For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Change Auditor for Skype for Business

Strengthen policy enforcement with proactive Skype for Business management

How to audit changes to Skype in Change Auditor for Skype for Business 04:18

Skype for Business lacks out-of-the-box auditing, reporting and alerting capabilities. This can lead to poor visibility into your organization’s security settings and configurations. And that can result in compliance and security failures, system communication downtime and decreased productivity.

Get complete visibility into how your communication environment is set up and enforced with a single solution. Change Auditor for Skype for Business audits, alerts and reports on administrator activity, security and configuration changes in real time. With its enterprise-wide visibility, it allows you to see how Skype for Business is configured and enforced, allowing you to proactively enforce communication policies, eliminate mistakes or violations and reduce downtime.

At-a-glance display

Track critical Skype for Business changes made by admins including adding, deleting or modifying user accounts, backend configurations and security settings. Get detailed information on who, what, when, where and from which workstation for change events, plus original and current values for all changes.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

Integrated event forwarding

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Role-based access

Configure access so auditors can run searches and reports without making any configuration changes to the application, and without requiring the assistance and time of the administrator.

Web-based access

Search from anywhere using a web browser and create targeted dashboard reports to provide upper management and auditors with access to the information they need without having to understand architecture or administration.

Best practice reporting

Get visibility into all Skype for Business activity with comprehensive best practice reports for infrastructure updates, administrator changes and user configurations.

Security timelines

Enables viewing, highlighting and filtering of change events and related events over time for better forensic analysis.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Stevie Awards 2018 People’s Choice winner

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018.

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017
  • Microsoft SQL Server 2019

NOTE: Change Auditor supports SQL AlwaysOn Availability Groups, SQL Clusters, and databases that have row and page compression applied.

Operating system

Installation platforms (x64) supported up to the following versions:

  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019

NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

Coordinator software and configuration

For the best performance, Quest strongly recommends:

  • Install the Change Auditor coordinator on a dedicated member server.
  • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

In addition, the following software/configuration is required:

  • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
  • x64 version of Microsoft’s .NET 4.7.1
  • x64 version of Microsoft XML Parser (MSXML) 6.0
  • x64 version of Microsoft SQLXML 4.0
Coordinator footprint
  • Estimated hard disk space used: 1 GB.
  • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
  • Estimated database size will vary depending on the number of agents deployed and audited events captured.

Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

Resources

Change Auditor for Skype for Business
Datasheet
Change Auditor for Skype for Business
Change Auditor for Skype for Business
Strengthen policy enforcement with proactive Lync management
Read Datasheet
What is Quest Change Auditor and how does it compare to and complement Microsoft ATP and third-party SIEM solutions?
What is Quest Change Auditor and how does it compare to and complement Microsoft ATP and third-party SIEM solutions?

14:10

Video
What is Quest Change Auditor and how does it compare to and complement Microsoft ATP and third-party SIEM solutions?
Hear Quest product experts, Ghazwan Khairi, Bryan Patton and Robert Tovar discuss the real-time security and IT auditing of Change Auditor and how it compares to and integrates with SIEM solutions and Microsoft Advanced Threat Protection.
Watch Video
Integrated change auditing and event log management for strong security
White Paper
Integrated change auditing and event log management for strong security
Integrated change auditing and event log management for strong security
This white paper explores how you can use Change Auditor and InTrust, either alone or in combination with your SIEM, to improve security and compliance while reducing costs.
Read White Paper
Webcast: Upgrading from Skype for Business to Teams
On Demand Webcast
Webcast: Upgrading from Skype for Business to Teams
Webcast: Upgrading from Skype for Business to Teams
Many organizations are currently using Skype for Business on-premises or online, and have also started adopting Microsoft Teams for Teams collaboration. You want to move to a single platform, but are unsure about Teams vs Skype advantages or the migration strategies you should take.  So, what can
Watch Webcast
Surviving Office 365 Management Woes — An IT Pro's Guide to Understanding the Unexpected Challenges
E-book
Surviving Office 365 Management Woes — An IT Pro's Guide to Understanding the Unexpected Challenges
How to Mitigate the Insider Threat
E-book
How to Mitigate the Insider Threat
How to Mitigate the Insider Threat
This eBook provides solutions to stop insider threats, manage privileged accounts, simplify GPO management and administration.
Read E-book
Top 5 Office 365 and Azure AD Security Events to Monitor During the COVID-19 Crisis
On Demand Webcast
Top 5 Office 365 and Azure AD Security Events to Monitor During the COVID-19 Crisis
Top 5 Office 365 and Azure AD Security Events to Monitor During the COVID-19 Crisis
Increase in remote workers means explosive adoption and utilization of Office 365 workloads such as Teams, SharePoint Online, OneDrive for Business and Exchange Online. Malicious actors can try and take advantage of distracted organizations during a global crisis, so you need to carefully monitor th
Watch Webcast
Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from Home
On Demand Webcast
Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from Home
Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from Home
With the rapid increase of employees working from home, you will need to throw out your old baseline of normal audit activity – especially on the network plane. Users are working on insecure home networks and devices, and connecting to cloud collaboration tools more frequently, which means you
Watch Webcast

Get started now

Proactively manage Skype for Business and strengthen policy enforcement

Support & Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.

Professional Services

Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

Education Services

Training courses delivered through online web-based, on-site or virtual instructor-led.