Learn about Change Auditor for Exchange
Change Auditor for Exchange simplifies the audit process by tracking, auditing, reporting and alerting on Microsoft® Exchange Server and Office 365 Exchange Online configuration and permission changes in real time. To ensure Exchange and Office 365 compliance, you can automatically generate intelligent, in-depth reports, protecting you against policy violations and avoiding the risks and errors associated with day-to-day modifications. And, for fast troubleshooting, you always get the original and current values.
Change Auditor for Exchange audits all critical changes to Exchange and Exchange Online such as mailbox logins/access, non-owner mailbox activity, and permission changes. Make Exchange auditing easier than ever with real-time audits that protect your organization’s security policies as well as prevent compliance violations, system downtime and massive productivity loss.
Audit Exchange and Exchange Online environments. Change Auditor provides a single, correlated view of activity across hybrid Exchange environments, ensuring visibility of all changes taking place in your environment whether on-premises or in the cloud
Tracks user and administrator activity with detailed information including who, what, when, where, which workstation and why for change events, plus original and current values for all changes.
Search and correlate activity across hybrid messaging environments to easily identify all activity regardless of whether it took place in the cloud or on premises
Provides a detailed view of any changes made to mailboxes that have been accessed by a non-owner, which enhances security and compliance.
Audits administrator access and end user mailbox activity for mailboxes hosted on Office 365. Events are searchable and integrated into reports for a more complete picture of what’s happening in Exchange and Exchange Online.
Prevents anyone but the mailbox owner from accessing sensitive or critical mailboxes.
Generates comprehensive reports for best practices and regulatory compliance mandates for SOX, PCI-DSS, HIPAA, FISMA, GLBA and more.
Easily integrate with SIEM solutions to forward Change Auditor events to Splunk, HP Arcsight or IBM QRadar. Additionally, Change Auditor integrates with Quest InTrust for long-term 20:1 compressed event storage and aggregation of native or third-party logs to reduce storage costs on SIEM forwarding and create a highly-compressed log repository.
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Enables the viewing, highlighting and filtering of change events and the relation of other events over the course of time in chronological order across your Windows environment for better understanding and forensic analysis of those events and trends.
Provides instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.
Tracks changes made to Exchange public folders, which speeds troubleshooting and ensures compliance.
Removes auditing limitations and captures change information without the need for native audit logs, resulting in faster results and significant savings of storage resources.
Audits mobile devices using the Microsoft ActiveSync to track email and calendar access, device registration and more for on-premises Exchange.
Sends critical change and pattern alerts to email and mobile devices to prompt immediate action, enabling you to respond faster to threats even while you're not on site.
Configures access so auditors can run searches and reports without making any configuration changes to the application, and without requiring the assistance and time of the administrator.
Searches from anywhere using a web browser and creates targeted dashboard reports to provide upper management and auditors with access to the information they need without having to understand architecture or administration.
There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.
The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.
Quad core Intel® Core™ i7 equivalent or better
Minimum: 8 GB RAM or better
Recommended: 32 GB RAM or better
SQL databases supported up to the following versions:
NOTE: Change Auditor does not support SQL high availability technology other than clusters.
Installation platforms (x64) supported up to the following versions:
NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)
For the best performance, Quest strongly recommends:
NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.
In addition, the following software/configuration is required:
Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .
Document all critical group, mailbox and public/private changes to Exchange
In this new report from the Information Security Community on LinkedIn, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up.
NIST cybersecurity framework enables organizations to create a secure environment. Learn how to apply this framework to your AD and Microsoft environment.
Learn cybersecurity best practices to protect your organization against phishing, ransomware and other threats.
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
In this white paper, we provide a checklist for complying with EU GDPR compliance requirements.
Your Active Directory (AD) security is constantly in a state of change, making it difficult to understand your risks from static reports alone. That’s why you need to actively monitor all changes made in AD — being able to detect suspicious activity and a
Ensure security, compliance and control of AD and Azure AD.
Simplify and refine LDAP query data
Audit all events related to file activity and permissions on your EMC NAS devices.
Audit all events related to file activity and permissions on your NetApp NAS devices.
Efficiently track, audit, report and alert on changes to Microsoft SQL Server in real time
Enable faster, easier and more secure Microsoft SharePoint auditing
Track, audit and receive reports on all Windows File Server real-time system changes
Scalable, multi-threaded migration solution for ZeroIMPACT email archive migrations.
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.
Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.