For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Change Auditor for EMC

Track, audit and report on events and changes in real time for enhanced EMC security monitoring. Change Auditor for EMC provides real-time tracking, auditing, reporting and alerting on all changes to help ensure the security, compliance and control of files and folders. You can easily monitor, report on and analyze events and changes while staying alert to security concerns. You’ll instantly know who made what change when and where, and from what originating workstation for enhanced EMC security monitoring. You can then automatically generate intelligent, in-depth forensics for all change events for a complete auditing picture.
Change Auditor for EMC - EMC security monitoring
Change Auditor for EMC is our EMC security monitoring tool that provides real-time tracking, auditing, reporting and alerting on all changes.
Event logging and change reporting for EMC file servers is time consuming using EMC-provided tools because you have to repeat the process for each server and you end up with a huge volume of data and a myriad of reports. Your data security is also at risk because with the limitations of EMC-provided tools, you may not find out about problems until it’s too late. But with Change Auditor for EMC, you’ll catch problems in real time.

Key Benefits

Centralized auditing

Monitor and audit all file server changes from multiple servers and locations all from one single console, using this EMC security monitoring solution.

At-a-glance display

Track user and administrator activity with detailed information for change events, plus original and current values for all changes.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

Integrated event forwarding

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Auditor-ready reporting

Generate comprehensive reports for best practices and regulatory compliance mandates for GDPR, SOX, PCI-DSS, HIPAA, FISMA, GLBA and more.


Quest InTrust integration

Integrate this EMC security monitoring solution with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.

Superior auditing engine

Remove auditing limitations and captures change information without the need for native audit logs, resulting in faster results and significant savings of storage resources.

Security timelines

View, highlight and filter change events and discover their relation to other security events in chronological order across your AD and Azure AD environment for better forensic analysis and security incident response.

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018.


There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.


Quad core Intel® Core™ i7 equivalent or better


Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017
  • Microsoft SQL Server 2019
  • Azure SQL Managed Instance (PaaS) with SQL authentication or Azure Active Directory authentication

NOTE: Performance may vary depending on network configuration, topology, and Azure SQL Managed Instance configuration.

NOTE: Change Auditor supports SQL AlwaysOn Availability Groups, SQL Clusters, and databases that have row and page compression applied.

Operating system

Installation platforms (x64) supported up to the following versions:

  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019

NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

Coordinator software and configuration

For the best performance, Quest strongly recommends:

  • Install the Change Auditor coordinator on a dedicated member server.
  • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

NOTE: Microsoft ODBC Driver 17 for SQL Server is required when the Change Auditor database resides on Azure SQL Managed Instance and Azure Active Directory authentication is selected.

NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

In addition, the following software/configuration is required:

  • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
  • x64 version of Microsoft’s .NET 4.7.1
  • x64 version of Microsoft XML Parser (MSXML) 6.0
  • x64 version of Microsoft SQLXML 4.0
Coordinator footprint
  • Estimated hard disk space used: 1 GB.
  • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
  • Estimated database size will vary depending on the number of agents deployed and audited events captured.

Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .



Change Auditor for EMC

Audit all events related to file activity and permissions on your EMC NAS devices.

What is Quest Change Auditor and how does it compare to and complement Microsoft ATP and third-party...

Hear Quest product experts, Ghazwan Khairi, Bryan Patton and Robert Tovar discuss the real-time security and IT auditing of Change...

3 Ways a Bad Actor Can Hose AD During the COVID-19 Crisis

COVID-19 phishing and malware campaigns are on the rise. Bad actors are out there looking to target companies and employees –...
On Demand Webcast

Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from ...

With the rapid increase of employees working from home, you will need to throw out your old baseline of normal audit activity –...

Conversational Hybrid AD Security Detection & Alerting

See best practices to keeping watch on hybrid AD security in this eBook by a leading Microsoft MVP.
White Paper

Integrated change auditing and event log management for strong security

This white paper explores how you can use Change Auditor and InTrust, either alone or in combination with your SIEM, to improve...

Nine Best Practices to Improve Active Directory Security and Cyber Resilience

This ebook explores the anatomy of an AD insider threat and details the best defense strategies against it.
On Demand Webcast

Top 5 Office 365 and Azure AD Security Events to Monitor During the COVID-19 Crisis

Increase in remote workers means explosive adoption and utilization of Office 365 workloads such as Teams, SharePoint Online, OneDrive...

Get Started Now

Track, audit, report and alert on critical changes to EMC

Support and Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.