Change Auditor for SQL Server Overview
Change Auditor for SQL Server makes database auditing easy and secure. The tool tracks, audits, reports and alerts on changes to Microsoft® SQL Server® permissions, access, configurations and data in real time. Translate change events into simple terms to eliminate audit time and complexity.
Change Auditor for SQL Server enables you to instantly identify the “who, what, when, where and originating workstation” details. Armed with this information, you can automatically generate intelligent, in-depth forensics for auditors and management, reducing the risks associated with day-to-day modifications and ensuring confidence at your next audit.
Correlate disparate IT data from numerous systems and devices into an interactive search engine for fast security incident response and forensic analysis. Include user entitlements and activity, event trends, suspicious patterns and more with rich visualizations and event timelines.
Tracks user and administrator activity with detailed information including who, what, when, where, which workstation and why for change events, plus original and current values for all changes.
Sends critical change and pattern alerts to email and mobile devices to prompt immediate action, enabling you to respond faster to threats even while you're not on site.
Removes auditing limitations and captures change information without the need for native audit logs, resulting in faster results and significant savings of storage resources.
Provides the ability to manage, monitor and audit all Microsoft® SQL Server® changes from a single location, which streamlines management of multiple servers and locations to a single, easy-to-use console.
Audits changes to databases and tables. Events that can be audited include additions, removals and changes to rows, procedures, tables, views, triggers and more. All changes provide robust details about the change, including the “who, what, when, where and originating workstation” details.
Generates comprehensive reports for best practices and regulatory compliance mandates for SOX, PCI-DSS, HIPAA, FISMA, GLBA and more.
Configures access so auditors can run searches and reports without making any configuration changes to the application, and without requiring the assistance and time of the administrator.
Enables the viewing, highlighting and filtering of change events and the relation of other events over the course of time in chronological order across your Windows environment for better understanding and forensic analysis of those events and trends.
Provides instant, one-click access to all information on the change you're viewing and all related events, such as what other changes came from specific users and workstations, eliminating additional guesswork and unknown security concerns.
Schedules both the archiving of older data to an archive database enabling organizations to keep critical and relevant data online while improving overall performance of search and data retrieval.
Searches from anywhere using a web browser and creates targeted dashboard reports to provide upper management and auditors with access to the information they need without having to understand architecture or administration.
For a full list of system requirements and required permissions for all components and target systems that can be audited by Change Auditor please refer to the Change Auditor Installation Guide.
The Change Auditor coordinator is responsible for fulfilling client and agent requests and for generating alerts.
Quad core Intel® Core™ i7 equivalent or better
Minimum:8 GB RAM or better
Recommended: 32 GB RAM or better
SQL databases supported up to the following versions:
NOTE:Change Auditor does not support SQL high availability technology other than clusters.
Installation platforms (x64) supported up to the following versions:
NOTE: Microsoft Windows Data Access Components (MDAC) must be enabled. (MDAC is part of the operating system and enabled by default.)
For the best performance, we strongly recommend:
NOTE: Do NOT pre-allocate a fixed size for the Change Auditor database.
In addition, the following software/configuration is required:
In this new report from the Information Security Council, you will learn how your peers are approaching cybersecurity in the era of cloud, including the latest trends and benchmarks to gauge how your own organization stacks up.
Unless you’ve been hiding under a rock, it’s going to come as no surprise that Office 365 adoption is increasing rapidly. With primary drivers like Exchange Online, SharePoint Online and OneDrive, Office 365 is obtaining an average of around 1 million new
Learn about the 5 key trends for insider threats and best practices for protecting Active Directory security.
Insider data breaches are on the rise. Many organisations have recently been affected on a massive scale, and, in each case, Active Directory (AD) accounts have been used to gain access to sensitive data. This is only the tip of the iceberg as these incidents, more often than not, are hidden from public view. The reality is that your organisation could be open to a similar breach due to a lack of insight and excessive privileges.Join us for an interactive hands-on demo day
Simplify and refine LDAP query data
Ensure security, compliance and control of AD and Azure AD.
Document all critical group, mailbox and public/private changes to Exchange
Track, audit and receive reports on all Windows File Server real-time system changes
Audit all events related to file activity and permissions on your EMC NAS devices.
Audit all events related to file activity and permissions on your NetApp NAS devices.
Enable faster, easier and more secure Microsoft SharePoint auditing
Ensure the security, compliance and control of event activity of VMware vCenter Servers