サポートと今すぐチャット
サポートとのチャット

Change Auditor 7.5 - User Guide

Welcome to Change Auditor Help Change Auditor Core Functionality
Change Auditor Core Functionality Change Auditor Overview Agent Deployment Change Auditor Client Overview Overview Page Searches Search Results and Event Details Custom Searches and Search Properties Enable Alert Notifications Administration Tasks Agent Configurations Coordinator Configuration Purging and Archiving your Change Auditor Database Working with Private Alerts and Reports Generate and Schedule Reports SQL Reporting Services Configuration Change Auditor User Interface Authorization Client Authentication Certificate authentication for client coordinator communication Integrating with On Demand Audit Enable/Disable Event Auditing Account Exclusion Registry Auditing Service Auditing Agent Statistics and Logs Coordinator Statistics and Logs Change Auditor Commands Change Auditor Email Tags
Microsoft 365 and Microsoft Entra ID Auditing Change Auditor for Active Directory
Change Auditor for Active Directory Overview Custom Active Directory Searches and Reports Custom Active Directory Object Auditing Custom Active Directory Attribute Auditing Member of Group Auditing Active Directory Federation Services Auditing ADAM (AD LDS) Auditing Active Directory Database Auditing Active Roles Integration Quest GPOADmin Integration Active Directory Protection Event Details Pane About us
Change Auditor for Authentication Services Change Auditor for Defender Change Auditor for EMC Change Auditor for Exchange Change Auditor for Windows File Servers Change Auditor for Active Directory Queries Change Auditor for Logon Activity Change Auditor for NetApp Change Auditor for SharePoint Change Auditor for SQL Server Change Auditor SIEM Integration Guide
Webhooks in Change Auditor Integrating Change Auditor and SIEM Tools Subscription Management
Adding the PowerShell module Viewing available commands and help Connecting to Change Auditor Managing subscriptions Working with event subscriptions in the client Managing a Splunk integration Splunk event subscription wizard Managing an IBM QRadar integration QRadar event subscription wizard Managing a Micro Focus Security ArcSight Logger and Enterprise Security Manager (ESM) integration ArcSight event subscription wizard Managing a Quest IT Security Search integration (Preview) Managing a Syslog integration Syslog event subscription wizard Managing a Microsoft Sentinel integration Microsoft Sentinel event subscription wizard
Webhook technical insights
Change Auditor Threat Detection Deployment Change Auditor Threat Detection Dashboard Change Auditor PowerShell Command Guide Change Auditor Dialogs
Change Auditor dialogs
Quest Change Auditor dialog Add Administrator Add Agents, Domains, Sites dialog Add Container dialog Add Active Directory Container dialog (AD Query) Add Facilities or Event Classes dialog Add Facilities or Event Classes dialog (Add With Events) Add File System Path dialog Add Foreign Forest Credential Add Group Policy Container dialog Add Local Account dialog Add Logons dialog Add Logons dialog (Add With Events) Add Object Classes dialog Add Object Classes dialog (Add With Events) Add Origin dialog Add Origin dialog (Add With Events) Add Registry Key dialog Add Results dialog Add Service dialog Add Service dialog (Add With Events) Add Severities dialog Add Severities dialog (Add With Events) Add SharePoint Path dialog Add SQL Instance dialog Add SQL Data Level Object Add Users, Computers or Groups dialog Add Where dialog Add Who dialog Advanced Deployment Options dialog Agent Assignment dialog Alert Body Configuration dialog Alert Custom Email dialog Auditing and Protection Templates dialog Authorizations: Application Group dialog Authorizations: Operations | Role Definitions | Task Definitions | Application Group Authorizations: Role dialog Authorizations: Task dialog Auto Deploy to New Servers in Forest dialog Browse for Folder dialog Browse SharePoint dialog Comments dialog Configuration Setup dialog Configure cepp.conf Auditing dialog Connection screen Coordinator Configuration tool Coordinator Credentials Required dialog Credentials Required dialog Custom Filter dialog Database Credentials Required dialog Directory object picker Domain Credentials dialog Eligible Change Auditor Agents dialog Event Logging dialog Export/Import dialog Install or Upgrade/Uninstall/Update Foreign Agent Credentials IP Address dialog Log page Logon Credentials dialog (Deployment page) Logon Credentials dialog (EMC Auditing wizard) Manage Connection Profiles dialog New Report Layout dialog Microsoft 365 dialog Rename dialog Save As dialog Select a SQL Instance and Database dialog Select Destination Folder dialog Select Exchange Users dialog Select Registry Key dialog Select SQL Reporting Services Template dialog Shared Mailboxes dialog SharePoint Credentials Required dialog When dialog
About Us

File System Protection page

Previous Next


File System Protection page

The File System Protection page displays when File System is selected from the Protection task list in the navigation pane of the Administration Tasks tab. From this page you can launch the File System Protection wizard to specify a file or folder to be protected from unauthorized access. You can also edit existing templates, disable a template, and remove templates that are no longer being used.

