For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Change Auditor for Logon Activity

Track and alert on AD logon and logoff activity and Azure AD sign-ins

How to audit user network logon activity in Change Auditor for Logon Activity 05:02

Increasing compliance regulations and security concerns make automated, reliable and complete tracking of user logon and logoff activity essential. Unfortunately, most third-party tools are cumbersome to implement and don’t provide the level of auditing required to ensure adequate accountability of user actions. And native tools lack the visibility, alerting, auditing and data security required to succeed.

With Change Auditor for Logon Activity, you can promote better security, auditing and compliance in your organization by capturing, alerting and reporting on all AD logon/logoff and Azure AD sign-in activity. Track both Kerberos and NTLM authentications to help proactively identify vulnerabilities.

Hosted dashboard

View all AD logons/logoffs, Azure AD sign-ins and Office 365 activity together in On Demand Audit with flexible search and rich visualization.

At-a-glance display

Track critical logon activity with detailed information on who, what, when, where and from which workstation.

User activity auditing

Audit the timeline of an administrator’s activity, from logon to logoff and all actions in between (when combined with other Change Auditor modules).

SIEM integration

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Golden Ticket detection

Detect and alert on common Kerberos authentication vulnerabilities used during Golden Ticket / Pass-the-ticket attacks.

NTLM authentication auditing

Detect applications that are still using less secure NTLM authentications.

Compliance-ready reporting

Simplify the collection of logon activity for major external regulations and internal security policies.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

On Demand Audit Hybrid Suite for Office 365

On Demand Audit Hybrid Suite for Office 365

Upgrade to the On Demand Audit Hybrid Suite for Office 365, which includes Change Auditor for Logon Activity plus Change Auditor for Active Directory and On Demand Audit. Pair them easily in a few clicks to get a single, hosted view of all changes made across AD, Azure AD, Exchange Online, SharePoint Online, OneDrive for Business and Teams. Simplify investigations with responsive search and interactive data visualization, and retain audit history for up to 10 years.

Features

Best practice reporting

Get comprehensive reports that make it easy to comply with best practices, such as reports on access, successful logons and failed logons; authorization comparison reports; and reports grouped by users.

Hybrid security awareness

Report on AD user logons and logoffs, and correlate with Azure AD sign-ins to help identify suspicious activity across your hybrid cloud environment. Information captured includes the type of logon, the IP address and geographical origin, the application being authenticated to, and whether the attempt was successful.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, including all other changes that were made by the specific user, eliminating additional guesswork and unknown security concerns.

Security timelines

Enables viewing, highlighting and filtering of logon activity and related change events over time for better forensic analysis of events and trends.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.
Stevie Awards 2018 People’s Choice winner

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018.

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017
  • Microsoft SQL Server 2019
  • NOTE: Change Auditor supports SQL AlwaysOn Availability Groups, SQL Clusters, and databases that have row and page compression applied

    Operating system

    Installation platforms (x64) supported up to the following versions:

    • Windows Server 2012
    • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

    Coordinator software and configuration

    For the best performance, Quest strongly recommends:

    • Install the Change Auditor coordinator on a dedicated member server.
    • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

    NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

    In addition, the following software/configuration is required:

    • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
    • x64 version of Microsoft’s .NET 4.7.1
    • x64 version of Microsoft XML Parser (MSXML) 6.0
    • x64 version of Microsoft SQLXML 4.0
    Coordinator footprint
    • Estimated hard disk space used: 1 GB.
    • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
    • Estimated database size will vary depending on the number of agents deployed and audited events captured.

    Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

    Resources

    Change Auditor for Logon Activity
    Datasheet
    Change Auditor for Logon Activity
    Change Auditor for Logon Activity
    Alert and report on AD logon and logoffs and Azure AD sign-in activity
    Read Datasheet
    Top 10 Active Directory Security Reports and Alerts You Need
    White Paper
    Top 10 Active Directory Security Reports and Alerts You Need
    Top 10 Active Directory Security Reports and Alerts You Need
    Check out this white paper to discover the top 10 reports and alerts you need to ensure the stability and security of your on-prem or hybrid Active Directory, and see how easily you can get them with Change Auditor.
    Read White Paper
    Five Ways to Improve Auditing of Your Hybrid Active Directory
    White Paper
    Five Ways to Improve Auditing of Your Hybrid Active Directory
    Five Ways to Improve Auditing of Your Hybrid Active Directory
    Discover just five of the ways On Demand Audit Hybrid Suite for Office 365 helps you secure your hybrid AD environment.
    Read White Paper
    Manufacturer ensures security and GDPR compliance
    Case Study
    Manufacturer ensures security and GDPR compliance
    Manufacturer ensures security and GDPR compliance
    To continue to thrive in its competitive market, Beltrame Group had modernized its IT environment, with help from Quest migration tools. But the IT team lacked the deep visibility required to properly manage and secure their new hybrid ecosystem. Now, with Change Auditor solutions for Active Directo
    Read Case Study
    Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
    Case Study
    Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
    Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
    Howard County, Maryland, uses Microsoft platform management solutions from Quest, which enable accurate and efficient account provisioning, Group Policy administration, change auditing, disaster recovery, and more — while saving the IT team hours of work.
    Read Case Study
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    E-book
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    Your Active Directory (AD) security is constantly in a state of change, making it difficult to understand your risks from static reports alone. That’s why you need to actively monitor all changes made in AD — being able to detect suspicious activity and a
    Read E-book
    Three ways a privileged user can hose your Active Directory
    E-book
    Three ways a privileged user can hose your Active Directory
    Three ways a privileged user can hose your Active Directory
    This eBook reviews insider threats and eight AD security best practices to reduce risk and recovery time.
    Read E-book
    Top 10 Security Events to Monitor in Azure Active Directory and Office 365
    E-book
    Top 10 Security Events to Monitor in Azure Active Directory and Office 365
    Top 10 Security Events to Monitor in Azure Active Directory and Office 365
    Discover how native auditing tools can help with cloud security — and how to overcome their shortcomings.
    Read E-book

