Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Change Auditor 7.4 - Whats New

What's New in Change Auditor 7.4 What's New in Change Auditor 7.3 What's New in Change Auditor 7.2 What's New in Change Auditor 7.1.1 What's New in Change Auditor 7.1 What's New in Change Auditor 7.0.4 What's New in Change Auditor 7.0.3 What's New in Change Auditor 7.0.2 What's New in Change Auditor 7.0.1 What's New in Change Auditor 7.0

What's New in Change Auditor 7.0.2

As a result of ongoing research and development, and in response to customer feedback, the following enhancements have been made in this release of Quest Change Auditor.

 

Threat Detection updates and enhancements

The following updates are included for your Threat Detection deployment:

SIEM subscription updates and enhancements

The following features have been added to improve your SIEM tool integrations:

Additional PowerShell commands

The following commands are available to help you manage your Change Auditor deployment:

Assign, remove, and get an auditing template for a Change Auditor configuration.

Assign an auditing configuration to a Change Auditor agent.

Run a search.

Manage Windows file system auditing.

 

Create and manage a Quest IT Security Search event subscription.

These commands are in preview mode for this release.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating