Chat now with support
Chat with Support

Change Auditor 7.5 - User Guide

Welcome to Change Auditor Help Change Auditor Core Functionality
Change Auditor Core Functionality Change Auditor Overview Agent Deployment Change Auditor Client Overview Overview Page Searches Search Results and Event Details Custom Searches and Search Properties Enable Alert Notifications Administration Tasks Agent Configurations Coordinator Configuration Purging and Archiving your Change Auditor Database Working with Private Alerts and Reports Generate and Schedule Reports SQL Reporting Services Configuration Change Auditor User Interface Authorization Client Authentication Certificate authentication for client coordinator communication Integrating with On Demand Audit Enable/Disable Event Auditing Account Exclusion Registry Auditing Service Auditing Agent Statistics and Logs Coordinator Statistics and Logs Change Auditor Commands Change Auditor Email Tags
Microsoft 365 and Microsoft Entra ID Auditing Change Auditor for Active Directory
Change Auditor for Active Directory Overview Custom Active Directory Searches and Reports Custom Active Directory Object Auditing Custom Active Directory Attribute Auditing Member of Group Auditing Active Directory Federation Services Auditing ADAM (AD LDS) Auditing Active Directory Database Auditing Active Roles Integration Quest GPOADmin Integration Active Directory Protection Event Details Pane About us
Change Auditor for Authentication Services Change Auditor for Defender Change Auditor for EMC Change Auditor for Exchange Change Auditor for Windows File Servers Change Auditor for Active Directory Queries Change Auditor for Logon Activity Change Auditor for NetApp Change Auditor for SharePoint Change Auditor for SQL Server Change Auditor SIEM Integration Guide
Webhooks in Change Auditor Integrating Change Auditor and SIEM Tools Subscription Management
Adding the PowerShell module Viewing available commands and help Connecting to Change Auditor Managing subscriptions Working with event subscriptions in the client Managing a Splunk integration Splunk event subscription wizard Managing an IBM QRadar integration QRadar event subscription wizard Managing a Micro Focus Security ArcSight Logger and Enterprise Security Manager (ESM) integration ArcSight event subscription wizard Managing a Quest IT Security Search integration (Preview) Managing a Syslog integration Syslog event subscription wizard Managing a Microsoft Sentinel integration Microsoft Sentinel event subscription wizard
Webhook technical insights
Change Auditor Threat Detection Deployment Change Auditor Threat Detection Dashboard Change Auditor PowerShell Command Guide Change Auditor Dialogs
Change Auditor dialogs
Quest Change Auditor dialog Add Administrator Add Agents, Domains, Sites dialog Add Container dialog Add Active Directory Container dialog (AD Query) Add Facilities or Event Classes dialog Add Facilities or Event Classes dialog (Add With Events) Add File System Path dialog Add Foreign Forest Credential Add Group Policy Container dialog Add Local Account dialog Add Logons dialog Add Logons dialog (Add With Events) Add Object Classes dialog Add Object Classes dialog (Add With Events) Add Origin dialog Add Origin dialog (Add With Events) Add Registry Key dialog Add Results dialog Add Service dialog Add Service dialog (Add With Events) Add Severities dialog Add Severities dialog (Add With Events) Add SharePoint Path dialog Add SQL Instance dialog Add SQL Data Level Object Add Users, Computers or Groups dialog Add Where dialog Add Who dialog Advanced Deployment Options dialog Agent Assignment dialog Alert Body Configuration dialog Alert Custom Email dialog Auditing and Protection Templates dialog Authorizations: Application Group dialog Authorizations: Operations | Role Definitions | Task Definitions | Application Group Authorizations: Role dialog Authorizations: Task dialog Auto Deploy to New Servers in Forest dialog Browse for Folder dialog Browse SharePoint dialog Comments dialog Configuration Setup dialog Configure cepp.conf Auditing dialog Connection screen Coordinator Configuration tool Coordinator Credentials Required dialog Credentials Required dialog Custom Filter dialog Database Credentials Required dialog Directory object picker Domain Credentials dialog Eligible Change Auditor Agents dialog Event Logging dialog Export/Import dialog Install or Upgrade/Uninstall/Update Foreign Agent Credentials IP Address dialog Log page Logon Credentials dialog (Deployment page) Logon Credentials dialog (EMC Auditing wizard) Manage Connection Profiles dialog New Report Layout dialog Microsoft 365 dialog Rename dialog Save As dialog Select a SQL Instance and Database dialog Select Destination Folder dialog Select Exchange Users dialog Select Registry Key dialog Select SQL Reporting Services Template dialog Shared Mailboxes dialog SharePoint Credentials Required dialog When dialog
About Us

Connection screen

Previous Next


Connection screen

The Connection screen appears when you launch the Change Auditor client (or when you use the File | Connect file menu command after disconnecting). From this screen you can chose to use the default connection profile or define/specify additional connection profiles for connecting to the Change Auditor coordinator.

