How to audit user network logon activity in Change Auditor for Logon Activity
Promote better security, auditing and compliance in your organization by capturing, alerting and reporting on all user logon/logoff and sign-in activity, both on premises and in the cloud. Change Auditor for Logon Activity uses a centralized view to deliver:
Get the answers to all your critical security and compliance questions, and simplify IT governance now.
Enables auditing of Active Directory user logon/logoff and Azure AD sign-in activity from a single, correlated view, ensuring visibility into all user activity in your environment, whether on-premises or in the cloud.
Tracks critical user and administrator logon activity with detailed information on who, what, when, where and from which workstation.
Reports on Active Directory user logons and logoffs by type (interactive, remote, local or network) and length of session to help identify suspicious activity.
Provides complete Azure AD sign-in information, such as which user is signing in, the IP and geographical origin (city, state, country) of the attempt, the application being authenticated to, whether the attempt was successful, and the reason for failure (if applicable).
Simplifies the collection of logon activity for major external regulations and internal security policies.
Correlates disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Includes user entitlements and activity, event trends, suspicious patterns, and more, with rich visualizations and event timelines.
Provides instant, one-click access to all information on the event you’re viewing and all related activity, eliminating guesswork and unknown security concerns.
Delivers a complete solution for auditing user activity from start time to end time about change events (when combined with other Change Auditor modules).
Easily integrate with SIEM solutions to forward Change Auditor events to Splunk, HP Arcsight or IBM QRadar. Additionally, Change Auditor integrates with Quest InTrust for long-term 20:1 compressed event storage and aggregation of native or third-party logs to reduce storage costs on SIEM forwarding and create a highly-compressed log repository.
Provides comprehensive reports that make it easy to comply with best practices, such as reports on access, successful logons and failed logons; authorization comparison reports; and reports grouped by users.
Enables you to configure access so that auditors can run searches and reports without making any configuration changes to the application, all without involving the administrator.
Sends critical alerts on both successful and failed logons via email and mobile devices to enable fast response to security threats, even while you're off site.
Enables viewing, highlighting and filtering of logon activity and related change events over time for better forensic analysis of events and trends.
Enables searches from anywhere using a web browser, and provides targeted dashboard reports that enable upper management and auditors to access the information they need without having to understand architecture or administration.
There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.
The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.
Quad core Intel® Core™ i7 equivalent or better
Minimum: 8 GB RAM or better
Recommended: 32 GB RAM or better
SQL databases supported up to the following versions:
NOTE: Change Auditor does not support SQL high availability technology other than clusters.
Installation platforms (x64) supported up to the following versions:
NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)
For the best performance, Quest strongly recommends:
NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.
In addition, the following software/configuration is required:
Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .
Get answers to critical security and compliance questions
In this new report from the Information Security Community on LinkedIn, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up.
NIST cybersecurity framework enables organizations to create a secure environment. Learn how to apply this framework to your AD and Microsoft environment.
Change Auditor Threat Detection distills AD audit data down to a manageable number of SMART alerts and highlights the riskiest users through pattern-based
Review challenges detecting an insider threat, benefits and limitations of rule-based tools and explore user behavior analytics threat detection solutions
Identify insider threats with advanced machine learning, user and entity behavioral analytics (UEBA), and SMART correlation technology to stop data breach
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
Your Active Directory (AD) security is constantly in a state of change, making it difficult to understand your risks from static reports alone. That’s why you need to actively monitor all changes made in AD — being able to detect suspicious activity and a
Audit all events related to file activity and permissions on your EMC NAS devices.
Strengthen policy enforcement with proactive Lync management
Ensure security, compliance and control of AD and Azure AD.
Simplify and refine LDAP query data
Document all critical group, mailbox and public/private changes to Exchange
Audit all events related to file activity and permissions on your NetApp NAS devices.
Enable faster, easier and more secure Microsoft SharePoint auditing
Efficiently track, audit, report and alert on changes to Microsoft SQL Server in real time
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.
Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.