    Videos

    How to audit user network logon activity in Change Auditor for Logon Activity
    How to audit user network logon activity in Change Auditor for Logon Activity

    05:02

    Video
    How to audit user network logon activity in Change Auditor for Logon Activity
    This video demonstrates how to audit user network logon activity in Change Auditor for Logon Activity.
    Watch Video
    Detecting the use of Golden Tickets with Change Auditor for Logon Activity
    Detecting the use of Golden Tickets with Change Auditor for Logon Activity

    04:43

    Video
    Detecting the use of Golden Tickets with Change Auditor for Logon Activity
    Detect and alert on common Kerberos authentication vulnerabilities used during Golden Ticket / Pass-the-ticket attacks.
    Watch Video
    How to search and alert on suspicious logon activity in AD and Office 365
    How to search and alert on suspicious logon activity in AD and Office 365

    06:02

    Video
    How to search and alert on suspicious logon activity in AD and Office 365
    Discover how to search and alert on suspicious logon activity in your AD, Office and hybrid environment with the On Demand Audit Hybrid Suite.
    Watch Video
    Change Auditor 7.1 – New Features
    Change Auditor 7.1 – New Features

    10:32

    Video
    Change Auditor 7.1 – New Features
    Explore Change Auditor’s new features, such as Golden Ticket detection & auditing Kerberos and NTLM authentication.
    Watch Video
    What is Quest Change Auditor and how does it compare to and complement Microsoft ATP and third-party SIEM solutions?
    What is Quest Change Auditor and how does it compare to and complement Microsoft ATP and third-party SIEM solutions?

    14:10

    Video
    What is Quest Change Auditor and how does it compare to and complement Microsoft ATP and third-party SIEM solutions?
    Hear Quest product experts, Ghazwan Khairi, Bryan Patton and Robert Tovar discuss the real-time security and IT auditing of Change Auditor and how it compares to and integrates with SIEM solutions and Microsoft Advanced Threat Protection.
    Watch Video
    How to integrate Change Auditor with On Demand Audit
    How to integrate Change Auditor with On Demand Audit

    04:58

    Video
    How to integrate Change Auditor with On Demand Audit
    Learn how to integrate Change Auditor with On Demand Audit from Quest.
    Watch Video
    Change Auditor integration with SIEM solutions and Quest InTrust
    Change Auditor integration with SIEM solutions and Quest InTrust

    02:54

    Video
    Change Auditor integration with SIEM solutions and Quest InTrust
    See what's new in Change Auditor 7.0 including integration with SIEM solutions and Quest InTrust.
    Watch Video

    Blogs

    Change Auditor 7.1: What’s New

    Change Auditor 7.1: What’s New

    The Change Auditor for Logon Activity 7.1 update allows for auditing of Kerberos and NTLM authentications to promote better security and compliance. Learn more.

    Quest Security Assessments Reveal Top 4 Issues in Active Directory: Groups and OSs (Part 3 of 3)

    Quest Security Assessments Reveal Top 4 Issues in Active Directory: Groups and OSs (Part 3 of 3)

    In the third and final part of this Active Directory security issues series, we take a look at the problems with Groups and Operating Systems (OSs). Learn more.

    CISA Office 365 Alert and 10 Security Actions to Take Now by Sean Metcalf (from our latest TEC Talk)

    CISA Office 365 Alert and 10 Security Actions to Take Now by Sean Metcalf (from our latest TEC Talk)

    This blog post will outline the CISA alert, prior CISA advice for securing Office 365 and point you to a TEC Talk by Microsoft Certified Master Sean Metcalf (@PyroTek3) that addresses the 10 (and more) Azure AD and Office 365 security tasks to do now!

    Workforce and IT Refresher Tips to Avoid COVID-19 Phishing Attempts

    Workforce and IT Refresher Tips to Avoid COVID-19 Phishing Attempts

    “Let no crisis go to waste.” This is the new mantra of every cyber criminal in the age of COVID-19. Around the globe, organizations are seeing an increase in phishing attempts that exploit our fear and desire for coronavirus information, ...

    The Many Colors of AD Security – Microsoft Red Forest, Orange Forest, Greenfield or Blue?

    The Many Colors of AD Security – Microsoft Red Forest, Orange Forest, Greenfield or Blue?

    Discover the different models of Active Directory (AD) security, including the Red and Orange Forest models, Greenfield migrations, and Blue Team.

    Top 10 Security Events to Monitor in Azure AD and Office 365 – [New eBook]

    Top 10 Security Events to Monitor in Azure AD and Office 365 – [New eBook]

    Learn about 10 places in your cloud environment that log important audit events. See how native tools fall short of ensuring your auditing compliance.

    Get started now

    Alert and report on AD logon and logoffs and Azure AD sign-in activity.

    Support and services

    Product Support

    Self-service tools will help you to install, configure and troubleshoot your product.

    Support Offerings

    Find the right level of support to accommodate the unique needs of your organization.

    Professional Services

    Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

    Education Services

    Training courses delivered through online web-based, on-site or virtual instructor-led.