The following conditions must be met for a client to properly connect:

The Connection screen consists of the following controls:

Profile

If communications are successful, meaning the coordinator service is running and has a valid SCP listening port, the ‘Default Connection’ profile will be displayed in this text box. You can either choose to connect to the coordinator using the default profile or if you have other connection profiles defined, select a different connection profile from the drop-down list.

If the default connection profile is not displayed and you have not defined any connection profiles, click the Manage button to define a new connection profile.

Select the check box to automatically connect to the currently displayed connection profile the next time the Change Auditor client is launched. When this option is selected, this dialog will appear momentarily when the Change Auditor client is launched, requiring no response from you.

You can turn the option off (and on) using the Action menu command.

Disconnect client after 30 minutes of inactivity

Select Disconnect client after 30 minutes of inactivity to disconnect from the coordinator after 30 minutes of inactivity.

Connect

After selecting a connection profile from the drop-down list, click the Connect button to connect to the specified coordinator.

Cancel

Once the Connect button is clicked it changes to a Cancel button. Click the Cancel button to close the Connection screen without connecting to the specified coordinator.

Manage

Use the Manage button to display the Manage Connection Profiles dialog where you can add new profiles, delete or edit profiles and clear the saved logon credentials.

Coordinator Configuration tool

Previous Next


Coordinator Configuration tool

The Coordinator Configuration tool can be used to modify the credentials used by the Change Auditor coordinator when accessing the database. The Coordinator Configuration tool is accessed through the Change Auditor coordinator system tray icon.

By right-clicking on the coordinator system tray icon and selecting the Coordinator Configuration command, the Coordinator Configuration tool appears allowing you to:

This tool consists of the following tabbed pages:

Security page

From the Security page, you can change the database instance and service accounts used to access the database. If User Account Control (UAC) is enabled, a confirmation dialog appears where you can authorize the Coordinator Configuration tool to use the required elevated rights.

Use the fields/options on this dialog to enter the credentials to be used to access the designated SQL server/instance as described below:

SQL server and instance

Enter the name or IP address of the SQL instance to be used. (i.e., <Server Name>\<Instance Name>). You can also click the Browse button to locate and select the SQL server and instance.

Name of database Catalog

This text box displays the name assigned to the Change Auditor database.

Connect using

Specify whether Windows authentication, Microsoft Entra authentication or SQL server authentication will be used when communicating with the SQL database instance. (The authentication method is set up when SQL is installed.)

Depending on the authentication option selected, enter the appropriate user credentials.

Windows Authentication - this is selected by default and will use Windows authentication to access the database.

If you are using a group Managed Service Account:

SQL Server Authentication - select this to use SQL Server authentication to access the database.
Microsoft Entra Authentication - select this to use Microsoft Entra authentication to access the database located on an Azure SQL Managed Instance.

Azure SQL Managed Instance:

For private endpoint with default port, port specification is not explicitly required. For example: MyHostName.b1b2a3d4e5f7.database.windows.net

or

MyHostName.b1b2a3d4e5f7.database.windows.net,1433

For public endpoint, port specification is required. For example: MyHostName.public.b1b2a3d4e5f7.databas

NOTE:

Login ID

Enter the user name for the account to be used to access the SQL server instance.

Password

Enter the password associated with the user account entered above.

Domain

Enter the domain name for the Windows account to be used to access the designated SQL server instance. (Only valid for Windows Authentication.)

Encryption

Select the appropriate level of encryption for the data sent between the coordinator and SQL server.

Strict (SQL Server 2022): Select this option for SQL Server 2022 and Azure SQL Managed Instance or when the instance has Force Strict Encryption enabled.
Mandatory: Select this option when the instance has Force Encryption enabled. It can also be used when no encryption is configured for the instance, but Trust server certificate is enabled. While this method is less secure than installing a trusted certificate, it does support an encrypted connection.

