Events to configure
NOTE: Consider Maintaining the Change Auditor database size when adding events for Threat Detection auditing.Events from the following modules are used to build models and generate alerts:
Table 1. Events used for modeling and alerts
Port Requirements
The following ports are required for Threat Detection server operation:
Table 2. Port requirements
Change Auditor client and Chrome web browser to Threat Detection server
Maintaining the Change Auditor database size
Deploying a Threat Detection server on ESX
To download the Threat Detection server go to https://support.quest.com/change-auditor/7.0.3/download-new-releases.
To deploy the Threat Detection server
2 Select Actions | Deploy OVF Template.
3
4 Under Select name and location, specify the name and inventory location for the deployed template and click Next.
5
6
7 Under Select Storage, select the datastore for the configuration and the disk files and click Next. The Thin Provision option is recommended.
8
9 Under Customize template, enter the deployment properties for the Threat Detection sever.
Fully qualified domain name of the Threat Detection server that has been registered in DNS.
Maintain this password for use when creating the Threat Detection configuration.
10 Click Next.
11You are now ready to create a Threat Detection configuration in Change Auditor.
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center