The File System Protection page contains an expandable view of all the File System Protection templates that have been previously defined. To add a new template to this list, click Add. Once added, the following information is provided for each template:

Template

Displays the name assigned to the template when it was created.

Status

Indicates whether the template is enabled or disabled. To enable/disable the template, place your cursor in this Status cell, click the arrow control and select the appropriate option from the drop-down menu.

Override Accounts

Indicates whether the override accounts listed are excluded from protection or included in protection. This setting corresponds to the option used at the top of the last page of the File System Protection wizard:

Excluded from Protection - indicates you selected the Allow option to allow only the selected accounts to change the protected objects.
Included in Protection - indicates you selected the Deny option to allow all accounts to change the protected objects EXCEPT for those selected.
Paths

This field is used for filtering data.

Override Account Filter

This field is used for filtering data.

 

Click the expansion box to the left of the Template name to expand this view and display the following details for each template:

Path

Displays the name of the file system included in the File System Protection template.

Status

Indicates whether the protection for the file path is enabled or disabled.

Subfolders

Indicates whether subfolders under the file system path are also being protected.

Protect

Indicates whether a file system path is to be protected (Yes) or excluded from protection (No).

File Masks

Displays the file masks specified on the first page of the wizard.

Applies To

Indicates what is being protected: Files and Folders, Files, Folders, or Shares.

Protection Type

Indicates the type of operation(s) to be prevented as specified on the first page of the wizard.

Override Account

Displays any accounts that are allowed (or not allowed) to change the protected files/folders, as specified on the last page of the wizard.

File System Protection templates

Previous Next


File System Protection templates

To enable protection, create a File System Protection template which specifies the files/folders to lock down. You can then add this template to an agent configuration, which then needs to be assigned to the appropriate agents.

NOTE: If you are planning to use multiple File System Protection templates, refer to the Change Auditor Technical Insight Guide for more information on how multiple protection templates are evaluated.
To create a protection template:
2
Click Protection.
3
Select File System under the Protection task list to open the File System Protection page.
4
Click Add to open the File System Protection wizard which steps you through the process of creating a File System Protection template.
5
In the Template Name field, enter a descriptive name for the template.
6
In the Path field, enter or click the Browse button to specify the file system path to protect. Click Add to move the specified file system path to the selection list.
[All] (default)
11
Use the File Mask field to optionally specify a file mask to protect a group of files in the selected file system path. Once you have specified a file mask, click Add to add it to the list at the bottom of the page.
NOTE: The Allow option is selected by default indicating that the selected users or groups will be allowed to change the protected objects. However, you can select the Deny option at the top of this page and select individual users or groups that are NOT allowed to change the protected objects. When using the Deny option, you are allowing all users and groups to change the protected objects except for those selected on this page.
13
Protect access from all locations: Protection is always enabled regardless of the location.
Protect access only from select locations: Protection is only enabled for the specified locations.
Disable protection only for select locations: Protection is disabled for the selected locations. Enabled everywhere else.
Protect access from all unknown locations: All file system requests from locations that cannot be determined by the agent will be protected.

Clicking Finish creates the template, closes the wizard, and returns you to the File System Protection page where the newly created template is now listed.

16
To create the template and assign it to an agent configuration, expand Finish and select Finish and Assign to Agent Configuration.

On the Configuration Setup dialog, use one of the following methods to assign this template to an agent configuration:

On the Agent Configuration page, select the agents assigned to use the modified agent configuration and click Refresh Configuration to ensure the agents are using the latest configuration.
To modify a template:

This displays the File System Protection wizard, where you can modify the files or folders to be protected.

2
Click Finish or expand Finish and select Finish and Assign to Agent Configuration.
To disable a template:

The disable feature allows you to temporarily stop protecting the specified file path without having to remove the protection template or individual file path from an active template.

Place your cursor in the Status cell for the template to be disabled, click the arrow control and select Disabled.

The entry in the Status column for the template will change to ‘Disabled’.

2
To re-enable the protection template, use the Enable option in either the Status cell or right-click menu.
To disable the protection of a file path in a template:
Place your cursor in the Status cell for the file path to be disabled, click the arrow control and select Disabled.

The entry in the Status column for the selected file path will change to ‘Disabled’.

