立即与支持人员聊天
与支持团队交流

Change Auditor 7.5 - User Guide

Welcome to Change Auditor Help Change Auditor Core Functionality
Change Auditor Core Functionality Change Auditor Overview Agent Deployment Change Auditor Client Overview Overview Page Searches Search Results and Event Details Custom Searches and Search Properties Enable Alert Notifications Administration Tasks Agent Configurations Coordinator Configuration Purging and Archiving your Change Auditor Database Working with Private Alerts and Reports Generate and Schedule Reports SQL Reporting Services Configuration Change Auditor User Interface Authorization Client Authentication Certificate authentication for client coordinator communication Integrating with On Demand Audit Enable/Disable Event Auditing Account Exclusion Registry Auditing Service Auditing Agent Statistics and Logs Coordinator Statistics and Logs Change Auditor Commands Change Auditor Email Tags
Microsoft 365 and Microsoft Entra ID Auditing Change Auditor for Active Directory
Change Auditor for Active Directory Overview Custom Active Directory Searches and Reports Custom Active Directory Object Auditing Custom Active Directory Attribute Auditing Member of Group Auditing Active Directory Federation Services Auditing ADAM (AD LDS) Auditing Active Directory Database Auditing Active Roles Integration Quest GPOADmin Integration Active Directory Protection Event Details Pane About us
Change Auditor for Authentication Services Change Auditor for Defender Change Auditor for EMC Change Auditor for Exchange Change Auditor for Windows File Servers Change Auditor for Active Directory Queries Change Auditor for Logon Activity Change Auditor for NetApp Change Auditor for SharePoint Change Auditor for SQL Server Change Auditor SIEM Integration Guide
Webhooks in Change Auditor Integrating Change Auditor and SIEM Tools Subscription Management
Adding the PowerShell module Viewing available commands and help Connecting to Change Auditor Managing subscriptions Working with event subscriptions in the client Managing a Splunk integration Splunk event subscription wizard Managing an IBM QRadar integration QRadar event subscription wizard Managing a Micro Focus Security ArcSight Logger and Enterprise Security Manager (ESM) integration ArcSight event subscription wizard Managing a Quest IT Security Search integration (Preview) Managing a Syslog integration Syslog event subscription wizard Managing a Microsoft Sentinel integration Microsoft Sentinel event subscription wizard
Webhook technical insights
Change Auditor Threat Detection Deployment Change Auditor Threat Detection Dashboard Change Auditor PowerShell Command Guide Change Auditor Dialogs
Change Auditor dialogs
Quest Change Auditor dialog Add Administrator Add Agents, Domains, Sites dialog Add Container dialog Add Active Directory Container dialog (AD Query) Add Facilities or Event Classes dialog Add Facilities or Event Classes dialog (Add With Events) Add File System Path dialog Add Foreign Forest Credential Add Group Policy Container dialog Add Local Account dialog Add Logons dialog Add Logons dialog (Add With Events) Add Object Classes dialog Add Object Classes dialog (Add With Events) Add Origin dialog Add Origin dialog (Add With Events) Add Registry Key dialog Add Results dialog Add Service dialog Add Service dialog (Add With Events) Add Severities dialog Add Severities dialog (Add With Events) Add SharePoint Path dialog Add SQL Instance dialog Add SQL Data Level Object Add Users, Computers or Groups dialog Add Where dialog Add Who dialog Advanced Deployment Options dialog Agent Assignment dialog Alert Body Configuration dialog Alert Custom Email dialog Auditing and Protection Templates dialog Authorizations: Application Group dialog Authorizations: Operations | Role Definitions | Task Definitions | Application Group Authorizations: Role dialog Authorizations: Task dialog Auto Deploy to New Servers in Forest dialog Browse for Folder dialog Browse SharePoint dialog Comments dialog Configuration Setup dialog Configure cepp.conf Auditing dialog Connection screen Coordinator Configuration tool Coordinator Credentials Required dialog Credentials Required dialog Custom Filter dialog Database Credentials Required dialog Directory object picker Domain Credentials dialog Eligible Change Auditor Agents dialog Event Logging dialog Export/Import dialog Install or Upgrade/Uninstall/Update Foreign Agent Credentials IP Address dialog Log page Logon Credentials dialog (Deployment page) Logon Credentials dialog (EMC Auditing wizard) Manage Connection Profiles dialog New Report Layout dialog Microsoft 365 dialog Rename dialog Save As dialog Select a SQL Instance and Database dialog Select Destination Folder dialog Select Exchange Users dialog Select Registry Key dialog Select SQL Reporting Services Template dialog Shared Mailboxes dialog SharePoint Credentials Required dialog When dialog
About Us

Active Directory protection page

Previous Next


Active Directory protection page

This page displays when you select Active Directory from the Protection task list in the navigation pane of the Administration Tasks tab. From here, you can start the Active Directory Protection wizard to define critical Active Directory objects to protect from unauthorized modifications. You can also edit existing templates, disable and enable templates, and remove templates that are no longer being used.

