Real-time change auditing for Microsoft platforms
Change Auditor for FluidFS helps ensure the security, compliance and control of files and folders by tracking, auditing, reporting and alerting on all changes in real time. With Change Auditor, administrators can report on and analyze events and changes without the complexity and time required by native auditing or concerns over system performance.
Change Auditor for FluidFS tracks all events related to shares, including access to folders and folder/file deletions and changes, helping administrators ensure access to shared directories.
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Track all events related to shares, including deletions, helping administrators ensure access to shared directories is secure and maintained.
Display the color-coded severity of streamed events from FluidFS servers in one centralized viewer. This saves administrators time as they can see all events in one location.
Specify and filter searches by event type, server, user, etc. This enables administrators to quickly pinpoint the source of the problem, providing faster time to resolution and eliminates noise from routine safe events.
Discover the six Ws for every event (who, what, where, when, workstation and why) in simple terms with before and after values. You’ll save administrators time normally spent digging for more details.
Dispatch alerts in real time for events that meet predefined criteria. Change Auditor notifies administrators via email so that they can address problems immediately.
Deliver preconfigured and customizable reports to satisfy auditor and management requests so administrators can get back to their regular jobs fast.
Configure and deploy auditing templates from one console for all servers in the organization saving administrators time.
Control access so auditors can run searches and reports without the ability to make any configuration changes to the application. This enables auditors to obtain the information they need without requiring the assistance and time of the administrator.
For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.
The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.
Quad core Intel® Core™ i7 equivalent or better
Minimum: 8 GB RAM or better
Recommended: 32 GB RAM or better
SQL databases supported up to the following versions:
NOTE: Change Auditor does not support SQL high availability technology other than clusters.
Installation platforms (x64) supported up to the following versions:
NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)
For the best performance, we strongly recommend:
NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.
In addition, the following software/configuration is required:
In this new report from the Information Security Community on LinkedIn, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up.
Change Auditor Threat Detection distills AD audit data down to a manageable number of SMART alerts and highlights the riskiest users through pattern-based
Review challenges detecting an insider threat, benefits and limitations of rule-based tools and explore user behavior analytics threat detection solutions
Identify insider threats with advanced machine learning, user and entity behavioral analytics (UEBA), and SMART correlation technology to stop data breach
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
Ensure security, compliance and control of AD and Azure AD.
Simplify and refine LDAP query data
Track, audit and receive reports on all Windows File Server real-time system changes
Document all critical group, mailbox and public/private changes to Exchange
Efficiently track, audit, report and alert on changes to Microsoft SQL Server in real time
Audit all events related to file activity and permissions on your EMC NAS devices.
Audit all events related to file activity and permissions on your NetApp NAS devices.
Securely collect, store and receive event data from Windows, Unix and Linux systems
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.
Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.