Change Auditor
It is a solution that provides holistic, real-time, and detailed recording capabilities for many different environments. It brings a practical and manageable solution for monitoring and reporting changes. It is managed by being audit ready (with pre-built templates such as ISO 27001, PCI DSS, SOX, etc.) and controlling role-based access.
It can generate instant alerts, make detailed calls, and feed solutions to a central logging system (SIEM), making an organization’s security and monitoring structure simple and functional. Change Auditor is a structure that works in integration with its lightweight agent software installed on the servers to be monitored and whose central server is called Change Auditor coordinator.
In this structure, using the standard log structure of the systems, their logs are created by change auditor agents and reported to the central office. Change prevention is possible with the use of agents on some platforms. There are many platforms that are supported by change auditor. Active Directory, Exchange and Fileserver are the most common.
Change Auditor for Active Directory:
It monitors critical Microsoft Active Directory reports in real time, generating reports and alerts. This powerful Windows reporting tool improves security by instantly reporting questions such as “Who, where and what has been changed?”. It also compares unique and current values for quick troubleshooting and improvement and creates intelligent and detailed records to ensure internal security and compliance.
At a glance: It reports in detail the activities of the desired users and administrators and who did what, when, where, with which client.
Real-time alerts: it sends critical changes and patterns as alerts via email to mobile devices, allowing you to respond quickly to threats even when you’re not there.
Account Lockout: It detects the source of the problem by IP address/ Business Workstation, to easily resolve the account lockout issue.
Object protection: protects the most critical Active Directory objects from changes.
Powerful inspection engine: it removes audit restrictions and captures change information without requiring native management logs. As a result, it enables faster results and significant savings in storage resources.
Role-based access : Access is configurable so auditors can search and get reports without configuration changes in the app and without administrators or wizards spending time.
AD Change Rollback: With a single click, it restores unauthorized, incorrect and inappropriate changes to their previous values and can roll back privileged user requests.
Change Auditor for Windows File Server: Effectively and inexpensively audits and controls changes on file servers. It monitors, audits, reports and generates alerts for important changes without real-time or natural audit burdens. It allows you to instantly know details such as “who did what, when, where, and on which workstation” for quick troubleshooting.
At-a-glance visibility: It gives detailed information about the changes made by users and administrators and monitors the original updated data.
Central audit: provides the ability to manage and control changes across the entire file server from a single console.
Share Control: monitors all activities related to file sharing. It helps administrators access shared files by capturing all changes in real time.
Web-based access with dashboard reports: You can search and create targeted indicators for management and auditors using any web browser.
Change Auditor for Exchange: Like the entire Change Auditor family, it works by installing Change Auditor for Exchange agents integrated with Change Auditor Coordinator on Microsoft Exchange servers.
At a glance: It provides important information such as who did what, when, where, with which client with the email users and administrators and their values before changes and current values.
Monitoring of accesses to the e-mail box by persons other than the owner: It ensures that accesses (e.g. administrative staff, system administrators) and changes to the e-mail box are stored in detail.
Immediate alerts to Mobile Devices: Critical changes and alerts can be forwarded to mobile devices via email or mobile app for quick action.
Object Protection: It prevents people other than the owner from accessing sensitive or critical email inboxes.
Incident Time Flow: It allows monitoring, filtering and analysing the chronological or relational status of changes and access operations.
Related Search: It displays all other incidents related to the incident being reviewed with just one click.
Server Configuration Change Review: Allows you to review configuration and policy changes on Microsoft Exchange Server.
ActiveSync Reporting: It keeps records of mobile devices accessing email with ActiveSync, e.g. email, calendar, device registration.
Monitoring Common Folders: Tracks and reports on changes made to Exchange shared folders.