For the best web experience, please use IE10+, Chrome, Firefox, or Safari

Change Auditor for Logon Activity

Get answers to critical security and compliance questions

Increasing compliance regulations and security concerns make automated, reliable and complete tracking of user activity essential, but most third-party tools are cumbersome to implement and don’t provide the level of auditing required to ensure adequate accountability of user actions. Native tools, on the other hand, lack the visibility, alerting, auditing and data security required to succeed.

With Change Auditor for Logon Activity, you can promote better security, auditing and compliance in your organization by capturing, alerting and reporting on all user logon/logoff and sign-in activity, both on premises and in the cloud.

Key Benefits

Hybrid environment auditing

Get a single, correlated view of all AD user logons/logoffs and Azure AD sign-ins, with visibility of all activity whether on-prem or in the cloud.

At-a-glance display

Tracks critical user and administrator logon activity with detailed information on who, what, when, where and from which workstation.

Change auditing

Get a complete solution for auditing user activity from start time to end time about change events (when combined with other Change Auditor modules).

Change Auditor Threat Detection

Detect insider threats proactively with user behavior analytics and reduce the noise of false positive alerts.

Compliance-ready reporting

Simplify the collection of logon activity for major external regulations and internal security policies.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

Features

Integrated event forwarding

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Best practice reporting

Get comprehensive reports that make it easy to comply with best practices, such as reports on access, successful logons and failed logons; authorization comparison reports; and reports grouped by users.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Hybrid security awareness

Report on Active Directory user logons and logoffs by type (interactive, remote, local or network) and length of session to help identify suspicious activity. Get complete Azure AD sign-in information, such as which user is signing in, the IP and geographical origin (city, state, country) of the attempt, the application being authenticated to, whether the attempt was successful, and the reason for failure (if applicable).

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.

Security timelines

Enables viewing, highlighting and filtering of logon activity and related change events over time for better forensic analysis of events and trends.
Stevie Awards 2018 People’s Choice winner

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018.

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017
  • NOTE: Change Auditor supports SQL AlwaysOn Availability Groups and SQL Clusters.

    Operating system

    Installation platforms (x64) supported up to the following versions:

    • Windows Server 2012
    • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

    Coordinator software and configuration

    For the best performance, Quest strongly recommends:

    • Install the Change Auditor coordinator on a dedicated member server.
    • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

    NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

    In addition, the following software/configuration is required:

    • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
    • x64 version of Microsoft’s .NET 4.7.1
    • x64 version of Microsoft XML Parser (MSXML) 6.0
    • x64 version of Microsoft SQLXML 4.0
    Coordinator footprint
    • Estimated hard disk space used: 1 GB.
    • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
    • Estimated database size will vary depending on the number of agents deployed and audited events captured.

    Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

    Change Auditor for Logon Activity
    Datasheet
    Change Auditor for Logon Activity
    Change Auditor for Logon Activity
    Get answers to critical security and compliance questions
    Read Datasheet
    How to Spot Insider Threats Before They Wreak Havoc
    E-book
    How to Spot Insider Threats Before They Wreak Havoc
    How to Spot Insider Threats Before They Wreak Havoc
    Change Auditor Threat Detection distills AD audit data down to a manageable number of SMART alerts and highlights the riskiest users through pattern-based
    Read E-book
    Manufacturer ensures security and GDPR compliance
    Case Study
    Manufacturer ensures security and GDPR compliance
    Manufacturer ensures security and GDPR compliance

    To continue to thrive in its competitive market, Beltrame Group had modernized its IT environment, with help from Que

    Read Case Study
    Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
    Case Study
    Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
    Howard County, Maryland, improves security and service availability, while saving hours of IT work, with solutions from Quest.
    Howard County, Maryland, uses Microsoft platform management solutions from Quest, which enable accurate and efficient account provisioning, Group Policy administration, change auditing, disaster recovery, and more — while saving the IT team hours of work.
    Read Case Study
    Tackling insider threat detection with user behavior analytics
    White Paper
    Tackling insider threat detection with user behavior analytics
    Tackling insider threat detection with user behavior analytics
    Review challenges detecting an insider threat, benefits and limitations of rule-based tools and explore user behavior analytics threat detection solutions
    Read White Paper
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    E-book
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    Your Active Directory (AD) security is constantly in a state of change, making it difficult to understand your risks from static reports alone. That’s why you need to actively monitor all changes made in AD — being able to detect suspicious activity and a
    Read E-book
    Inside Change Auditor Threat Detection
    Technical Brief
    Inside Change Auditor Threat Detection
    Inside Change Auditor Threat Detection
    Identify insider threats with advanced machine learning, user and entity behavioral analytics (UEBA), and SMART correlation technology to stop data breach
    Read Technical Brief
    Protecting Data in the Healthcare Industry
    White Paper
    Protecting Data in the Healthcare Industry
    Protecting Data in the Healthcare Industry
    This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
    Read White Paper

    Get started now

    Get alerts and reports on user logon/logoff and sign-in activity, on prem and in the cloud.

    Support & Services

    Product Support

    Self-service tools will help you to install, configure and troubleshoot your product.

    Support Offerings

    Find the right level of support to accommodate the unique needs of your organization.

    Professional Services

    Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

    Education Services

    Training courses delivered through online web-based, on-site or virtual instructor-led.