立即与支持人员聊天
与支持团队交流

Change Auditor 7.5 - User Guide

Welcome to Change Auditor Help Change Auditor Core Functionality
Change Auditor Core Functionality Change Auditor Overview Agent Deployment Change Auditor Client Overview Overview Page Searches Search Results and Event Details Custom Searches and Search Properties Enable Alert Notifications Administration Tasks Agent Configurations Coordinator Configuration Purging and Archiving your Change Auditor Database Working with Private Alerts and Reports Generate and Schedule Reports SQL Reporting Services Configuration Change Auditor User Interface Authorization Client Authentication Certificate authentication for client coordinator communication Integrating with On Demand Audit Enable/Disable Event Auditing Account Exclusion Registry Auditing Service Auditing Agent Statistics and Logs Coordinator Statistics and Logs Change Auditor Commands Change Auditor Email Tags
Microsoft 365 and Microsoft Entra ID Auditing Change Auditor for Active Directory
Change Auditor for Active Directory Overview Custom Active Directory Searches and Reports Custom Active Directory Object Auditing Custom Active Directory Attribute Auditing Member of Group Auditing Active Directory Federation Services Auditing ADAM (AD LDS) Auditing Active Directory Database Auditing Active Roles Integration Quest GPOADmin Integration Active Directory Protection Event Details Pane About us
Change Auditor for Authentication Services Change Auditor for Defender Change Auditor for EMC Change Auditor for Exchange Change Auditor for Windows File Servers Change Auditor for Active Directory Queries Change Auditor for Logon Activity Change Auditor for NetApp Change Auditor for SharePoint Change Auditor for SQL Server Change Auditor SIEM Integration Guide
Webhooks in Change Auditor Integrating Change Auditor and SIEM Tools Subscription Management
Adding the PowerShell module Viewing available commands and help Connecting to Change Auditor Managing subscriptions Working with event subscriptions in the client Managing a Splunk integration Splunk event subscription wizard Managing an IBM QRadar integration QRadar event subscription wizard Managing a Micro Focus Security ArcSight Logger and Enterprise Security Manager (ESM) integration ArcSight event subscription wizard Managing a Quest IT Security Search integration (Preview) Managing a Syslog integration Syslog event subscription wizard Managing a Microsoft Sentinel integration Microsoft Sentinel event subscription wizard
Webhook technical insights
Change Auditor Threat Detection Deployment Change Auditor Threat Detection Dashboard Change Auditor PowerShell Command Guide Change Auditor Dialogs
Change Auditor dialogs
Quest Change Auditor dialog Add Administrator Add Agents, Domains, Sites dialog Add Container dialog Add Active Directory Container dialog (AD Query) Add Facilities or Event Classes dialog Add Facilities or Event Classes dialog (Add With Events) Add File System Path dialog Add Foreign Forest Credential Add Group Policy Container dialog Add Local Account dialog Add Logons dialog Add Logons dialog (Add With Events) Add Object Classes dialog Add Object Classes dialog (Add With Events) Add Origin dialog Add Origin dialog (Add With Events) Add Registry Key dialog Add Results dialog Add Service dialog Add Service dialog (Add With Events) Add Severities dialog Add Severities dialog (Add With Events) Add SharePoint Path dialog Add SQL Instance dialog Add SQL Data Level Object Add Users, Computers or Groups dialog Add Where dialog Add Who dialog Advanced Deployment Options dialog Agent Assignment dialog Alert Body Configuration dialog Alert Custom Email dialog Auditing and Protection Templates dialog Authorizations: Application Group dialog Authorizations: Operations | Role Definitions | Task Definitions | Application Group Authorizations: Role dialog Authorizations: Task dialog Auto Deploy to New Servers in Forest dialog Browse for Folder dialog Browse SharePoint dialog Comments dialog Configuration Setup dialog Configure cepp.conf Auditing dialog Connection screen Coordinator Configuration tool Coordinator Credentials Required dialog Credentials Required dialog Custom Filter dialog Database Credentials Required dialog Directory object picker Domain Credentials dialog Eligible Change Auditor Agents dialog Event Logging dialog Export/Import dialog Install or Upgrade/Uninstall/Update Foreign Agent Credentials IP Address dialog Log page Logon Credentials dialog (Deployment page) Logon Credentials dialog (EMC Auditing wizard) Manage Connection Profiles dialog New Report Layout dialog Microsoft 365 dialog Rename dialog Save As dialog Select a SQL Instance and Database dialog Select Destination Folder dialog Select Exchange Users dialog Select Registry Key dialog Select SQL Reporting Services Template dialog Shared Mailboxes dialog SharePoint Credentials Required dialog When dialog
About Us

Exchange Auditing wizard

Previous Next


Exchange Auditing wizard

The Exchange Auditing wizard is displayed when you select Add (or Add | Exclude) on the Exchange Mailbox Auditing page. This wizard allows you to locate and select directory objects (such as User, Group, Container, DomainDNS, OrganizationalUnit, or BuiltinDomain) to add to the Exchange Mailbox Auditing list. Depending on the commands used (Add vs. Add | Exclude) you will either be selecting directory objects whose Exchange mailboxes are to be included or excluded from the auditing process.