Enabling Trust server certificate, when 'Optional' or 'Mandatory' encryption is selected, or if the server enforces encryption, means that SQL Server will not validate the server certificate on the client computer when encryption is enabled for network communication.

Under Host name in the certificate, you can provide an alternate, yet expected, Common Name (CN) or Subject Alternative Name (SAN) in the server certificate. You would use this option when the server name does not match the CN or SAN, for example, when using DNS aliases.

Leaving this option blank allows certificate validation to confirm that the CN or SAN matches the server name.

 

Ports page

By default, Change Auditor dynamically assigns communication ports for each installed coordinator. However, using the Ports page of the Coordinator Configuration dialog, you can specify static SCP listening ports to be used to communicate with the Change Auditor coordinator.

If you upgraded from a 5.x installation where static ports were defined, these static ports will be retained as part of the upgrade process. However, the Agent Port setting, which is new and is used by 6.0 agents, will be set to use a dynamic port. (Note that the 5.x agents now use the Agent Port (Legacy) setting on this page.) Check with your system administrator to determine whether this new connection should also be using a static port.

Enter the port(s) to be used to communicate with the coordinator:

Client Port

Enter the static port number to be used by the Change Auditor client to communicate with the coordinator.

Public SDK Port

Enter the static port number to be used by external applications to access the Change Auditor coordinator.

Agent Port (Legacy)

Enter the static port number to be used for communication between a legacy (5.x) Change Auditor agent and a coordinator.

Agent Port

Enter the static port number to be used for communication between a Change Auditor agent (6.x) and a coordinator.

Protection page

By default, Change Auditor stores the Active Directory and GPO protection templates in SQL. However, you can use the Protection page of the Coordinator Configuration dialog to have Change Auditor store the Active Directory and GPO protection templates in Active Directory instead of SQL.

When you have selected to store your Active Directory and Group Policy protection templates in Active Directory, you can use the Security feature on the Active Directory Protection page or Group Policy Protection page to provide an additional layer of security. The additional setting is intended for customers who require tighter security ACLs on their Active Directory and GPO objects and templates (i.e., the Change Auditor SQL database may not be fully secured by ChangeAuditor Administrators). For more information about setting this additional security on protected objects, see the Change Auditor for Active Directory User Guide.

Specify the appropriate option for storing Active Directory/GPO protection and ADAM (AD LDS) protection:

Store Active Directory/GPO Protection in:

Select one of the following options:

Store ADAM (AD LDS) Protection in:

Select one of the following options:

LDAP Authentication page

From this page you can specify the authentication method to use to make Active Directory requests.

Coordinator Credentials Required dialog

Previous Next


Coordinator Credentials Required dialog

The Coordinator Credentials Required dialog appears when the current authenticated user running the Change Auditor client does not have the proper credentials for accessing the Change Auditor coordinator service.

From this dialog, enter the proper credentials for accessing this service.

When using a group Managed Service Account:

Server

This read-only field displays the IP address/name of the server where the Change Auditor coordinator resides.

User

Enter the name of the user to be used to access the designated server.

Password

Enter the password associated with the user account entered above.

Domain

Enter the domain name for the account to be used to access the designated server.

Remember Creds

Click to cache the logon credentials entered so they can be used for subsequent authentications to the Change Auditor coordinator.

NOTE: You can clear these saved credentials by clicking the Clear Creds button on the Manage Connection Profiles dialog. Clearing the cached logon credentials on the current workstation allows you to use a different set of credentials for accessing the coordinator.

Credentials Required dialog

Previous Next


Credentials Required dialog

This dialog appears when credentials are required in order to connect to the selected ADAM (AD LDS) instance. On this dialog, specify the workgroup server that hosts the selected ADAM (AD LDS) instance and the credentials of a user that can access this instance. The account and credentials entered on this dialog are those of the administrative user account that was defined during the installation of the ADAM (AD LDS) instance.

Windows Account

Select this option if the selected ADAM (AD LDS) instance uses a Windows account for its credentials.

ADAM (AD LDS) Account

Select this option if the selected ADAM (AD LDS) instance uses an ADAM (AD LDS) account for its credentials.

Server

This field is automatically filled in based on the ADAM (AD LDS) instance selected.

Port

This field is automatically filled in based on the instance selected.

User

Enter the name of the administrative user account to be used to access the selected ADAM (AD LDS) instance.

Password

Enter the password associated with the user account entered above.

Domain

Enter the computer name of the workgroup server. This is only valid for Windows accounts.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating