For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Change Auditor for Logon Activity

Active Directory user login reporting and detection of vulnerabilities and suspicious behavior in hybrid AD authentications. Increasing compliance regulations and security concerns make automated and reliable tracking of user logon and logoff activity essential. Unfortunately, most third-party tools are cumbersome to implement and don’t provide the level of auditing required to ensure adequate accountability of user actions. And system-provided auditing tools lack the ability to detect crucial vulnerabilities and exploits adversaries use to compromise networks. But Change Auditor for Logon Activity changes all that, proactively detecting authentication exploits, unearthing indicators of exposure, and providing Active Directory user login reporting to simplify forensic investigations.
Change Auditor for Logon Activity - Active Directory User Login Report
Change Audtior for Logon Activity
With Change Auditor for Logon Activity, you can promote better security, auditing and compliance in your organization by capturing, alerting and reporting on all AD logon/logoff and Azure AD sign-in activity. Change Auditor for Logon Activity detects common Kerberos exploits, identifies NTLM vulnerabilities and provides easy-to-navigate forensics to determine who did what, and when.

Golden Ticket detection

Detect and alert on common Kerberos authentication vulnerabilities used during Golden Ticket / Pass-the-ticket attacks.

NTLM authentication auditing

Detect applications that are still using less secure NTLM authentications.

Active Directory user login report

Audit Active Directory account logons, from logon to logoff and all actions in between (when combined with other Change Auditor modules).

Hosted dashboard

View all AD logons/logoffs, Azure AD sign-ins and Office 365 activity together in On Demand Audit with flexible search and rich visualization.

360° security protection

From upfront vulnerability assessment, to intrusion detection and monitoring of compromised accounts, Change Auditor has you covered at every step.

SIEM integration

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight, QRadar or any platform supporting Syslog.

Auditor-ready reporting

Generate comprehensive reports to support regulatory compliance mandates for GDPR, PCI DSS, HIPAA, SOX, FISMA / NIST, GLBA and more.

Real-time alerts on the move

Send critical Active Directory user login report alerts to email and mobile devices to prompt immediate action, even while you're not on site.
Overview of On Demand Audit 07:25

On Demand Audit Hybrid Suite for Office 365

Pair Change Auditor with On Demand Audit to get a single, hosted security dashboard of all vulnerabilities and suspicious activity across AD, Azure AD, Exchange Online, SharePoint Online, OneDrive for Business and Teams. On Demand Audit proactively highlights security threats and anomalous activity and accelerates incident investigations through contextual and interactive data visualizations.

Features

Best practice reporting

Get comprehensive Active Directory user login reports that make it easy to comply with best practices, such as reports on access, successful logons and failed logons; authorization comparison reports; and reports grouped by users.

Hybrid security awareness

Report on AD user logons and logoffs, and correlate with Azure AD sign-ins to help identify suspicious activity across your hybrid cloud environment. Information captured includes the type of logon, the IP address and geographical origin, the application being authenticated to, and whether the attempt was successful.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, including all other changes that were made by the specific user, eliminating additional guesswork and unknown security concerns.

Threat timelines

Enables viewing, highlighting and filtering of logon activity and related change events over time for better forensic analysis of events and trends.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized log collection from system-provided or third-party sources, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Large Retail Chain

Change Auditor object protection is a lifesaver. I have it set up to prevent changes to the ACLs on certain directories on our file servers, as well as to protect all administrative accounts. We��ve had pen testers come in and be very surprised that they could not get past the Change Auditor object protection.

Enterprise Administrator, Large Retail Chain Read Case Study

AFV Beltrame Group

With Change Auditor in place, we have not only the continuous monitoring we need to ensure smooth business operations, but a historian that tracks exactly what happened. The GDPR requires tight response times, which are pivotal and compulsory, and Change Auditor enables us to achieve compliance.

Mirco Destro CIO and IT Manager, AFV Beltrame Group Read Case Study

Howard County

When something goes wrong, managers always ask IT for a report on what changed, and they need it now. Native tools didn’t enable us to respond to those requests quickly, especially since we are a limited IT staff. But with Change Auditor, we can start pulling up reports right away. That's really critical for us.

John Eckard Server Team Manager, Howard County Read Case Study

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018.

Tour

Golden Ticket detection
NTLM authentication auditing
Real-time alerts
Hosted dashboard with On Demand Audit
Golden Ticket detection - active directory user login report

Golden Ticket detection

Detect and alert on common Kerberos authentication vulnerabilities used during Golden Ticket / Pass-the-ticket attacks.

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017
  • Microsoft SQL Server 2019
  • Azure SQL Managed Instance (PaaS) with SQL authentication or Azure Active Directory authentication

NOTE: Performance may vary depending on network configuration, topology, and Azure SQL Managed Instance configuration.

NOTE: Change Auditor supports SQL AlwaysOn Availability Groups, SQL Clusters, and databases that have row and page compression applied.

Operating system

Installation platforms (x64) supported up to the following versions:

  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022

NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

Coordinator software and configuration

For the best performance, Quest strongly recommends:

  • Install the Change Auditor coordinator on a dedicated member server.
  • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

NOTE: Microsoft ODBC Driver 17 for SQL Server is required when the Change Auditor database resides on Azure SQL Managed Instance and Azure Active Directory authentication is selected.

NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

In addition, the following software/configuration is required:

  • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
  • x64 version of Microsoft’s .NET 4.7.1
  • x64 version of Microsoft XML Parser (MSXML) 6.0
  • x64 version of Microsoft SQLXML 4.0
Coordinator footprint
  • Estimated hard disk space used: 1 GB.
  • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
  • Estimated database size will vary depending on the number of agents deployed and audited events captured.

Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

Get started now

Alert and report on AD logon and logoffs and Azure AD sign-in activity.

Support and services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.