2
To re-enable protection of a file path, use the Enable option in either the Status cell or right-click menu.
To delete a template:
To delete a file path from a template:

File System Protection wizard

Previous Next


File System Protection wizard

The File System Protection wizard displays when you click Add or Edit on the File System Protection page. This wizard steps you through the process of creating a new file system protection template, identifying the files and/or folders to be included in the template.

The following table provides a description of the fields and controls in the File System Protection wizard:

Table 3. File System Protection wizard

Create or modify a File System Protection Template page

Use the first page of the wizard to enter a name for the template and specify the file system path to be protected.

Template Name

Enter a descriptive name for the template being created.

Path

Enter or use the browse button to specify the file system path to be protected.

After entering or selecting the files system path to be protected, click the Add button to add it to the File System Path list.

Selecting the browse button displays the Browse For Folder dialog allowing you to browse for and select the file system path which is to be protected by Change Auditor.

File System Path list

The file system paths selected for protection are displayed in the list box located in the middle of the page. Use the buttons to the right of the Path field to add and remove file system paths.

Add - Click to move the entry in the Path text box to the File System Path list.
Remove - Select an entry in the File System Path list and click Remove to remove it.

Subfolders

By default, protection will include the subfolders in the selected file system path. However, if you want to exclude subfolders from protection, click the arrow control in the Subfolders cell and click No.

Protect

By default, the specified file system path will be protected. However, to exclude the selected file system path from protection, click the arrow control in the Protect cell and click No.

Applies To

By default, protection will be applied to both files and folders in the selected file system path. To protect just files, folders or shares, click the arrow control in the Applies To cell and select one of the following options:

File Mask

If applicable, this cell displays the file mask, which is used to protect a group of files, as specified at the bottom of the page.

Protection Type

By default, protection will prevent ‘all’ operations from occurring. However, to protect against specific operations, click the arrow control in the Protection Type cell and select one or more of the following operations:

[All] (default)

File Mask

Use this field to optionally specify a file mask to protect a group of files. You can use any combination of ? or * wildcard characters.

Once you have specified a file mask, click Add to add it to the list at the bottom of the page and the File Masks cell in the File System Path list (middle of the page).

File Masks list

The list box at the bottom of the page lists the file masks specified for this protection template. Use the buttons to the right of the File Mask field to add and remove masks.

Add - Click to move the entry in the text box to the File Masks list.
Remove - Select an entry in the File Masks list and click Remove to remove it

(Optional) Select Accounts Allowed (Not allowed) to Access Protected Objects page

Use this page to optionally specify user and group accounts that are authorized to make changes to the specified protected objects.

Allow

The Allow option is selected by default indicating that the accounts selected on this page will be the only accounts allowed to make changes to the protected objects.

Use the Browse or Search page to select the user or group accounts.

Deny

Select the Deny option if you would like to allow all users and groups to change the protected objects EXCEPT for those selected on this page.

Use the Browse or Search page to select the user or group accounts.

 

Browse page

Displays a hierarchical view of the containers in your environment allowing you to locate and select the users or groups that will be allowed (not allowed) to change the protected objects.

Once you have selected an account, use Add to add it to the list at the bottom of the page.

Search page

Use the controls at the top of the Search page to search your environment to locate the users or groups that will be allowed (not allowed) to change the protected objects.

Once you have selected an account, use Add to add it to the list at the bottom of the page.

Options page

Use the Options page to modify the search options used to retrieve directory objects.

Override Account list

The list box across the bottom of the page displays the user and group accounts that are allowed (not allowed) to change the protected objects selected on the previous page of the wizard. Use the buttons located above this list box to add and remove accounts.

Add - Select an account in the Browse or Search page and click Add to add it to the Override Account list.
Remove - Select an account in the Override Account list and click Remove to remove it.

(Optional) Schedule when protection is enabled

 

You can either select to have the protection always run or have it run only during specific times.

To enable the protection only during specific times, select the Protection is scheduled option, and define when it should be enabled (hour blocks on a weekly basis).The times selected are the local agent time where the template is applied.

When the schedule is disabled, ALL options are disabled with it, including any denied access to the specified users.

The scheduling options override all other protection settings.

(Optional) Enable or disable protection for specific location

Control when the protection is enabled based on the location. Location refers to the computer that is attempting to access the resource that is protected. Select from the following options:

The location options override all other protection settings.

File System Events

Previous Next


File System Events

The following events can be selected for auditing from the Events tab on the File System Auditing wizard. The events listed on the Events tab is based on the file/folder specified in the Audit Path and the coverage specified in the Scope cell.

File Events
NOTE: This event is not available when This object and all child objects is selected in the Scope cell.
Folder Events
NOTE: This event is not available when This object and all child objects is selected in the Scope cell.
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択