Email this page to friends
Network and Vulnerability Management

ChangeAuditor for Active Directory
Active Directory Change Auditing

Quest ChangeAuditor for Active Directory proactively tracks, audits, reports and alerts on vital configuration changes – in real time and without the overhead of native auditing. You will instantly know who made what change when, where and from which workstation. Plus, you can compare the original and current values for fast troubleshooting. ChangeAuditor for AD generates intelligent, in-depth forensics for auditors and management – and reduces the risks associated with day-to-day modifications.


  • At-a-Glance Display: Tracks user and administrator activity with detailed information including who, what, when, where, which workstation and why for change events, plus original and current values for all changes.
  • Real Time and “Smart” Alerts: Sends an alert immediately when critical items are changed or when patterns of changes occur enabling administrators to respond without delay.
  • Account Lockout: Captures the originating IP address/workstation name for account lockout events to simplify troubleshooting.
  • Object Protection: Captures change information without the need for native auditing, resulting in significant performance improvements and storage optimization.
  • Tracks Changes to Nested Group Memberships: Monitors groups that exist within groups without setting an explicit rule, streamlining the monitoring of group changes.
  • Does Not Require Native Auditing: Captures change information without the need for native audit logs, resulting in significant savings of storage resources.
  • Configurable Auditing: Keeps the audit database from database from overloading by disabling events and excluding high traffic or "safe" accounts from being audited.
  • Share Auditing: Tracks all events related to shares, helping administrators ensure access to shared files is maintained by capturing all change events, in real-time.
  • Reporting: Generates predetermined or custom reports quickly using built-in reports and a comprehensive compliance reporting library.
  • Role-Based Access: Configures access so auditors can run searches and reports without the ability to make any configuration changes to the application, and without requiring the assistance and time of the administrator.
Download Document Link:

For more information about ChangeAuditor,
please contact our Sales Representative at 2556 2162, or email at