For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Change Auditor for FluidFS

Track, audit, report and alert on file activity on Dell FluidFS servers

Change Auditor for FluidFS helps ensure the security, compliance and control of files and folders by tracking, auditing, reporting and alerting on all changes in real time. With Change Auditor, administrators can report on and analyze events and changes without the complexity and time required by native auditing or concerns over system performance.

Change Auditor for FluidFS tracks all events related to shares, including access to folders and folder/file deletions and changes, helping administrators ensure access to shared directories.

Key Benefits

Change Auditor Threat Detection

Detect insider threats proactively with user behavior analytics and reduce the noise of false positive alerts.

Normalized audit view

Discover the five Ws for every event (who, what, where, when, and originating workstation) with before and after values.

Event tracking

Track all events related to file security, including deletions, helping administrators ensure secure file storage access.

At-a-glance display

Display the color-coded severity of streamed events from FluidFS servers in one centralized viewer and location, saving administrators time.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

Event filters

Specify and filter searches by event type, server or user to pinpoint the source of problems.

Features

Integrated event forwarding

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Automated reporting

Deliver preconfigured and customizable reports to satisfy auditor and management requests so administrators can get back to their regular jobs fast.

Centralized management

Configure and deploy auditing templates from one console for all servers in the organization saving administrators time.

    FluidFS activity

  • View file activity from your FluidFS NAS devices from one console.

  • Before and after values

  • Easily group events by any field and view before and after values.

  • Customizable audits

  • Enable or disable the file system events that are important to you.

  • Related searches

  • Pivot from any result to view all events related to a particular field.

  • Correlated audit data

  • Correlate FluidFS file activity with AD changes and user logons.

  • Compliance auditing

  • Audit user access to sensitive files to report and ensure compliance.

  • Web-based event timeline

  • View, report and analyze audit activity from a web-based console.

Stevie Awards 2018 People’s Choice winner

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018.

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017

NOTE: Change Auditor supports SQL AlwaysOn Availability Groups and SQL Clusters.

Operating system

Installation platforms (x64) supported up to the following versions:

  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019

NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

Coordinator software and configuration

For the best performance, Quest strongly recommends:

  • Install the Change Auditor coordinator on a dedicated member server.
  • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

In addition, the following software/configuration is required:

  • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
  • x64 version of Microsoft’s .NET 4.7.1
  • x64 version of Microsoft XML Parser (MSXML) 6.0
  • x64 version of Microsoft SQLXML 4.0
Coordinator footprint
  • Estimated hard disk space used: 1 GB.
  • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
  • Estimated database size will vary depending on the number of agents deployed and audited events captured.

Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

Resources

Change Auditor for FluidFS
Datasheet
Change Auditor for FluidFS
Change Auditor for FluidFS
Audit all events related to file activity and permissions on your FluidFS NAS devices.
Read Datasheet
How to Spot Insider Threats Before They Wreak Havoc
E-book
How to Spot Insider Threats Before They Wreak Havoc
How to Spot Insider Threats Before They Wreak Havoc
Change Auditor Threat Detection distills AD audit data down to a manageable number of SMART alerts and highlights the riskiest users through pattern-based
Read E-book
Insider Threat 2018 Report
White Paper
Insider Threat 2018 Report
Insider Threat 2018 Report
Learn about the 5 key trends for insider threats and best practices for protecting Active Directory security.
Read White Paper
Key Strategies for Meeting GDPR Compliance Requirements
White Paper
Key Strategies for Meeting GDPR Compliance Requirements
Key Strategies for Meeting GDPR Compliance Requirements
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
Read White Paper
Tackling insider threat detection with user behavior analytics
White Paper
Tackling insider threat detection with user behavior analytics
Tackling insider threat detection with user behavior analytics
Review challenges detecting an insider threat, benefits and limitations of rule-based tools and explore user behavior analytics threat detection solutions
Read White Paper
Conversational Geek e-book: Hybrid AD Security Detection & Alerting
E-book
Conversational Geek e-book: Hybrid AD Security Detection & Alerting
Conversational Geek e-book: Hybrid AD Security Detection & Alerting
Your Active Directory (AD) security is constantly in a state of change, making it difficult to understand your risks from static reports alone. That’s why you need to actively monitor all changes made in AD — being able to detect suspicious activity and a
Read E-book
Inside Change Auditor Threat Detection
Technical Brief
Inside Change Auditor Threat Detection
Inside Change Auditor Threat Detection
Identify insider threats with advanced machine learning, user and entity behavioral analytics (UEBA), and SMART correlation technology to stop data breach
Read Technical Brief
Protecting Data in the Healthcare Industry
White Paper
Protecting Data in the Healthcare Industry
Protecting Data in the Healthcare Industry
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
Read White Paper

Get Started

Track, audit, report and alert on file activity on Dell FluidFS servers.

Support & Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.