The following table provides a description of the fields and controls in the Exchange Mailbox Auditing wizard.

Table 2. Exchange Auditing wizard

Select an Exchange Mailbox(es) to Audit page: This page opens when you select Add. From here, you select the Exchange mailboxes to audit.

Scope

Select one of the following options to define the scope of coverage:

When the This Object option is selected the Browse and Search pages are enabled allowing you to select a directory object (such as user, group, container, DomainDNS, OrganizationalUnit, or BuiltinDomain) whose mailbox is to be audited.

Browse page

Displays a hierarchical view of the containers in your environment allowing you to locate and select the directory objects whose Exchange mailbox you want to audit.

If required, use the Forest drop-down box to select in which forest the objects reside. Foreign agent forests may require foreign forests credentials which can be entered on the Credentials Required dialog.

After you have selected an object, click Add to move the entry to the list at the bottom of the page.

Search page

Use the controls at the top of the Search page to search your environment to locate the directory objects whose Exchange mailbox you want to audit.

After you have selected an object, click Add to move the entry to the list at the bottom of the page.

Options page

Use this page to modify the search options used to retrieve directory objects.

Selection List

The directory objects selected for mailbox auditing are displayed in the list box located across the bottom of this page. Use the buttons located above this list box to add and remove objects.

Add - Select an object in the Browse or Search page and then click Add.
Remove - Select an entry in the selection list and then click Remove.

Select An Exchange Mailbox(es) to Exclude From Auditing page: This page opens when you select Add | Exclude. From here, you can select the directory objects whose mailboxes are to be excluded from auditing.

Scope

Select one of the following options to define the scope of coverage:

When the This Object option is selected the Browse and Search pages are enabled allowing you to select a directory object (for example, user, group, container, DomainDNS, OrganizationalUnit, or BuiltinDomain) whose mailbox is to be excluded from being audited.

Browse page

Displays a hierarchical view of the containers in your environment allowing you to locate and select the directory objects whose Exchange mailbox is to be excluded from being audited.

If required, use the Forest drop-down box to select in which forest the objects reside. Foreign agent forests may require foreign forests credentials which can be entered on the Credentials Required dialog.

Once you have selected an object, click Add to move the entry to the list at the bottom of the page.

Search page

Use the controls at the top of the Search page to search your environment to locate the directory objects whose Exchange mailbox is to be excluded from being audited.

Once you have selected an object, click Add to move the entry to the list at the bottom of the page.

Options page

Use this page to modify the search options used to retrieve directory objects.

Excluded Objects List

The directory objects selected for exclusion from Exchange mailbox auditing are displayed in the list box across the bottom of this page. Use the buttons located above this list box to add and remove objects.

Add - Select an object in the Browse or Search page and then click Add.
Remove - Select an entry in the Excluded Objects list and then click Remove.

Exchange Settings and Event Logging (Agent Configuration Page)

Previous Next


Exchange Settings and Event Logging (Agent Configuration Page)

Introduction

Previous Next


Introduction

From the Agent Configuration page on the Administration Tasks tab you can define how Change Auditor handles duplicate Exchange folder open events and enable and disable event logging for Exchange events.

Exchange Folder Open Event setting

Previous Next


Exchange Folder Open Event setting

Use the Exchange tab at the top of the Configuration Setup dialog to define how Change Auditor handles duplicate folder open events.

Discard duplicates that occur within nn seconds

This setting defines how long to hold Exchange folder open events to determine if duplicates have occurred before they are forwarded to the client. This process is intended to eliminate the folder open events that Outlook or OWA Exchange users get when their inbox is automatically refreshed.

By default, this setting is set to zero indicating that it is turned off and duplicate folder opens are sent. However, you can use the arrow controls to enable this setting and specify the amount of time to hold folder open events to determine if duplicates have occurred. Valid range is 0 - 600 seconds.

To set the duplicate folder open event setting:
2
Click Configuration.
3
Select Agent in the Configuration task list to display the Agent Configuration page.
4
Click Configurations.
7
Once you have set this setting, click OK to save your selections, close the dialog and return to the Agent Configuration page.
8
On the Agent Configuration page, select the agents assigned to the selected configuration and click Refresh Configuration to ensure the agents are using the latest configuration. Exchange event logging
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级