The Active Directory protection page contains an expandable view of all previously defined Active Directory protection templates. To add new template, use the Add button.

Once added, the following information is provided for each template:

Template

Displays the name assigned to the template when it was created.

Status

Indicates whether the template is enabled or disabled. To enable/disable the template, place your cursor in this Status cell, click the arrow control and select the appropriate option from the drop-down menu.

Override Accounts

Indicates whether the override accounts listed are excluded from protection or included in protection. This setting corresponds to the option used at the top of the last page of the Active Directory Protection wizard:

Excluded from Protection - indicates that you selected the Allow option to allow only the selected accounts to change the protected objects.
Included in Protection - indicates that you selected the Deny option to allow all accounts to change the protected objects except for those selected.
Objects

This field is used for filtering data.

Override Account Filter

This field is used for filtering data.

Attributes

This field is used for filtering data.

Click the expansion box to the left of the template name to expand this view and display the following details for each template:

Object Canonical

Displays the canonical name of the object being protected.

Status

Indicates whether protection for the object is enabled or disabled.

Object Class

Displays the type of object being protected (for example, computer, group, user, and so on)

Operations

Displays the type of operations to be denied for the selected object:

Scope

Displays the scope of coverage for the protected object:

Override Account

If applicable, this section of the grid displays the user and group accounts that are allowed (or not allowed) to change the protected objects.

Attribute Protection

Displays the attribute setting specified in the wizard:

For Protect Only and Protect Except, click the expansion box to the left of the field to display the individual attributes included in the protection template.

Administration Account

If applicable, this section displays the user or group accounts that have been selected on the last page of the wizard to manage this protection template.

 

Active Directory protection templates

Previous Next


Active Directory protection templates

The Active Directory protection templates are global settings and apply to all agents.

NOTE:  
If you are planning to use multiple Active Directory Protection templates, see the Change Auditor Technical Insight Guide for more information about how multiple protection templates are evaluated.
To create an Active Directory Protection template:
2
Click Protection.
3
Select Active Directory in the Protection task list.
4
Click Add to open the Active Directory Protection wizard to specify the Active Directory objects to protect.
7
Click Add to add the object. Repeat this step as required to add more objects.

You can use the Forest drop-down box to select in which forest the objects reside. Foreign agent forests may require foreign forests credentials which can be entered on the Credentials Required dialog.

If you have many objects to protect, you can create a .csv file containing the object and protection details, then import them into the template.

The file must follow this format:

<Canonical Name>, <Protection Scope>, <Protected Operation 1><Protected Operation 2>

<Protected Operation n>, <Foreign Agent Forest FQDN>

Valid protection scope values include:

Valid protected operations include:

Foreign Agent Forest FQDN is not required for objects in the local forest of the coordinator. If left blank, the local forest is assumed.

The import supports the list separator defined for the locale of the operating system.

Example of CSV file entry for local forest object: Forest1.com/users/TestUser1, This object only, Create Delete Modify

Example of CSV file entry for foreign forest object: Forest2.com/users/TestUser2, This object only, Create Delete Modify, Forest2.com

After you have the file created, select Import, browse to the file, and click Open.

If any objects cannot be found, you can copy the results (ctrl+c) from the list into the clipboard so that you can use the information to locate any issues and make the necessary adjustments.

9
By default, the scope of coverage is for This object only; however, you can change this by using the drop-down arrow in the Scope cell in the list box and selecting one of the other two options:

From the attributes list box on the left, select the individual attributes to include in this protection template, click Add, and click Next.

If you have selected to protect the userAccountControl attribute, you can select to protect specific attribute flags on the (Optional) Select Attribute Flags to Protect of the wizard. By default, all flags are selected. Clear the ALL checkbox to select specific flags and click Next.

Use the Browse or Search pages to locate and select the user, group, or Managed Service Accounts to exclude from protection. Click Add to add the required accounts.

NOTE: Allow is selected by default indicating that the selected users or groups can change the protected objects. However, you can select the Deny option and select individual users or groups that are not allowed to change the protected objects. When using the Deny option, you are allowing all users and groups to change the protected objects except for those selected on this page.
13
On the next page of the wizard, you can schedule when to enforce the protection. You can either select to always run the protection or run only during specific times. To enable the protection only during specific times, select Protection is scheduled, and define when it should be enabled (hour blocks on a weekly basis). The times selected are the local agent time where the template is applied.
Protect access from all locations: Protection is always enabled regardless of the location.
Protect access only from select locations: Protection is only enabled for the specified locations.
Disable protection only for select locations: Protection is disabled for the selected locations. Enabled everywhere else.
Protect access from all unknown locations: All Active Directory requests from locations that cannot be determined by the Change Auditor agent will be protected.
15
Click Finish to save the protection template, close the wizard and return to the Active Directory Protection page.
To modify a protection template:

If you are in the authorized accounts list at template creation time, you may find yourself locked out later if someone else in the authorized accounts list decides to edit the template and remove you.

This opens the Active Directory Protection wizard where you can modify the current list of objects, and the attribute selection, the override accounts selected, and the administration accounts authorized to manage this protection template.

2
Click Finish to save your changes and return to the Active Directory Protection page.
To disable a protection template:

Disabling a template temporarily stops protection for the specified objects without having to remove the protection template.

Place your cursor in the Status cell for the protection template to disable, click the arrow control, and select Disabled

The entry in the Status column for the template changes to ‘Disabled’.

To disable an object’s protection within a protection template:
Place your cursor in the Status cell for the required object, click the arrow control, and select Disabled.

The entry in the Status column for the object changes to ‘Disabled’.

To delete a protection template:
2
Click Yes to confirm.
To delete an object from a protection template:
2
Click Yes to confirm.
To delete an override account from a protection template:
2
Click Yes to confirm.
To delete an administration account from a protection template:
2
Click Yes to confirm.

Active Directory Protection wizard

Previous Next


Active Directory Protection wizard

The Active Directory Protection wizard opens when you click Add or Edit on the Active Directory Protection page. Using this wizard you can define the Active Directory objects and attributes to protect from unauthorized modifications.

Table 7. Active Directory Protection wizard

Select Active Directory objects to protect page: On the first page of the wizard, enter a name for the template and select the Active Directory objects to protect.

Template Name

Enter a descriptive name for the protection template.

Browse page

Displays a hierarchical view of the containers in your environment allowing you to locate and select the Active Directory objects to protect. If required, use the Forest drop-down box to select in which forest the objects reside. Foreign agent forests may require foreign forests credentials which can be entered on the Credentials Required dialog.

After you have selected an object, click Add to add it to the list.

After you have the file created, select Import, browse to the file, and click Open.

If any objects cannot be found, you can copy the results (ctrl+c) from the list into the clipboard so that you can use the information to locate any issues and make the necessary adjustments.

CSV File Details

The file must follow this format:

<Canonical Name>, <Protection Scope>, <Protected Operation 1><Protected Operation 2> <Protected Operation n>

Valid protection scope values include:

Valid protected operations include:

The import supports the list separator defined for the locale of the operating system.

Search page

Use the controls at the top of the Search page to search your environment to locate an Active Directory object to protect.

After you have selected an object, click Add to add it to the list.

Options page

Use the Options page to modify the search options used to retrieve directory objects.

Object list

 

The list box across the bottom of the page displays the object(s) selected for protection. Use the buttons located above this list box to add and remove objects.

 

Add - Select an object in the Browse or Search page and add it to the Object list.
Remove - Select an entry in the Object list and remove it from the template.

 

Operations

By default, the create, modify attributes and delete operations are selected. To change this use the drop-down arrow in the Operations cell and select/clear operations.

Scope

By default, the scope of coverage is set to This object only. To change this setting, use the drop-down menu in the Scope cell to select a different scope.

For example, if you protect an OU and set an option with child objects, then all objects under the OU are also protected. If you protect a group, nested groups are not protected.

(Optional) Select Attributes to Protect page: By default all attributes for the selected objects are protected. However, you can protect individual attributes or to exclude individual attributes from protection.

All Attributes

Select this option to protect all attributes for the selected object.

Only Selected

Select this option to protect individual attributes. Selecting this option will activate the list boxes on this page allowing you to select the individual attributes to be protected.

