For the best web experience, please use IE10+, Chrome, Firefox, or Safari

Change Auditor for SQL Server

Track, report and alert on critical changes to SQL Server

To achieve and maintain security and compliance with regulations and policies, you must protect the data stored in your Microsoft SQL Server databases from intrusion, theft and fraud. You must also report on any events and changes. But collecting user activity from these databases is time-consuming and complex. For easy and secure SQL Server database auditing you need a tool that tracks, audits, reports and alerts on changes to permissions, access, configurations and data in real time.

Change Auditor for SQL Server enables you to instantly identify the “who, what, when, where and originating workstation” details. Armed with this information, you can automatically generate intelligent, in-depth forensics for auditors and management, reducing the risks associated with day-to-day modifications and ensuring confidence at your next audit.

Key Benefits

Centralized SQL Server auditing

Monitor and audit all SQL Server changes from multiple servers and locations all from one single console.

Data-level event auditing

Audit changes to SQL databases and tables, including additions, removals and changes to rows, procedures, tables, views, triggers and more.

At-a-glance display

Track user and administrator activity with detailed information for change events, plus original and current values for all changes.

Real-time alerts on the move

Send critical change and pattern alerts to email and mobile devices to prompt immediate action, even while you're not on site.

Integrated event forwarding

Integrate with SIEM solutions to forward Change Auditor events to Splunk, ArcSight or QRadar.

Auditor-ready reporting

Generate best practice reports for regulatory compliance mandates such as GDPR, SOX, PCI-DSS, HIPAA, FISMA, GLBA and more.

Features

Event archiving

Schedule the archiving of older data to an archive database, enabling organizations to keep critical and relevant data online while improving overall performance of search and data retrieval.

Quest InTrust integration

Integrate with Quest InTrust for 20:1 compressed event storage and centralized native or third-party log collection, parsing and analysis with alerting and automated response actions to suspicious events such as known ransomware attacks or fishy PowerShell commands.

Improved security insights

Correlate disparate IT data from numerous systems and devices into IT Security Search, an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.

Related searches

Provide instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.

Security timelines

View, highlight and filter change events and discover their relation to other security events in chronological order across your Microsoft environment for better forensic analysis and security incident response.
Stevie Awards 2018 People’s Choice winner

Stevie Awards 2018 People’s Choice winner

In the 2018 Stevie Award’s People Choice awards, Change Auditor was voted best software and also won a Silver Stevie for best new product of 2018

Specifications

There are specific system requirements for the Change Auditor coordinator (server-side), Change Auditor client (client-side), Change Auditor agent (server-side), and the Change Auditor workstation and web client (optional components). For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.

The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.

Processor

Quad core Intel® Core™ i7 equivalent or better

Memory

Minimum: 8 GB RAM or better

Recommended: 32 GB RAM or better

SQL Server

SQL databases supported up to the following versions:

  • Microsoft SQL Server 2012 SP4
  • Microsoft SQL Server 2014 SP3
  • Microsoft SQL Server 2016 SP2
  • Microsoft SQL Server 2017
  • NOTE: Change Auditor supports SQL AlwaysOn Availability Groups and SQL Clusters.

    Operating system

    Installation platforms (x64) supported up to the following versions:

    • Windows Server 2012
    • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)

    Coordinator software and configuration

    For the best performance, Quest strongly recommends:

    • Install the Change Auditor coordinator on a dedicated member server.
    • The Change Auditor database should be configured on a separate, dedicated SQL server instance.

    NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.

    In addition, the following software/configuration is required:

    • The coordinator must have LDAP and GC connectivity to all domain controllers in the local domain and the forest root domain.
    • x64 version of Microsoft’s .NET 4.7.1
    • x64 version of Microsoft XML Parser (MSXML) 6.0
    • x64 version of Microsoft SQLXML 4.0
    Coordinator footprint
    • Estimated hard disk space used: 1 GB.
    • Coordinator RAM usage is highly dependent on the environment, number of agent connections, and event volume.
    • Estimated database size will vary depending on the number of agents deployed and audited events captured.

    Additional Account Coordinator minimum permissions required, please see Change Auditor Installation Guide .

    Resources

    Change Auditor for SQL Server
    Datasheet
    Change Auditor for SQL Server
    Change Auditor for SQL Server
    Efficiently track, audit, report and alert on changes to Microsoft SQL Server in real time
    Read Datasheet
    Government agency improves security and productivity
    Case Study
    Government agency improves security and productivity
    Government agency improves security and productivity
    See how our Microsoft Platform Management solutions helped North Central Texas Council of Governments gain real-time control over changes in its hybrid IT
    Read Case Study
    How to Mitigate the Insider Threat
    E-book
    How to Mitigate the Insider Threat
    How to Mitigate the Insider Threat
    This eBook provides solutions to stop insider threats, manage privileged accounts, simplify GPO management and administration.
    Read E-book
    Insider Threat 2018 Report
    White Paper
    Insider Threat 2018 Report
    Insider Threat 2018 Report
    Learn about the 5 key trends for insider threats and best practices for protecting Active Directory security.
    Read White Paper
    Key Strategies for Meeting GDPR Compliance Requirements
    White Paper
    Key Strategies for Meeting GDPR Compliance Requirements
    Key Strategies for Meeting GDPR Compliance Requirements
    This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
    Read White Paper
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    E-book
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    Conversational Geek e-book: Hybrid AD Security Detection & Alerting
    Your Active Directory (AD) security is constantly in a state of change, making it difficult to understand your risks from static reports alone. That’s why you need to actively monitor all changes made in AD — being able to detect suspicious activity and a
    Read E-book
    Protecting Data in the Healthcare Industry
    White Paper
    Protecting Data in the Healthcare Industry
    Protecting Data in the Healthcare Industry
    This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
    Read White Paper
    Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
    White Paper
    Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
    Randy Franklin Smith white paper: Securing Active Directory by Using the NIST Cybersecurity Framework
    NIST cybersecurity framework enables organizations to create a secure environment. Learn how to apply this framework to your AD and Microsoft environment.
    Read White Paper

    Get started now

    Track, report and alert on critical changes to SQL Server

    Support & Services

    Product Support

    Self-service tools will help you to install, configure and troubleshoot your product.

    Support Offerings

    Find the right level of support to accommodate the unique needs of your organization.

    Professional Services

    Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.

    Education Services

    Training courses delivered through online web-based, on-site or virtual instructor-led.