Security Best Practices
    Active Directory and Azure AD Security Best Practices
    Unless you’ve been hiding under a rock, it’s going to come as no surprise that Office 365 adoption is increasing rapidly. With primary drivers like Exchange Online, SharePoint Online and OneDrive, Office 365 is obtaining an average of around 1 million new
    Read E-book
    How to Spot Insider Threats Before They Wreak Havoc
    E-book
    How to Spot Insider Threats Before They Wreak Havoc
    How to Spot Insider Threats Before They Wreak Havoc
    Change Auditor Threat Detection distills AD audit data down to a manageable number of SMART alerts and highlights the riskiest users through pattern-based
    Read E-book
    Randy Franklin Smith webcast: How the NIST cybersecurity framework works
    On Demand Webcast
    Randy Franklin Smith webcast: How the NIST cybersecurity framework works
    Randy Franklin Smith webcast: How the NIST cybersecurity framework works
    Join security expert Randy Franklin Smith & Quest expert Bryan Patton as they walk through the NIST Framework document and explore how it helps tackle specific security issues.
    Watch Webcast

    Get started now

    Solve migration and performance issues by analyzing Active Directory queries.

    Support & Services

    Product Support

    Self-service tools will help you to install, configure and troubleshoot your product.

    Support Offerings

    Find the right level of support to accommodate the unique needs of your organization.

    Professional Services

    Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

    Education Services

    Training courses delivered through online web-based, on-site or virtual instructor-led.