For the best web experience, please use IE10+, Chrome, Firefox, or Safari

Change Auditor for Exchange

Microsoft Exchange Server and Office 365 change auditing and activity reporting

Change Auditor for Exchange simplifies the audit process by tracking, auditing, reporting and alerting on Microsoft Exchange Server and Office 365 Exchange Online configuration and permission changes in real time. To ensure Exchange and Office 365 compliance, you can automatically generate in-depth reports, protecting you against policy violations and avoiding the risks and errors associated with day-to-day modifications.

Change Auditor for Exchange audits all critical changes to Exchange and Exchange Online such as mailbox logins/access, non-owner mailbox activity and permission changes. Make Microsoft Exchange reporting easier with real-time audits that protect your organization’s security policies as well as prevent compliance violations, system downtime and massive productivity loss.

Key Benefits

Hybrid Exchange auditing

Get a single, correlated view of all Exchange and Office 365 activity, with visibility of all changes whether on-prem or in the cloud.

At-a-glance display

Track user and administrator activity with detailed information for change events, plus original and current values for all changes.

Non-owner mailbox auditing

Audit any changes made to mailboxes that have been accessed by a non-owner, which enhances security and compliance.

Object protection

Prevent anyone but the mailbox owner from accessing sensitive or critical mailboxes.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

Integrated event forwarding

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Auditor-ready reporting

Generate best practices reports for regulatory compliance mandates for GDPR, SOX, PCI-DSS, HIPAA, FISMA, GLBA and more.

Superior auditing engine

Capture changes information without the need for native audit logs, resulting in faster results and massive storage savings.

Features

Office 365 auditing

Audit administrator access and end user mailbox activity for mailboxes hosted on Office 365. Events are searchable and integrated into reports for a more complete picture of what’s happening in Exchange and Exchange Online.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Security timelines

View, highlight and filter change events and discover their relation to other security events in chronological order across your Microsoft environment for better forensic analysis and security incident response.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.

Public folder support

Track changes made to Exchange public folders, which speeds troubleshooting and ensures compliance.

ActiveSync auditing

Audit mobile devices using the Microsoft ActiveSync to track email and calendar access, device registration and more for on-premises Exchange.

    Alerts

  • Alert and monitor critical changes made to Exchange.

  • Non-owner mailbox

  • Alert on and monitor changes made to non-owner mailboxes.

  • Mailbox selection

  • Select which mailboxes and/or administration activity you want to audit.

  • Web-based event timeline

  • View, report and analyze audit activity from a web-based console.

  • Role-based access

  • Provide role-based access to control who can do or see what.

  • Object protection

  • Prevent changes to critical objects and settings.

  • Related searches

  • Pivot from any result to view all events related to any cloud or on-premises user.

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017

NOTE: Change Auditor supports SQL AlwaysOn Availability Groups and SQL Clusters.

Operating system

Installation platforms (x64) supported up to the following versions:

  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019

NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

Coordinator software and configuration

For the best performance, Quest strongly recommends:

  • Install the Change Auditor coordinator on a dedicated member server.
  • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

In addition, the following software/configuration is required:

  • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
  • x64 version of Microsoft’s .NET 4.7.1
  • x64 version of Microsoft XML Parser (MSXML) 6.0
  • x64 version of Microsoft SQLXML 4.0
Coordinator footprint
  • Estimated hard disk space used: 1 GB.
  • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
  • Estimated database size will vary depending on the number of agents deployed and audited events captured.

Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

Resources

Change Auditor for Exchange
Datasheet
Change Auditor for Exchange
Change Auditor for Exchange
Document all critical group, mailbox and public/private changes to Exchange
Read Datasheet
How to Audit Office 365 and Exchange Online Privileged Operations and Mailbox Access
On Demand Webcast
How to Audit Office 365 and Exchange Online Privileged Operations and Mailbox Access
How to Audit Office 365 and Exchange Online Privileged Operations and Mailbox Access
Moving Exchange to the cloud eliminates a lot of work, but it doesn’t eliminate your compliance responsibilities or security requirements. To be secure and detect information grabs and data theft, you need to monitor various activities of Exchange Online.
Watch Webcast
Auditing Privileged Operations and Mailbox Access in Office 365
White Paper
Auditing Privileged Operations and Mailbox Access in Office 365
Auditing Privileged Operations and Mailbox Access in Office 365
Email remains one of the most heavily used communication mediums in organizations today. With as much as 75 percent of your organization’s intellectual property stored in email, Microsoft Exchange is a treasure trove of your most valuable secrets.
Read White Paper
Manufacturer ensures security and GDPR compliance
Case Study
Manufacturer ensures security and GDPR compliance
Manufacturer ensures security and GDPR compliance

To continue to thrive in its competitive market, Beltrame Group had modernized its IT environment, with help from Que

Read Case Study
What's New with Office 365 Auditing and Change Auditor
On Demand Webcast
What's New with Office 365 Auditing and Change Auditor
What's New with Office 365 Auditing and Change Auditor
In this webcast, join Quest AD expert, Mathew Vinton as he shares the latest improvements to Change Auditor and its Office 365 auditing capabilities.
Watch Webcast
Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
Case Study
Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
Howard County, Maryland, uses Microsoft platform management solutions from Quest, which enable accurate and efficient account provisioning, Group Policy administration, change auditing, disaster recovery, and more — while saving the IT team hours of work.
Read Case Study
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
White Paper
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
Learn cybersecurity best practices to protect your organization against phishing, ransomware and other threats.
Read White Paper
Abu Dhabi Ports Fortifies Security & Accountability with Quest Solutions
Case Study
Abu Dhabi Ports Fortifies Security & Accountability with Quest Solutions
Abu Dhabi Ports Fortifies Security & Accountability with Quest Solutions
Quest solutions help manage and secure their IT infrastructure with audits, proactive alerts, automated provisioning and self-service password resets.
Read Case Study

Get Started Now

Track, report and get alerts on Exchange and O365 changes in real time.

Support & Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.