 

All EXCEPT Selected

Select this option to protect all attributes EXCEPT those selected. Selecting this option will activate the list boxes on this page allowing you to select the individual attributes that are not to be protected.

 

Attributes list

The list box to the left displays all the available attributes which may be selected for inclusion in the protection template.

NOTE: This list box is not enabled when All Attributes is selected.

Add

Use the Add button to move the attributes selected in the Attributes list over to the Selected Attributes list.

 

Remove

Use the Remove button to move the attributes selected in the Selected Attributes list back over to the Attributes list.

 

Selected Attributes list

The list box to the right displays the attributes to be included in the protection template.

NOTE: This list box is not enabled when the All Attributes option is selected.

 

(Optional) Select Attribute Flags to Protect page: If you have selected to protect the userAccountControl attribute, you can select to protect specific attribute flags on this page. By default, all flags are selected. Clear the ALL checkbox to select specific flags and click Next.

Attributes Flags list

The list displays all the available attributes flags which may be selected for inclusion in the protection template.

(Optional) Select Accounts Allowed (NOT Allowed) to Access Protected Objects page: By default all users and groups are prevented from changing the Active Directory objects selected for protection. However, you can specify users or groups that are allowed (not allowed) to change the protected objects.

Allow

The Allow option is selected by default indicating that the users and groups selected on this page will be the only accounts allowed to change the protected objects.

Use the Browse or Search page to select the user or group accounts.

 

Deny

Select the Deny option if you would like to allow all users and groups to change the protected objects EXCEPT for those selected on this page.

Use the Browse or Search page to select the user or group accounts.

 

Browse page

Displays a hierarchical view of the containers in your environment allowing you to locate and select the users or groups that are allowed (not allowed) to change the protected objects.

After you have selected an account, click Add to add it to the list.

Search page

Use the controls at the top of the Search page to search your environment to locate the users or groups that are allowed (not allowed) to change the protected objects.

After you have selected an account, click Add to add it to the list.

Options page

Use the Options page to modify the search options used to retrieve directory objects.

 

Override Accounts list

The list box across the bottom of the page displays the user and group accounts that are allowed (not allowed) to change the protected objects selected on the previous page of the wizard. Use the buttons located above this list box to add and remove accounts.

Add — Select an account in the Browse or Search page and add it to the Override Accounts list.
Remove — Select an account in the Override Accounts list and remove it.

(Optional) Schedule when protection is enabled

 

You can either select to always run the protection or run it only during specific times.

To enable the protection only during specific times, select the Protection scheduled option, and define when it should be enabled (hour blocks on a weekly basis). The times selected are the local agent time where the template is applied.

When the schedule is disabled, all options are disabled with it, including any denied access to the specified users.

The scheduling options override all other protection settings.

(Optional) Enable or disable protection for specific location

Control when the protection is enabled based on the location. Location refers to the computer that is attempting to access the resource that is protected. Select from the following options:

NOTE: Protect access from all unknown locations: All requests from locations that cannot be determined by the Change Auditor agent will be protected. If you have denied specific users or groups access to protected objects, but you have specified locations that can access the protected object, the denied user or group will be able to access the protected objects from these locations.

The location options override all other protection settings.

(Optional) Select Accounts Authorized to Manage This Protection Template page

By default members of the Change Auditor Administrators group are authorized to access the Administration Tasks tab and perform administration tasks, including defining Active Directory and Group Policy protection; however, after you enter a user or group account here you are relinquishing your rights to modify the selected protection template to the users or groups specified on this page of the protection wizard.

Browse page

Displays the hierarchical view of the containers in your environment allowing you to locate and select the users or groups that will be authorized to manage this protection template.

After you have selected an account, click Add to add it to the list.

Search page

Use the controls at the top of the Search page to search your environment to locate the users or groups that will be authorized to manage this protection template.

After you have selected an account, click Add to add it to the list.

Options page

Use the Options page to modify the search options used to retrieve directory objects.

 

Administration Accounts list

The list box across the bottom of the page displays the user and group accounts authorized to manage this protection template.

Use the buttons located above this list box to add and remove accounts.

Add — Select an account in the Browse or Search page and add it to the list.
Remove — Select an account in the Administration Accounts list and remove it.

Group Policy Object protection

Previous Next


Group Policy Object protection

You can prevent all changes to Group Policy Objects, regardless of the tool that is used to make the change. Protection includes both portions of the Group Policy data: the Group Policy Object (GPO) in Active Directory and the actual configuration data stored in the SYSVOL share on domain controllers.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级